One thing I quickly learned to love in Linux is Workspaces, being a dual monitor guy I thought it was a neat feature for those who don’t have a secondary monitor, or when you’re on the go and without a second for your mobile workstation. Being the tech I am, I took to Google and found a free Windows version of Workspaces, Desktops. Develeoped by Sysinternals, Desktops allows the use of 4 virtual desktops. Continue reading
Any version of Windows with IPv6 installed and running is vulnerable to a DoS attack by sending thousands of Router Assignment (RA) packets. This vulnerability has been known since mid 2010, and you’re not the only one wondering why this hasn’t been patched yet. Here is a video demonstrating the attack on a LAN with 7, XP and virtual machines.
So as you can imagine, I wanted to give this a shot. I setup my VLAN and was astonished by the simplicity of the attack. Continue reading
Broadcasting the SSID of your router is the same as you audibly telling everyone your name right? So, it would be better if someone needed to know your name and the secret handshake to gain access to the WLAN… right? Continue reading
Previously, I gave you a quick run-down on cracking a WPA secured network, today I will be showing you how easy it is to crack a WEP secured network. Today’s lab is a Cisco E2100L, 64bit Open, and running dd-wrt. There are no clients on the network, but if there were clients on the network, I would still opt for the active attack.
Your card must support monitor mode and packet injection! If your laptop is relatively new, don’t expect BackTrack to work out of the box. Consult Aircrack-ng’s wiki for details regarding compatibility. The command parameters in this guide should be self explanatory (with the aid of screenshots), but that information can also be found in the wiki. Continue reading
Malwarebytes Corporation is widely known for its (free) standalone anti-virus scanner, Malwarebytes Anti-Malware (MBAM); having used it for nearly every virus removal, I have found it to be light-weight, easy-to-use, and it removes the bad guys 99% of the time. I run MBAM PRO on some of my personal machines and my family’s machines. My personal laptop sees various anti-malware applications on a regular basis. MBAM is just one of the few anti-malware scanners I recommend.
The free version is an on-demand scanner, so you will not see scheduled tasks, real-time protection, or their new feature, a flash memory scanner… Alright, enough inadvertent advertising, let’s talk about MBAM.
One of Windows’ inconvenient limitations is the lack of VHD support, namely, being able to attach the VHD on startup automatically; the way around this is fairly easy and unobtrusive to the user, without the need to install third-party software. We will be utilizing Task Scheduler. Continue reading
In some scenarios, you may want to change/spoof (or clone) your MAC address; this task is easily accomplished within Backtrack: Open Terminal and run the following commands. Replace wlan0 with your specific interface (run ifconfig).
ifconfig wlan0 down macchanger --mac 00:11:22:33:44:55 wlan0
Reboot the computer to restore your MAC address. Note you will not be able to use reserved addresses, broadcast, etcetera.