Dragon Research Group has compiled a list of the most popular usernames and passwords that are prevalent by SSH scanners/brute forcer attackers. It does not relate to popular account credentials such as the RockYou password research. Popular SSH Usernames Popular SSH Passwords
Continue ReadingCategory: Pen Testing
Ethical Hacker Network Challenge : Miracle on Thirty – Hack Street
The results for the Ethical Hacker Network Challenge – Miracle on Thirty Hack Street are finally in and I won a Technical Honorable Mention! The challenge was pretty good and was focussed on Facebook security or insecurity rather. Before I list my answers to the challenge, make sure to check out my blog post on […]
Continue ReadingHow to crash Google Chrome
Google claims that its browser Google Chrome is able to isolate events that may crash a browser, isolated within those individual tabs. However, an issue exists with how Google Chrome handles undefined handlers in chrome.dll version 0.2.149.27 which is the latest version of the browser. A crash can result without any user interaction. When a […]
Continue ReadingPhysical Security & Information Gathering
This is a great presentation by Johnny Long at Defcon. He talks about how easy it is to gain access to secure locations without any “hacking” aka physical security. [googlevideo]http://video.google.com/videoplay?docid=2846156252478942794[/googlevideo]
Continue ReadingThe History of Hacking
Discovery Channel played a very interesting documentary titled “The History of Hacking”. This goes into the whole history of hacking starting with phone phreaking and Blue boxes and to the present state of hacking. However, a significant portion of this documentary tackles Social Engineering especially the most famous or rather infamous social engineer of all, […]
Continue Reading