illmob.org

How crackers get your password

May 30th, 2013 by admin in cracking, News

Good article on how your complex password gets cracked
http://arstechnica.com/security/2013/05/how-crackers-make-minced-meat-out-of-your-passwords/

Huge Password List for sale

February 22nd, 2013 by admin in cracking, News

CrackStation’s password cracking dictionary list is available to download (Pay what you want) 15GB 1.5 billion words.
http://crackstation.net/buy-crackstation-wordlist-password-cracking-dictionary.htm

iOS 6.1 Lockscreen Bypass

February 14th, 2013 by admin in Apple, News, Privilege Escalation

The flaw is relatively easy to exploit and this lets you bypass the security code and use the full Phone app. From there you have access to the address book, and the pictures app by trying to change a contacts picture.

Apple promised to fix the iOS 6.1 iOS Exchange bug in a forthcoming software update so perhaps they’ll fix this annoying glitch as well.

Steps to follow:
First part:
-Go to emergency call, push down the power button and tap cancel.
-Dial 112 and tap green and inmediately red.
-Go to lock screen.
Ok…ready for second part:
-Go to passcode screen.
-Keep pushing down the power button …1…2…3…seconds and before showing the slider “turn off”…tap the emergency call button and …voilá!
-Then without releasing the power button press the home button and ready…

Comprehensive list of Password dumping tools for windows

February 5th, 2013 by admin in cracking, News, Password Info, Privilege Escalation

Bernardo Damele compiled a list of password dumping tool into a google spreadsheet:

https://docs.google.com/spreadsheet/ccc?key=0Ak-eXPencMnydGhwR1VvamhlNEljVHlJdVkxZ2RIaWc#gid=0

Top 25 passwords of 2012

November 9th, 2012 by admin in cracking, Life, Password Info

The rankings were created by SplashData who compiled from files containing millions of stolen passwords posted online by hackers in 2012 and ranked them in order of popularity. It’s all similar to year’s past but we’ve got some new additions at the end of the list in Jesus and password1. The company advises consumers or businesses using any of the passwords on the list to change them immediately.

“Even though each year hacking tools get more sophisticated, thieves still tend to prefer easy targets,” Slain said. “Just a little bit more effort in choosing better passwords will go a long way toward making you safer online.”

 

Here’s the full list: (more…)

Oracle Logon Protocol Flawed

September 20th, 2012 by admin in cracking

There is a serious vulnerability in the authentication protocol used by some Oracle databases, a flaw that could enable a remote attacker to brute-force a token provided by the server prior to authentication and determine a user’s password. The attacker could then log on as an authenticated user and take unauthorized actions on the database. The researcher who discovered the bug has a tool that can crack some simple passwords in about five hours on a normal PC.

The vulnerability exists in Oracle Database 11g Releases 1 and 2 and is caused by a problem with the way the authentication protocol protects session keys when users try to log in. The first step in the authentication process when a client contacts the database server is for the server to send a session key back to the client, along with a salt. The vulnerability enables an attacker to link a specific session key with a specific password hash.
(more…)

3 Tricks to bypass an Android lockscreen

September 20th, 2012 by admin in cracking, Linux, Mobile

It can be extremely frustrating when you’ve forgotten the pattern you use to lock your smartphone, and even more so if someone has managed to prank you by changing it. Luckily, there’s an easy fix if you know the username and password for the Gmail account you used to set up the lock.

If you’ve somehow forgotten your Gmail info, it’s a bit trickier to bypass the lock screen. As a last resort, there’s always resetting your phone to factory settings, but no one wants that hassle. So, here are a couple of ways to avoid starting from scratch, if you can.
(more…)

Free Rainbow Table Torrents

September 20th, 2012 by admin in cracking, Files

Have alot of hard drive space and alot of bandwidth? Need to crack and 8character or less MD5,NTLM,LM,SHA1 password? here’s a list of torrents that you can download for free. http://www.pwcrack.com/rainbowtables.shtml Happy Cracking!

Retrieve plain-text OSX keychain passwords from root

September 8th, 2012 by admin in Apple, Privilege Escalation

In OS X, your keychain contains your saved passwords. This includes all your email accounts in Mail, passwords stored in Safari, and credentials for accessing known Wi-Fi networks. Because it contains valuable secrets, the keychain is encrypted. It can only be opened with your login password.

But there’s a twist. When you log in to OS X, the operating system automatically unlocks your keychain for your convenience. This means that you don’t have to enter your login password every time you want to use your stored passwords.

Proof of concept code here: https://github.com/juuso/keychaindump
src: juusosalonen.com

Kon-Boot for Mac

September 3rd, 2012 by admin in Apple, Privilege Escalation

Kon-Boot fo Apple Mac OSX systems allows the user to login into the system without knowing the previous passwords and user names. Kon-Boot will create a new “root” account (user:kon-boot pass: kon-boot)

src: http://www.thelead82.com/kon-boot/konbootMAC.html

« Previous ArticleNext Article »