Join 3,501 readers in helping fund MetaFilter (Hide)

32 posts tagged with cracking. (View popular tags)
Displaying 1 through 32 of 32. Subscribe:

Related tags:
+ (22)
+ (10)
+ (8)
+ (7)
+ (7)
+ (6)
+ (5)
+ (4)


Users that often use this tag:
the man of twists ... (5)
Steven Den Beste (3)
mathowie (3)

"What would work even against an infosec guy? Linkedin invites."

How I Hacked Your Router
posted by the man of twists and turns on Apr 6, 2014 - 63 comments

"irresistible high-low raw material for an online news cycle"

From a small town in Romania, Guccifer skewered and glorified the power elite.
If Snowden perfectly fit the profile of geek crusader, Lehel, a stone-faced, disheveled man in a tight leather jacket, seemed an odd candidate for one of the world’s most notorious hackers. But Guccifer is to hacking what the Beatles are to rock and roll. He had predecessors, 4Chan cowboys like Anonymous and Sabu of LulzSec, but he’s changed the nature of hacking fame. Guccifer rose by exploiting the connections people make online to infiltrate the private lives of some of the most powerful people on Earth. He served up the results to the media, irresistible high-low raw material for an online news cycle driven by leaks and voyeurism and racked by anxiety over privacy.
What Is A Guccifer? [more inside]
posted by the man of twists and turns on Jan 27, 2014 - 12 comments

"Phreaking Out Ma Bell"

How a buccaneering young engineer built the little blue box that broke into the biggest network in the world
posted by the man of twists and turns on Mar 24, 2013 - 17 comments

All Your Nets Are Belong to the PLA

The Mandiant security firm has released a report attributing a number of hacking events to Advanced Persistent Threat (APT) activity perpetrated by China's 2nd Bureau of the People's Liberation Army General Staff Deparment's 3rd Department. They have also released an appendix containing multiple artifacts that can be used to detect intrusions on networks.
posted by bfranklin on Feb 19, 2013 - 64 comments

Dreaming of password combinations sucks

Password Cracking AES-256 DMGs and Epic Self-Pwnage
posted by unliteral on Feb 12, 2013 - 42 comments

Google Ring?

If special hardware can crack all your passwords, if people have a hard time remembering them anyway, if people don't implement them in the first place, it is no wonder Google (with Yubico) is "declar[ing] war on the password." [more inside]
posted by the man of twists and turns on Jan 19, 2013 - 76 comments

The Hunt For "Red October"

An advanced and well-orchestrated computer spy operation that targeted diplomats, governments and research institutions for at least five years has been uncovered by security researchers in Russia.
The highly targeted campaign, which focuses primarily on victims in Eastern Europe and Central Asia based on existing data, is still live, harvesting documents and data from computers, smartphones and removable storage devices, such as USB sticks, according to Kaspersky Lab, the Moscow-based antivirus firm that uncovered the campaign. Kaspersky has dubbed the operation “Red October.”
[more inside]
posted by the man of twists and turns on Jan 15, 2013 - 26 comments

Your Passwords Are Much Weaker Than You Think

Why passwords have never been weaker—and crackers have never been stronger. Ars weighs in on the amazing advances the bad guys have made in password cracking over the last few years. Think you know how to choose something that's safe? The probability is quite high that you don't, even if you're technically ept. [more inside]
posted by Malor on Aug 21, 2012 - 184 comments

Kinectasploit: hacking like you're in the movies

Hacking with gestures in a 3D space is now possible, with Kinectasploit (a mashup of Metasploit and Kinect with OpenNi, in a Blender-made environment). (via Slashdot)
posted by filthy light thief on Aug 12, 2011 - 21 comments

Yet more censational news

Lulzsec appear to have hacked the UK 2011 Census which, if true, could be quite a significant ramp up of the security wars. Grabbing a few million credit card numbers is one thing, 60 million identities is something else entirely. Not to mention the celebrity data. Here's the Hacker News comment thread, and a list of the actual census questions to show what could be on offer.
posted by Duug on Jun 21, 2011 - 135 comments

Cracking voyeurism

Using honeypots and logging tools, some server admins have logged actual server break-in attempts by nincompoop crackers. [more inside]
posted by Foci for Analysis on Mar 11, 2011 - 50 comments

Cracking the PS3

George Hotz started a blog chronicling his journey to a software-only PS3 crack. Despite tackling a platform that has held strong for three years, Hotz claimed to have gained read/write access to all system memory after five weeks. Although the PS3 actually ships with Linux support, these cracks circumvent the hypervisor that place strict restrictions on low-level hardware access. You may know Hotz as the geohot who released first hardware iPhone jailbreak, added a software-only jailbreak for all iPhones and iPod Touches, and won multiple awards (pdf) at ISEF 2007 for building a working holographic display system while a senior in high school.
posted by d. z. wang on Jan 25, 2010 - 45 comments

Republican 1337

I was a Teenage Wares Freak? San Diego Republican Party chairman Tony Krvaric may have been Strider, co-founder of Fairlight. via Slashdot
posted by Artw on May 6, 2008 - 57 comments

Pre-Brute Forced Password Cracking

RainbowCrack Online aims to enable anyone (who'll pay their subscription) to crack a password given the password hash, and get the clear-text password back instantly by looking it up against their 500GB Rainbow Table. Of course, you've been able to use John the Ripper or l0phtcrack to do this using your own computational power (and time) to crack a password before (or do it online) but now it's just Click and Crack... You still not using shadows?
posted by benzo8 on Nov 11, 2005 - 16 comments

Cracking 101

Fighting a battle of wits with an unarmed opponent. [Via MoFi]
posted by AlexReynolds on Apr 26, 2005 - 35 comments

All Your Braille Are Belong To Us

Three Blind Phreaks, See How They Scam ... The Badirs pulled off Mamet-worthy phone cons, employing cell phones, Braille-display computers, ace code-writing skills, and an uncanny ability to impersonate anyone from corporate suits to sex-starved females. On the phone, the brothers morph into verbal 007s, intimidating men, seducing women, and wheedling classified information from steely-voiced security personnel [...] An intense cat-and-mouse game developed: the Badirs on one side, with fraud investigator David Osmo and prosecutor Doron Porat on the other [...] his car's GPS system and email were repeatedly hacked. "There was a message waiting for him with his password in it," says Ramy, sounding quite pleased. "After that, he changed his password every hour before giving up on email altogether and using a typewriter."
posted by Blue Stone on Jan 30, 2004 - 7 comments

Competition to "reverse engineer" mystery program.

Competition to "reverse engineer" mystery program.
Another cool thingy from the HoneyNet Project; they're inviting people to convert a binary file into its original source. So, who's participating?
posted by arnab on May 3, 2002 - 2 comments

Hacking could now lead to life in prison.

Hacking could now lead to life in prison. Someone that kills someone you love would get less time in prison than what they are proposing for this hacker legislation. Is this punishment just for this crime?
posted by bump on Feb 27, 2002 - 14 comments

Hackers: Computer Outlaws

Hackers: Computer Outlaws A TLC show(that I'm 3/4 through) that seems to actually use reliable sources to discuss not just cracker behavior, but also the creative side of hackers, pointing out the developments attributed to some hackers. Now Markoff and Mitnick. Not a bad little show....
posted by dglynn on Jan 9, 2002 - 7 comments

This has got to be a payback for one too many Jerry Lewis flicks.

This has got to be a payback for one too many Jerry Lewis flicks. French school for hackers. Teaching such things as hacking internal files, setting up trojan horses, viral attack theory, and the like. Of course it's only to put to use by the students for purposes of cyber self defense. Riiiiight.
posted by MAYORBOB on Dec 3, 2001 - 2 comments

Court of Appeals upholds ban against DeCSS. More significant than the banning of DVD cracking is the edict directed towards 2600, which has been forbidden to post any links related to DeCSS. My concern with this decision is whether the current decision may be interpreted in a broader context, preventing others from linking to sites that aren't as sexy as Mom and Apple Pie to the powers that be. Maybe I'm overreacting. But could we see bloggers forced to remove certain links and led to the Tombs if they refuse? Discuss.
posted by ed on Nov 28, 2001 - 15 comments

How to anonymously get root access on a quarter million machines overnight

How to anonymously get root access on a quarter million machines overnight In the past 24 hours the CodeRed II worm has been infecting IIS web servers with a speed equal to or greater than that of the original CodeRed. The original CodeRed infected what is thought to be all vulnerable machines, approximately 250,000 hosts, in under 24 hours. While CodeRed I was relatively harmless, CodeRed II installs a full Administrator-access back door shell that can be accessed via HTTP. This creates a very interesting situation, and with the techniques discussed in this paper opens a new potential door for mass system cracking.
posted by lagado on Aug 5, 2001 - 13 comments

The crypto used in 802.11 wireless networking has been cracked.

The crypto used in 802.11 wireless networking has been cracked. The crack is devastating; it's fast and passive. Simply by listening, the 40-bit key can be cracked in 15 minutes. Worse, the crack scales linearly with the number of bits in the key, so raising the key length to 128 bits would raise the crack time to about an hour. 802.11 is used in such products as the Linksys Etherfast Wireless and the Apple Airport. From now on those products should be considered to be completely insecure.
posted by Steven Den Beste on Aug 3, 2001 - 16 comments

Attrition.org's

Attrition.org's look at the recent China/US web page defacement "war."
posted by skallas on May 2, 2001 - 0 comments

You too can be a felon!

You too can be a felon! Last year, the SDMI Foundation made a public challenge to see if anyone could crack 6 proposed protection mechanisms for digitally-encoded music. All six turned out to be feeble and all six fell. Since then, the SDMI Foundation has been relying on lawyers to cover up for the incompetence of their engineers. They're trying to suppress this article, so everyone reading this has a duty to make and store a copy of it. (Everyone should also own at least one copy of DeCSS. I have the 442-character C version printed on the back of my personal card.)
posted by Steven Den Beste on Apr 21, 2001 - 15 comments

Government hacking abound!

Government hacking abound! I hate it when a group of kids do a big .gov and .mil defacement. Then all the other kids start puffing themselves up and try to outdo each other. S'cuse me while I break out my virtual lawnchair... and please pass the mint julep.
posted by bkdelong on Jan 19, 2001 - 3 comments

Wow, these kids must be really clever

Wow, these kids must be really clever to "take down the Internet". Exaggerated headlines are the stuff of news and have been for ages. Lets all try and simultaneously adapt to that. (via geeknik)
posted by davidgentle on Jan 13, 2001 - 9 comments

Microsoft’s network is hacked

Microsoft’s network is hacked It's gotta be tough for MSNBC to report this...
posted by chiXy on Oct 27, 2000 - 16 comments

The SDMI Hack challenge seems to have gone down in flames.

The SDMI Hack challenge seems to have gone down in flames. And apparently it wasn't even very difficult to break into it. This article goes into it in some detail. [more]
posted by Steven Den Beste on Oct 17, 2000 - 5 comments

Last night Kevin Mitnick was on 60 minutes (the gist of the interview is quoted here), and I have to say he came off as an utterly harmless geek. He was an information junkie that enjoyed the challenge of cracking firewalls. He never profited from his activities and the affected companies made up their monetary losses. It's a shame he was forced to waste away in prison instead of offer his security expertise to the affected companies.
posted by mathowie on Jan 24, 2000 - 1 comment

Kevin Mittnick is finally being released from prison today,

Kevin Mittnick is finally being released from prison today, but I wouldn't call what he's getting as being "free". Prohibiting Kevin from touching a computer for 3 years? This isn't like giving a toddler to a ex-con child molester, it's a computer. A person can do a lot of things besides hack into company servers. How does anyone expect Kevin to make the $125 restitution he owes each month, if he can't use a computer or get a job that requires a computer? Now that I think about it, what percentage of decent jobs are completely free of computers?
posted by mathowie on Jan 21, 2000 - 5 comments

If you had problems reaching MetaFilter over the weekend, this is why. Some script kiddies launched some gnarly smurf attacks against the regional ISP that provides bandwidth for this site. Oh well, it gave me time to code. I've added lots of little enhancements (like user pages, a working search engine), but still have to get the archives working and expand the preferences page.
posted by mathowie on Jan 19, 2000 - 0 comments

Page: 1