Script kiddies are always looking for new exploits which are unknown to the public, and hence particularly effective. Such exploits are leaked from research labs or given to script kiddies by insiders; they are then used to compromise a large number of hosts on the Internet. Script kiddies are often young, and can evolve into honest programmers later in life.
In 1999, NetBus (a software program for remotely controlling a Microsoft Windows computer system over a network as a backdoor.) was used by script kiddie to plant child pornography on the work computer of Magnus Eriksson, a law scholar at Lund University, Sweden. About 3,500 images were discovered by system administrators, and Eriksson was assumed to have downloaded them knowingly. Eriksson lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.
Friday 16 December 2005
The truth about Magnus Eriksson and NetBus
Script kiddies are always looking for new exploits which are unknown to the public, and hence particularly effective. Such exploits are leaked from research labs or given to script kiddies by insiders; they are then used to compromise a large number of hosts on the Internet. Script kiddies are often young, and can evolve into honest programmers later in life.
In 1999, NetBus (a software program for remotely controlling a Microsoft Windows computer system over a network as a backdoor.) was used by script kiddie to plant child pornography on the work computer of Magnus Eriksson, a law scholar at Lund University, Sweden. About 3,500 images were discovered by system administrators, and Eriksson was assumed to have downloaded them knowingly. Eriksson lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.
In 1999, NetBus (a software program for remotely controlling a Microsoft Windows computer system over a network as a backdoor.) was used by script kiddie to plant child pornography on the work computer of Magnus Eriksson, a law scholar at Lund University, Sweden. About 3,500 images were discovered by system administrators, and Eriksson was assumed to have downloaded them knowingly. Eriksson lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.
The truth about Magnus Eriksson and NetBus
Script kiddies are always looking for new exploits which are unknown to the public, and hence particularly effective. Such exploits are leaked from research labs or given to script kiddies by insiders; they are then used to compromise a large number of hosts on the Internet. Script kiddies are often young, and can evolve into honest programmers later in life.
In 1999, NetBus (a software program for remotely controlling a Microsoft Windows computer system over a network as a backdoor.) was used by script kiddie to plant child pornography on the work computer of Magnus Eriksson, a law scholar at Lund University, Sweden. About 3,500 images were discovered by system administrators, and Eriksson was assumed to have downloaded them knowingly. Eriksson lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.
In 1999, NetBus (a software program for remotely controlling a Microsoft Windows computer system over a network as a backdoor.) was used by script kiddie to plant child pornography on the work computer of Magnus Eriksson, a law scholar at Lund University, Sweden. About 3,500 images were discovered by system administrators, and Eriksson was assumed to have downloaded them knowingly. Eriksson lost his research position at the faculty, and following the publication of his name fled the country and had to seek professional medical care to cope with the stress. He was acquitted from criminal charges in late 2004, as a court found that NetBus had been used to control his computer.
Saturday 5 November 2005
Wireless custom frame generation
Wireless custom frame generation - these allow layer two attacks on wireless LANs including a variety of man-in-the-middle attacks and unstoppable denial of service. | ||
AirJack26 | Local mirror | v 0.1a |
AirJack | Local mirror | v 0.6.6b |
chopchop | Local mirror | v 0.1 |
Dissassociate | Local mirror | v |
FakeAP | Local mirror | v 0.3.2 |
FakeAP BSD | Local mirror | v 0.3.1 |
FataJack | Local mirror | v |
File2Air | Local mirror | v 0.1 |
Libradiate | Local mirror | v 0.02 |
Libwlan | Local mirror | v 0.1 |
Omerta | Local mirror | v |
Wifitap | Local mirror | v 0.2.0 |
Void11 | Local mirror | v 0.2.0 |
Wireless custom frame generation
Wireless custom frame generation - these allow layer two attacks on wireless LANs including a variety of man-in-the-middle attacks and unstoppable denial of service. | ||
AirJack26 | Local mirror | v 0.1a |
AirJack | Local mirror | v 0.6.6b |
chopchop | Local mirror | v 0.1 |
Dissassociate | Local mirror | v |
FakeAP | Local mirror | v 0.3.2 |
FakeAP BSD | Local mirror | v 0.3.1 |
FataJack | Local mirror | v |
File2Air | Local mirror | v 0.1 |
Libradiate | Local mirror | v 0.02 |
Libwlan | Local mirror | v 0.1 |
Omerta | Local mirror | v |
Wifitap | Local mirror | v 0.2.0 |
Void11 | Local mirror | v 0.2.0 |
Wireless custom frame generation
Wireless custom frame generation - these allow layer two attacks on wireless LANs including a variety of man-in-the-middle attacks and unstoppable denial of service. | ||
AirJack26 | Local mirror | v 0.1a |
AirJack | Local mirror | v 0.6.6b |
chopchop | Local mirror | v 0.1 |
Dissassociate | Local mirror | v |
FakeAP | Local mirror | v 0.3.2 |
FakeAP BSD | Local mirror | v 0.3.1 |
FataJack | Local mirror | v |
File2Air | Local mirror | v 0.1 |
Libradiate | Local mirror | v 0.02 |
Libwlan | Local mirror | v 0.1 |
Omerta | Local mirror | v |
Wifitap | Local mirror | v 0.2.0 |
Void11 | Local mirror | v 0.2.0 |
Friday 4 November 2005
Wireless-specific encryption cracking
Wireless-specific encryption cracking - tools for gaining access to protected wireless networks. At the moment include WEP crackers, WEP-encrypted traffic injectors and practical implementations of attacks against certain 802.1x types. | ||
Airsnort | Local mirror | v 0.2.7e |
Aircrack | Local mirror | v 2.41 |
Asleap | Local mirror | v 1.4 |
BSD-airtools (dwepcrack) | Local mirror | v 0.2 |
coWPArty | Local mirror | v 2.0 |
Leap | Local mirror | v |
anwrap (Leapcrack) | Local mirror | v 0.1 |
LucentRegCrypto | Local mirror | v 0.3 |
THC-LEAPcracker | Local mirror | v 0.1 |
weplab | Local mirror | v 0.1.5 |
WEP_Tools | Local mirror | v |
WepAttack | Local mirror | v 0.1.3 |
WepDecrypt | Local mirror | v 0.7 |
WEPcrack | Local mirror | v 0.1.0 |
WEPWedgie | Local mirror | v 0.1.0 |
Wnet (reinj) | Local mirror | v |
WPA Cracker | Local mirror | v 0.1 |
Wireless-specific encryption cracking
Wireless-specific encryption cracking - tools for gaining access to protected wireless networks. At the moment include WEP crackers, WEP-encrypted traffic injectors and practical implementations of attacks against certain 802.1x types. | ||
Airsnort | Local mirror | v 0.2.7e |
Aircrack | Local mirror | v 2.41 |
Asleap | Local mirror | v 1.4 |
BSD-airtools (dwepcrack) | Local mirror | v 0.2 |
coWPArty | Local mirror | v 2.0 |
Leap | Local mirror | v |
anwrap (Leapcrack) | Local mirror | v 0.1 |
LucentRegCrypto | Local mirror | v 0.3 |
THC-LEAPcracker | Local mirror | v 0.1 |
weplab | Local mirror | v 0.1.5 |
WEP_Tools | Local mirror | v |
WepAttack | Local mirror | v 0.1.3 |
WepDecrypt | Local mirror | v 0.7 |
WEPcrack | Local mirror | v 0.1.0 |
WEPWedgie | Local mirror | v 0.1.0 |
Wnet (reinj) | Local mirror | v |
WPA Cracker | Local mirror | v 0.1 |
Wireless-specific encryption cracking
Wireless-specific encryption cracking - tools for gaining access to protected wireless networks. At the moment include WEP crackers, WEP-encrypted traffic injectors and practical implementations of attacks against certain 802.1x types. | ||
Airsnort | Local mirror | v 0.2.7e |
Aircrack | Local mirror | v 2.41 |
Asleap | Local mirror | v 1.4 |
BSD-airtools (dwepcrack) | Local mirror | v 0.2 |
coWPArty | Local mirror | v 2.0 |
Leap | Local mirror | v |
anwrap (Leapcrack) | Local mirror | v 0.1 |
LucentRegCrypto | Local mirror | v 0.3 |
THC-LEAPcracker | Local mirror | v 0.1 |
weplab | Local mirror | v 0.1.5 |
WEP_Tools | Local mirror | v |
WepAttack | Local mirror | v 0.1.3 |
WepDecrypt | Local mirror | v 0.7 |
WEPcrack | Local mirror | v 0.1.0 |
WEPWedgie | Local mirror | v 0.1.0 |
Wnet (reinj) | Local mirror | v |
WPA Cracker | Local mirror | v 0.1 |
Tuesday 4 October 2005
Wireless Network Discovery, Mapping and Traffic Analysis
Wireless Network Discovery, Mapping and Traffic Analysis
Wireless Network Discovery, Mapping and Traffic Analysis
Subscribe to:
Posts (Atom)