<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Hacking Mode Trick and Video Download</title><description>Any Hacking Mode Trick and Video Download</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Fri, 1 Nov 2024 00:58:26 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">105</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://hacking-trik.blogspot.com/</link><language>en-us</language><item><title>Wireless Hacking - Cracking WEP</title><link>http://hacking-trik.blogspot.com/2008/12/wireless-hacking-cracking-wep.html</link><category>hacking</category><category>wireless</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:55:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-2913869513426320293</guid><description>The second episode of Full Disclosure is now released. This episode includes how to crack WEP encryption, and why it is so easy to crack. The shownote are published in the wireless hacking section of the forums.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;Download video &lt;a href="http://infinityexists.com/avi/IEFD%20Ep.%202%20-%20Wireless%20Hacking%20-%20Cracking%20WEP.avi" title="Episode 2 - Wireless Hacking - Cracking WEP"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wireless Hacking - DeAuth</title><link>http://hacking-trik.blogspot.com/2008/12/wireless-hacking-deauth.html</link><category>hacking</category><category>Wi-Fi</category><category>wireless</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:54:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-8342226540157032429</guid><description>The third episode of Full Disclosure is a short one; however, it is a necessary step in cracking WPA-PSK which will be our next video. Basically this attack just disconnects all the users on a wireless network. The attacker does not need to know the WEP or WPA key or be connect to the network. This attack is illegal in many states, so this video is for education reasons only.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;Download video &lt;a href="http://infinityexists.com/avi/Ep.%203%20-%20Wireless%20Hacking%20-%20DeAuth.avi" title="Episode 3 - Wireless Hacking - DeAuth"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt;   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Lock Picking - Bump Key</title><link>http://hacking-trik.blogspot.com/2008/12/lock-picking-bump-key.html</link><category>Lock Picking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:53:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-6542139187599701374</guid><description>This is the first of our Lock picking series. In this episode we describe how to make and use a bump key to quickly unlock most residential grade locks.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%205%20-%20Lockpicking%20-%20Bump%20Key.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/P&gt;&lt;span class="fullpost"&gt; &lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/avi/Ep.%205%20-%20Lockpicking%20-%20Bump%20Key.avi" title="Episode 5 - Lock Picking - Bump Key"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;br /&gt;Video Shownotes &lt;a href="http://infinityexists.com/?page_id=5&amp;amp;forumaction=showposts&amp;amp;forum=9&amp;amp;thread=16&amp;amp;start=0" title="4th of July Special Shownotes"&gt;here&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Phone Phreaking - Beige Box</title><link>http://hacking-trik.blogspot.com/2008/12/phone-phreaking-beige-box.html</link><category>Phone Phreaking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:51:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-4311061741290359916</guid><description>This episode of Full Disclosure we are demonstrating how to tap a phone line with the old school Beige Box! We are planning to have many Phone Phreaking (telephone hacking) episodes like Sniffing VOIP, Hacking COCOT, and Red Boxing to name a few.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%206%20-%20Phone%20Phreaking%20-%20Beige%20Box.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/avi/Ep.%206%20-%20Phone%20Phreaking%20-%20Beige%20Box.avi" title="Episode 6 - Phone Phreaking - Beige Box"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;/p&gt;      &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Phone Phreaking/Network Hacking - Sniffing VoIP</title><link>http://hacking-trik.blogspot.com/2008/12/phone-phreakingnetwork-hacking-sniffing.html</link><category>Sniffing VoIP</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:50:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-9136611453595987648</guid><description>Our seventh episode is a mix between Phone Phreaking and Network Hacking. In this episode we demonstrate how to sniff Voice Over IP conversations, which basically means how to tap an internet phone. We thought that this would be a good video to follow the beige box.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%207%20-%20Phone%20Phreaking%20-%20Sniffing%20VOIP.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/avi/Ep.%207%20-%20Phone%20Phreaking%20-%20Sniffing%20VOIP.avi" title="Episode 7 - Phone Phreaking/Network Hacking - Sniffing VOIP"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Rig&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Lock Picking - DIY Padlock Shims</title><link>http://hacking-trik.blogspot.com/2008/12/this-is-our-second-video-in-our-lock.html</link><category>Lock Picking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:46:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-1781012227555387911</guid><description>This is our second video in our Lock picking series. In this video we explain how to make and use Padlock Shims. Padlock Shims are used to unlock spring latch Padlocks. &lt;div align="center"&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%208%20-%20Lock%20Picking%20-%20DIY%20Padlock%20Shims.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt; &lt;span class="fullpost"&gt;&lt;/div&gt; Download video &lt;a href="http://infinityexists.com/avi/Ep.%208%20-%20Lock%20Picking%20-%20DIY%20Padlock%20Shims.avi" title="Episode 8 - Lock Picking - DIY Padlock Shims"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Lock Picking - Mult-Disc Combo Locks</title><link>http://hacking-trik.blogspot.com/2008/12/lock-picking-mult-disc-combo-locks.html</link><category>Lock Picking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:45:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-3888932688837904827</guid><description>This is our third video in our Lock Picking series; after this video we will return to computer hacking videos for a while. In this video we demonstrate how to unlock the Master Lock 653D, Targus Defcon CL, and the Master Lock 175. The different methods shown in this video to unlock these three locks will help you not only unlock these locks; but also, help you develop your own way to crack other mult-disc combo locks that you may come across.&lt;/p&gt;  &lt;div align="center"&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%209%20-%20Lock%20Picking%20-%20Mult-Disc%20Combo%20Locks.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt; &lt;/div&gt;  Download video &lt;a href="http://infinityexists.com/avi/Ep.%209%20-%20Lock%20Picking%20-%20Mult-Disc%20Combo%20Locks.avi" title="Episode 9 - Lock Picking - Mult-Disc Combo Locks"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)   &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Local Privilege Escalation Vulnerability in Cisco VPN Client</title><link>http://hacking-trik.blogspot.com/2008/12/local-privilege-escalation.html</link><category>tutorial</category><category>video</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:43:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-7025754035697284767</guid><description>Recently a local privilege escalation vulnerability was found in Cisco’s VPN Client. When Cisco VPN Client is installed, a windows service “Cisco Systems, Inc. VPN Service” is created. The service runs the binary C:\Program Files\Cisco Systems\VPN Client\cvpnd.exe as Local System. Therefore, if you replace cvpnd.exe with another executable, then that program will be ran at startup with root privileges! I fond this vulnerability interesting because it is used at my college to authenticate students when they connect to the wireless network. For that reason, almost every student with a laptop has this software installed, and students are allowed to borrow school laptops from the student center to use the wireless internet. Consequently, anyone could borrow a laptop, gain root access thought the vulnerability, and install a keylogger that sends every keystroke to the attacker’s email! Its been 5 days seen this vulnerability was discovered, and Cisco has already issued a patched version. However, how long will it take for the school to update all their computers? This is just another reason why you should be careful when using school computers!&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Video Demonstration:&lt;/strong&gt; (shows how to gain root access and change the Admin password with this vulnerability)&lt;br /&gt;&lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Cisco%20VPN%20Client.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hacking Basics - MD5</title><link>http://hacking-trik.blogspot.com/2008/12/hacking-basics-md5.html</link><category>Hacking Basics</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:41:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-3821886505547247836</guid><description>In this episode of Full Disclosure we will demonstrate how to crack MD5 password hashes. MD5 (Message-Digest algorithm 5) is a hash function commonly used by websites to encrypt passwords. MD5 is a one-way hash; therefore, to crack the password you most try every possible dictionary word and if that does not work, every possible letter/number/symbol combination. The programs we use to crack the passwords are &lt;a href="http://oxid.netsons.org/download/ca_setup.exe"&gt;Cain &lt;/a&gt;and &lt;a href="http://c3rb3r.openwall.net/mdcrack/download/MDCrack-NG.exe"&gt;MDCrack-NG&lt;/a&gt;.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%2010%20-%20Hacking%20Basics%20-%20MD5.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="430"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/avi/Ep.%2010%20-%20Hacking%20Basics%20-%20MD5.avi" title="Episode 10 - Hacking Basics - MD5"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="4647856" type="application/octet-stream" url="http://c3rb3r.openwall.net/mdcrack/download/MDCrack-NG.exe"/></item><item><title>Website Hacking - Sql Injection</title><link>http://hacking-trik.blogspot.com/2008/12/website-hacking-sql-injection.html</link><category>Sql Injection</category><category>Website Hacking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:39:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-5591461645029392295</guid><description>For Infinity Exists Full Disclosure’s first Website Hacking episode, we demonstrate how to exploit a security vulnerability occurring in a website’s database to extract password hashes. Sql (Structured Query Language) is a computer language designed for the retrieval and management of data in a system’s database. The Attack, known as Sql Injection, manipulates Sql statements before they are sent to the Sql Server, allowing the Attacker to create, change, or retrieve data stored in the database. Sql Injection is a hard concept to understand, so we made a video that encompasses all our knowledge on the subject to make it easier for our viewers to grasp.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%2011%20-%20Website%20Hacking%20-%20SQL%20Injection.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="450"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/wmv/Ep.%2011%20-%20Website%20Hacking%20-%20SQL%20Injection.wmv" title="Episode 11 - Website Hacking - Sql Injection"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hacking Basics - Backtrack</title><link>http://hacking-trik.blogspot.com/2008/12/hacking-basics-backtrack.html</link><category>backtrack</category><category>hacking</category><category>video</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:28:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-2963899651420824798</guid><description>On the forums, there has been many questions concerning Backtrack. Therefore, we decided to make a video that tries to answer as many as these question as possible. In this episode we cover: Where to get Backtrack 2, How to burn an .ISO file, How to boot Backtrack 2, How to login, and start the GUI interface. Also, we illustrate basic Linux commands, and how to set up your Network Interfaces.&lt;/p&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%2012%20-%20Hacking%20Basics%20-%20Backtrack.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="445"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/wmv/Ep.%2012%20-%20Hacking%20Basics%20-%20Backtrack.wmv" title="Episode 12 - Hacking Basics - Backtrack"&gt;&lt;span style="color:#9facb5;"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;/p&gt;  &lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to use Intel Pro/Wireless 3945ABG in Backtrack 2</title><link>http://hacking-trik.blogspot.com/2008/12/how-to-use-intel-prowireless-3945abg-in_05.html</link><category>Wireless 3945ABG</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:21:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-6578693549404670136</guid><description>The Intel Pro/Wireless 3945ABG (IPW3945) is a popular wireless card that is build-in many laptops. However, the drivers included in Backtrack 2 do not allow you to do packet injection. To fix this problem you need to install the IPWRAW drivers. The easy way to do this is to use Backtrack 2 module. A module adds additional components to Backtrack 2. To add a module, you copy the .LZM file into the modules folder in the BT2 .ISO. After adding the IPWRAW module to the BT2 .ISO, boot up Backtrack and click the “IPW3945 RAW load.sh” script on the desktop to install the IPWRAW Drivers. After the drivers are installed your wireless card will be lock in monitor mode, and you will be able to do packet injection with aireplay-ng. If you want to put your wireless card in managed mode and connect to a wireless network click the “IPW3945 load.sh” script on the desktop. That script will load the default IPW3945 Drivers.&lt;/p&gt; &lt;strong&gt;Video Demonstration&lt;/strong&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Vblog%20-%20IPW3945.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;&lt;a href="http://infinityexists.com/downloads/install_ipwraw.lzm"&gt;Download IPWRAW Module Here&lt;/a&gt;&lt;br /&gt;&lt;a href="http://infinityexists.com/?page_id=5&amp;amp;forumaction=showposts&amp;amp;forum=4&amp;amp;thread=116&amp;amp;start=0"&gt; Discuss Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Credit:&lt;br /&gt;IPWRAW package made by: &lt;a href="http://forums.remote-exploit.org/showthread.php?t=7260"&gt;-~operator~-&lt;/a&gt;&lt;br /&gt;Module made by: &lt;a href="http://forums.remote-exploit.org/showthread.php?t=7564"&gt;Genius&lt;/a&gt;&lt;/p&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to use Intel Pro/Wireless 3945ABG in Backtrack 2</title><link>http://hacking-trik.blogspot.com/2008/12/how-to-use-intel-prowireless-3945abg-in.html</link><category>Wireless 3945ABG</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:21:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-659523561503876568</guid><description>The Intel Pro/Wireless 3945ABG (IPW3945) is a popular wireless card that is build-in many laptops. However, the drivers included in Backtrack 2 do not allow you to do packet injection. To fix this problem you need to install the IPWRAW drivers. The easy way to do this is to use Backtrack 2 module. A module adds additional components to Backtrack 2. To add a module, you copy the .LZM file into the modules folder in the BT2 .ISO. After adding the IPWRAW module to the BT2 .ISO, boot up Backtrack and click the “IPW3945 RAW load.sh” script on the desktop to install the IPWRAW Drivers. After the drivers are installed your wireless card will be lock in monitor mode, and you will be able to do packet injection with aireplay-ng. If you want to put your wireless card in managed mode and connect to a wireless network click the “IPW3945 load.sh” script on the desktop. That script will load the default IPW3945 Drivers.&lt;/p&gt; &lt;strong&gt;Video Demonstration&lt;/strong&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Vblog%20-%20IPW3945.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;&lt;a href="http://infinityexists.com/downloads/install_ipwraw.lzm"&gt;Download IPWRAW Module Here&lt;/a&gt;&lt;br /&gt;&lt;a href="http://infinityexists.com/?page_id=5&amp;amp;forumaction=showposts&amp;amp;forum=4&amp;amp;thread=116&amp;amp;start=0"&gt; Discuss Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Credit:&lt;br /&gt;IPWRAW package made by: &lt;a href="http://forums.remote-exploit.org/showthread.php?t=7260"&gt;-~operator~-&lt;/a&gt;&lt;br /&gt;Module made by: &lt;a href="http://forums.remote-exploit.org/showthread.php?t=7564"&gt;Genius&lt;/a&gt;   &lt;/p&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Sql Injection Challenge!</title><link>http://hacking-trik.blogspot.com/2008/12/sql-injection-challenge.html</link><category>Sql Injection</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:18:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-8434228811876641284</guid><description>I’m proud to announce the first Infinity Exists’ Hacking Challenge! The challenge is to find a Sql Injection flaw in our forums, and exploit it to extract password hashes. The first person to complete this challenge will receive a free Infinity Exists T-shirt. The Sql Injection vulnerability is hidden deep in Infinity Exists’ forums, and will be much harder to find then the vulnerability demonstrated in Full Disclosure Episode 11. Tips to help you get started: &lt;ol&gt;&lt;li&gt;Watch Full Disclosure Episode 11!&lt;/li&gt;&lt;li&gt;Download Wp-Forums Source Code&lt;/li&gt;&lt;li&gt;The variable that is used to manipulate the Sql Statement is a POST variable.&lt;/li&gt;&lt;/ol&gt; Good Luck!
&lt;br /&gt;&lt;a href="http://infinityexists.com/?page_id=5&amp;amp;forumaction=showposts&amp;amp;forum=15&amp;amp;thread=176&amp;amp;start=0"&gt;&lt;/a&gt;—————————————————————————————————————————–
&lt;br /&gt;&lt;strong&gt;Update!&lt;/strong&gt;
&lt;br /&gt;marcel.romard and esc both won Infinity Exists’ Sql Injection Challenge!! Marcel.romard found the Sql injection flaw in the forum’s search that this challenge was based around. Esc found a Sql Injection flaw that we were unaware of in the forum’s RSS feed. Congrats to both of you! 
&lt;br /&gt;&lt;span class="fullpost"&gt;
&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Sql Injection Challenge How-to</title><link>http://hacking-trik.blogspot.com/2008/12/sql-injection-challenge-how-to.html</link><category>Sql Injection</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:14:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-1310263168731669592</guid><description>The Sql Injection Challenge has already been completed, so here is a video demonstration on how to find this Sql Injection flaw and exploited it to extract password hashes. In this video I use a firefox plugin ‘Data Tamper’ that can be download here&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/966"&gt;&lt;/a&gt; &lt;p align="center"&gt; &lt;/p&gt;  &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Vblog%20-%20Sql%20Injection%20Challenge.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;a href="http://infinityexists.com/videos/sql-injection-challenge-how-to/"&gt;Full Size Video&lt;/a&gt;&lt;br /&gt;Download &lt;a href="http://infinityexists.com/wmv/Vblog%20-%20Sql%20Injection%20Challenge.wmv"&gt;Here&lt;/a&gt;   &lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>SIUC’s Network</title><link>http://hacking-trik.blogspot.com/2008/12/siucs-network.html</link><category>SIUC’s Network</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:11:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-4345257122775122788</guid><description>I currently attend Southern Illinois University at Carbondale, and I am taking Digital Circuit Design with Dr. Weng who also teaches Network Processing Systems Design. Today in class he invited all his students to go a tour of SIUC’s computer network with his Network Processing Systems class. Of course I took up his often because it is not every day a regular student can walk into the core networking room and server mainframe of a large University. Basically, the network is system up on a three layer infrastructure (Core Layer, Distribution Layer, Access Layer). At the Access Layer (which is the layer that provides network access to client computers) the University uses Cisco Catalyst 2950 switches. Those switches are connected via cross-over cable to the Distribution Switch which is a Cisco Catalyst 3524. In turn, the Distribution switch connects via fiber wire to the Core Switch which is a Cisco Catalyst 6509. The entire can network runs at 1 Gigabyte; however, the internet bandwidth is capped at 300 Mb! Furthermore, only 90 Mb of bandwidth is dedicated to the Residence Halls!! All the Core Switches goto the student center where the internet point of entry is located. Also, internet traffic is filtered through a SourceFire firewall. Some more interesting networking facts: SIUC has 9 Wireless AP (I believe) which are managed by a Cisco Wireless LAN Controller, for access control they use Cisco 1111, for VPN they use Cisco VPN Concentrator 3000, and for their servers they use Sun System SunFire. A interesting security fact is that they only use SSH to configure switches remotely because the web interface has security issues. Lastly, you probably noticed that most of their networking devices are Cisco this is for compatibility reasons, they had problems in the past for using multiple vendors. Well thats about it, hope you enjoyed hearing about SIUC’s Network.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Typical Network Layout of a SIUC Building:&lt;/strong&gt; &lt;a href="http://infinityexists.com/pictures/Network%20Layout.JPG"&gt;&lt;img src="http://infinityexists.com/pictures/Network%20Layout.JPG" width="514" height="450" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;My Dorm’s Network Layout:&lt;/strong&gt; &lt;a href="http://infinityexists.com/pictures/Dorm%20Network%20Layout.JPG"&gt;&lt;img src="http://infinityexists.com/pictures/Dorm%20Network%20Layout.JPG" width="514" height="417" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Infinity Exists Featured On 60 Minutes</title><link>http://hacking-trik.blogspot.com/2008/12/infinity-exists-featured-on-60-minutes.html</link><category>hacking</category><category>trik</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 20:08:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-6531970320193666381</guid><description>CBS’s 60 Minutes ran a segment on internet insecurities and they showed the ease of finding tutorials on youtube to exploit them. They chose our video on cracking WEP to demonstrate and showed a short clip of it. The segment is up on the CBS website and you can check it out &lt;a href="http://www.cbsnews.com/sections/i_video/main500251.shtml?id=3538299n"&gt;here&lt;/a&gt;. Thank you CBS for the free publicity!&lt;br /&gt;—————————————————————————————————————————– Update - Live Stream&lt;br /&gt;&lt;object width="425" height="344"&gt;&lt;param name="movie" value="http://www.youtube.com/v/MxG2J3bf1BQ&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;feature=player_embedded&amp;fs=1"&gt;&lt;/param&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/MxG2J3bf1BQ&amp;color1=0xb1b1b1&amp;color2=0xcfcfcf&amp;feature=player_embedded&amp;fs=1" type="application/x-shockwave-flash" allowfullscreen="true" width="425" height="344"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Website Hacking - XSS</title><link>http://hacking-trik.blogspot.com/2008/12/website-hacking-xss.html</link><category>Website Hacking</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 19:03:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-6929372504308342142</guid><description>In this episode of Full Disclosure we are explaining the website attack known as Cross-Site Scripting (XSS). Cross-Site Scripting is a type of security vulnerability that affects web applications that do not sanitize user input properly. This kind of vulnerability allows an “attacker” to inject HTML or client side script like JavaScript into the website. Cross-Site Scripting is most commonly used to steal cookies. Cookies are used for authenticating, tracking, and maintaining specific information about users; therefore, by stealing a user’s cookies an attacker could bypass the website’s access control. There are three types of XSS attacks: Persistent, Non-Persistent, and DOM-Based. In this episode we will cover Persistent and Non-Persistent Cross-Site Scripting attacks.&lt;p&gt;&lt;/p&gt;&lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Ep.%2013%20-%20Website%20Hacking%20-%20XSS.flv&amp;amp;autoPlay=true&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="450" height="350"&gt;&lt;/embed&gt;&lt;p&gt;&lt;/p&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;p class="entry"&gt;Download video &lt;a href="http://infinityexists.com/wmv/Ep.%2013%20-%20Website%20Hacking%20-%20XSS.wmv" title="Episode 13 - Website Hacking - XSS"&gt;&lt;span style="color: rgb(159, 172, 181);"&gt;here&lt;/span&gt;&lt;/a&gt; (Right Click -&gt; Save Link as)&lt;/p&gt;&lt;/span&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>The 60 Minutes Effect</title><link>http://hacking-trik.blogspot.com/2008/12/60-minutes-effect.html</link><category>The 60 Minutes Effect</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 18:27:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-6853831038620524135</guid><description>As most of you already know, Infinity Exists’ Full Disclosure Ep. 2 Wep Cracking was featured on CBS’s 60 Minutes “High-Tech Heist” for about 10 seconds. Those few seconds on Nation Television gave us about 40,000 hits on YouTube, and about 750 unique hits on InfinityExists.com. Weeks after the 60 minutes episode aired Infinity Exists is still getting an average of 300 unique hits a day. This is pretty good compared to our 200 hit average before.&lt;br /&gt;&lt;br /&gt;&lt;img src="http://infinityexists.com/pictures/60.JPG" width="520" height="149" /&gt;&lt;br /&gt;&lt;br /&gt;However, 60 Minutes brought Infinity Exists to the attention of a few unwanted people.  For Example:&lt;br /&gt;&lt;br /&gt;&lt;img src="http://infinityexists.com/pictures/newtork%20location.JPG" width="315" height="145" /&gt;&lt;br /&gt;&lt;br /&gt;People that do not understand what it is to be a hacker, just simply think we are criminals. A Hacker truly is a computer enthusiast that enjoys exploring various computer systems in the pursuit to gain more knowledge. A hacker’s goal is never to harm anyone or anything as the media would like you to believe. The goal of Infinity Exists’ video series Full Disclosure is to inform people about specific security flaws. If there was no one to disclose this information to the general public then everyone would still being using insecure technology and would be at the mercy of criminal crackers.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Exploit Hacking</title><link>http://hacking-trik.blogspot.com/2008/12/exploit-hacking.html</link><category>backtrack</category><category>Exploit Hacking</category><category>trik</category><category>tutorial</category><category>video</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 18:26:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-2103940000201420336</guid><description>Since Infinity Exists hasn’t had time to release a new episode, I decided to revamp a two part series, Exploit Hacking and Exploit Hacking 2 - Privilege Escalation, that I made a year before Infinity Exists was created. It may be a little dated, but it provides great information on how a hacker can find an vulnerability on a remote computer and exploit it to gain remote access. Also, the video shows how a hacker can raise their privileges on the remote machine to administrator. I added text throughout the video to make it easier to understand. Furthermore, Infinity Exists plans to do a more up-to-date and more detailed series of episodes on “exploit hacking.”&lt;br /&gt;&lt;br /&gt;&lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Video%20Archive%20-%20Exploit%20Hacking.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;br /&gt;&lt;a href="http://infinityexists.com/videos/video-archive-exploit-hacking/"&gt;Full Scale Video Here&lt;/a&gt;&lt;br /&gt;&lt;a href="http://infinityexists.com/wmv/Video%20Archive%20-%20Exploit%20Hacking.wmv"&gt; Download Here&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>USB Worm (Jamesgo.dll)</title><link>http://hacking-trik.blogspot.com/2008/12/usb-worm-jamesgodll.html</link><category>USB Worm (Jamesgo.dll)</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 18:24:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-4483555260945649435</guid><description>The other day my computer was infected by a USB Worm known as Jamesgo.dll. I received the virus when I inserted my girlfriend’s USB thumb drive. The worm modified the autorun.inf file on the thumb drive, so it was able to automatically transfer itself to all my hard disk drives (&lt;a href="http://infinityexists.com/downloads/Jamesgo/AUTORUN.inf.txt"&gt;Click Here to view autorun.inf&lt;/a&gt;). There is little information on the internet about this virus, so I had to figure out my own way to remove it. By analyzing the autorun.inf (which the virus cleverly changed to a system hidden file, and later I found out that it modified the registry so system hidden files are never displayed) I disclovered that each drive contains the Visual Basic Script, test.vbs (&lt;a href="http://infinityexists.com/downloads/Jamesgo/test.vbs.txt"&gt;Click Here to view Test.vbs&lt;/a&gt;). Basically what the file does is copies test.bat, test.reg, autorun.inf, autorun.ico, and itself to every hard disk in the system. Also, it runs every 60 seconds, so if you delete it from one drive in 60 seconds it will recopy itself from a different drive. Futhermore, the test.reg simply edits the registry so test.bat runs on start up and prevents system hidden files from being displayed. Test.bat runs the VB script and changes the files to system,hidden,achieved, and read-only (&lt;a href="http://infinityexists.com/downloads/Jamesgo/test.reg.txt"&gt;Click Here to view Test.reg&lt;/a&gt; and &lt;a href="http://infinityexists.com/downloads/Jamesgo/test.bat.txt"&gt;Click Here to view Test.bat&lt;/a&gt;). To remove the virus I crafted a batch file changes all the test files and autorun to normal files (attrib -s -h -r test.*, attrib -s -h -r autorun.*), and then deleted them. Since the batch file can delete all the files quickly it does not have a chance to recopy itself to all the disk drives. Also, I manually removed all entires of test.bat from the registry (&lt;a href="http://infinityexists.com/downloads/Jamesgo/Kill%20Jamesgo.bat.txt"&gt;Click Here to view Fix&lt;/a&gt;)&lt;br /&gt;&lt;br /&gt;To prevent a USB Worm from infecting your computer:&lt;br /&gt;1) Goto Start -&gt; Run&lt;br /&gt;2) Type “gpedit.msc” (This is the group policies editor)&lt;br /&gt;3) Click “Administrative Templates” under Computer Configuration&lt;br /&gt;4) Then click “System”&lt;br /&gt;5) Select “Turn off Autoplay”&lt;br /&gt;6) Set it to “Enable” and choose to “Turn off Autoplay on All Drives”&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In conclusion, the Jamesgo.dll USB Worm is not a risk for your computer, but it is really annoying! Also, it is a perfect example on how easy it is to create a Worm for travels though removal media. If you want to mess around and modify the Jamesgo.dll script you can download it &lt;a href="http://infinityexists.com/downloads/Jamesgo/Jamesgo.zip"&gt;here&lt;/a&gt;.  If you want to learn more on how to use Autorun and Batch files to create a “Auto Hacking USB Thumb Drive” go &lt;a href="http://irongeek.com/i.php?page=videos/creating-an-auto-hack-usb-drive-using-autorun-and-batch-files"&gt;here&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;Interesting Note: The Jamesgo.dll USB Worm was created in the Philippines which is stated in test.vbs, and the Thumb Drive that infected my computer was purchased in the Philippines and brought back to the US by my girlfriend’s mother.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Staying Secure - SSH Tunnel</title><link>http://hacking-trik.blogspot.com/2008/12/staying-secure-ssh-tunnel.html</link><category>Staying Secure - SSH Tunnel</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 11:12:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-1051811949588382366</guid><description>The wait is finally over! This new episode of Full Disclosure shows you how to use a SSH Tunnel to secure your data when you are on an untrusted LAN (ex. Coffee Shop, School’s network, or Defcon). Furthermore, you can use the SSH Tunnel to bypass the LAN’s internet filters. The SSH tunnel protocol works by encapsulates your data into an encrypted payload and transmitting it to the SSH Server which is setup on a trusted LAN.&lt;br /&gt;&lt;br /&gt; Live Stream &lt;a href="http://infinityexists.com/videos/episode14/"&gt;Here&lt;/a&gt;&lt;br /&gt;Download &lt;a href="http://infinityexists.com/wmv/Ep.%2014%20-%20Staying%20Secure%20-%20SSH.wmv"&gt;Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Links:&lt;br /&gt; &lt;a href="http://sshwindows.sourceforge.net/"&gt;OpenSSH for Windows&lt;/a&gt;, &lt;a href="http://www.chiark.greenend.org.uk/%7Esgtatham/putty/"&gt;Putty&lt;/a&gt;, &lt;a href="http://www.proxifier.com/"&gt;Proxifier&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Wireless Hacking - Cracking WPA</title><link>http://hacking-trik.blogspot.com/2008/12/wireless-hacking-cracking-wpa.html</link><category>backtrack</category><category>hacking</category><category>Wi-Fi</category><category>wireless</category><category>WPA</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 11:06:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-1767068559160393736</guid><description>This episode of Full Disclosure illustrates the progress of Cracking weak WPA Preshared Keys. Before you can crack the Preshared Key you must capture the four way handshake between the Access Point and a client; to accomplish this you must force the client to reconnect to the AP with the DeAuthentication attack we showed in episode 3. If you are using the Linksys WUSB54GC you will have to update your drivers to &lt;a href="http://homepages.tu-darmstadt.de/%7Ep_larbig/wlan/rt73-k2wrlz-2.0.1.tar.bz2"&gt;RaLink RT73 USB Enhanced Driver&lt;/a&gt;. In this episode we show you how to do this, and I also made a Backtrack module to automate the process. The module works in the same way as the IPWRAW Module for the Intel Pro/Wireless 3945ABG card, so you can watch that Vblog if you are having troubles.&lt;br /&gt;&lt;br /&gt;Live Stream &lt;a href="http://infinityexists.com/videos/episode16/"&gt;Here&lt;/a&gt;&lt;br /&gt;Download &lt;a href="http://infinityexists.com/wmv/Ep.%2016%20-%20Wireless%20Hacking%20-%20Cracking%20WPA.wmv"&gt;Here&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Download RT73 Module &lt;a href="http://infinityexists.com/downloads/rt73.lzm"&gt;Here&lt;/a&gt;&lt;br /&gt;Watch IPWRAW Vblog &lt;a href="http://infinityexists.com/2007/10/25/how-to-use-intel-prowireless-3945abg-in-backtrack-2/"&gt;Here&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Singing Tesla Coil</title><link>http://hacking-trik.blogspot.com/2008/12/singing-tesla-coil.html</link><category>trik</category><category>video</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 11:04:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-7861129555558711912</guid><description>This weekend was UIUC’s annual Engineer Open House, and last night there was a Singing Tesla Coil show. The Tesla coils were built by Steve Ward, a EE student at UIUC. “Steven has developed Tesla Coils with high levels of control allowing audio modulation of their lightning-like display. Interfacing the Continuum Fingerboard with this technology will generate a musically expressive and highly energetic, multi-voiced performace” (EOH Exhibit Guide).&lt;br /&gt; &lt;embed src="http://infinityexists.com/flv/flvplayer.swf" flashvars="&amp;amp;MM_ComponentVersion=1&amp;amp;file=http://infinityexists.com/flv/Vblog%20-%20EOH%20Singing%20Tesla%20Coil.flv&amp;amp;autoStart=false&amp;amp;autoRewind=false" quality="high" scale="noscale" name="FLVPlayer" salign="LT" type="application/x-shockwave-flash" pluginspage="http://www.macromedia.com/go/getflashplayer" width="520" height="340"&gt;&lt;/embed&gt;&lt;br /&gt;Full Scale Video &lt;a href="http://infinityexists.com/videos/singing-tesla-coil/"&gt;Here&lt;/a&gt;&lt;br /&gt;Download &lt;a href="http://infinityexists.com/wmv/Vblog%20-%20EOH%20Singing%20Tesla%20Coil.wmv"&gt;Here&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>McAfee SiteAdvisor</title><link>http://hacking-trik.blogspot.com/2008/12/mcafee-siteadvisor.html</link><category>McAfee</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 5 Dec 2008 11:01:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-8459279250782697539.post-2047226065754945367</guid><description>An anonymous viewer brought to my attention that McAfee’s so called “SiteAdvisor” had labeled Infinityexists.com with the big evil red X&lt;br /&gt;&lt;img src="http://infinityexists.com/pictures/Mcaffee_Site%20Advisor1.JPG" /&gt;&lt;br /&gt;It turns out that McAfee SiteAdvisor scanned Infinity Exists and found the Jamesgo.dll Worm, which I uploaded so you guys can see how it works. Not only is the virus zipped to prevent anyone from accidentally running it, but also, there is an explanation on how to remove the virus in the blog post.&lt;br /&gt;&lt;img src="http://infinityexists.com/pictures/Mcaffee_Site%20Advisor2.JPG" /&gt;&lt;br /&gt;(I have to agree with the Nuisance ‘O Meter.  Jamesgo is definitely an 8!)&lt;br /&gt;&lt;br /&gt;Don’t get my wrong, I think it is a good idea for McAfee to try to inform non-techie computers users that those free screensavers are going to mess up their computer. I just think McAfee should take into account the content of the website instead of just blindly scanning the internet for viruses. Now people interested in computer hacking will be disinclined to visit Infinity Exists because they’ll see this:&lt;br /&gt;&lt;img src="http://infinityexists.com/pictures/Mcaffee_Site%20Advisor3.JPG" /&gt;&lt;br /&gt;Well anyways, that my rant on &lt;a href="http://www.siteadvisor.com/sites/infinityexists.com?domain=infinityexists.com&amp;amp;ref=safe"&gt;McAfee SiteAdvisor&lt;/a&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>