zer0trusion-blog
zer0trusion-blog
Zer0 Security
53 posts
In a world where internet and being connected is everything, hacker is king.
Don't wanna be here? Send us removal request.
zer0trusion-blog · 13 years ago
Link
• use a CD-R to boot (even better: a Pocket CD-R as you can carry them around more easily, but they are harder to come by nowadays) • CD-Rs have digits and characters carved/lasered/whatevered into their inner ring close to the center which are probably unique to every disc: memorize those and...
10 notes · View notes
zer0trusion-blog · 13 years ago
Link
The reign of secure WPA/WPA2 network encryption is now over. It no longer takes decades to crack thanks to Tactical Network Solutions. Their brilliant team have found a weakness in WPA that lets an attacker bruteforce against Wifi Protected Setup (WPS) PINS in order to then recover the WPA/WPA2 key. We'll be using a tool which exploits this bug called reaver. Check the link for this in action!
10 notes · View notes
zer0trusion-blog · 13 years ago
Note
excellent blog. please post more often!
Thanks a lot, www.zer0trusion.com is getting updated a lot more now!
0 notes
zer0trusion-blog · 13 years ago
Video
youtube
Basic Network Attack demonstration (Man in the middle), Watch this full screen!
6 notes · View notes
zer0trusion-blog · 14 years ago
Link
streakmachine:
Very impressive work and once more proves that security is such a broad subject that there are always new ways of doing things and new, very clever methods discovered.
Perhaps now it’s high time to keep the smartphone at some distance away from the keyboard, huh? (I’m joking, this is still just proof-of-concept)
12 notes · View notes
zer0trusion-blog · 14 years ago
Link
Distributed Denial of Services (DDoS) attacks are now way into a new era, so I'd like to just document this fact. This shift from an old to new era has come about following the great success of commercial cloud computing, such as Amazon's Elastic Compute Cloud.
32 notes · View notes
zer0trusion-blog · 14 years ago
Link
Remaining anonymous and under the radar is essential practice for an attacker. In this article I will show the various ways this is done and demonstrate in detail the tools used to accomplish this.
10 notes · View notes
zer0trusion-blog · 14 years ago
Link
I wrote this article because I realised loads of people on google were asking how to crack a wpa key without using a pre-made dictionary, so this is how :)
70 notes · View notes
zer0trusion-blog · 14 years ago
Text
yourinfonow:
FoxNews.com’s Twitter feed for political news, FoxNewspolitics, was hacked early Monday morning.
Hackers sent out several malicious and false tweets claiming that President Obama had been assassinated. Those reports were incorrect, of course, and the president was spending the July 4 holiday with his family at the White House.
Read more: http://www.foxnews.com/politics/2011/07/04/foxnewspolitics-twitter-feed-hacked/#ixzz1RAWuBBGZ
Foxnewspolitics Twitter Feed Hacked
2 notes · View notes
zer0trusion-blog · 14 years ago
Link
7 notes · View notes
zer0trusion-blog · 14 years ago
Link
12 notes · View notes
zer0trusion-blog · 14 years ago
Video
youtube
I found away to make views from my youtube videos without evening being a youtube partner. It's working, I'm literally making money today so it's awesome :)
61 notes · View notes
zer0trusion-blog · 14 years ago
Link
0 notes
zer0trusion-blog · 14 years ago
Photo
Tumblr media
I love the Ubuntu Linux operating system. Firstly it's free! Secondly, no viruses because Linux is very secure. It also requires less resources from your computer and runs a lot faster. It won't slow down over time. It's so easy to use people just have to try it out...
0 notes
zer0trusion-blog · 14 years ago
Video
youtube
I video I made on how to be anonymous online.
13 notes · View notes
zer0trusion-blog · 14 years ago
Link
19 notes · View notes
zer0trusion-blog · 14 years ago
Video
youtube
Armitage provides a front-end to exploit framework #Metasploit. It visualises the targets and uses db_autopwn to exploit machines as quick as possible. It then lets you pivot from machine to machine allowing you to get deeper and deeper into a network.
10 notes · View notes