MITM Attack with ARP Poisoning

Today I'm trying out ARP poisoning to do a MITM attack. MITM stands for Main in the Middle. This type of attack simply is a form of active eavesdropping. The attacker make connections between victims, and relay all traffic between them. From the victim's point of view, it appears as…

Read this article

All your keypress are belong to us

Some background for this post: I'm doing the Computer Security & Forensics course at Leeds Metropolitan University. In a module that we are doing at this moment is called Digital Security Landscape. For this module, all practical work are done in the specialist (sandboxed) computer labs where we use a…

Read this article

John the Ripper on Linux

compiling John the Ripper with multicore support on Linux Following on from my OSX guide, this one is for Linux. This was done on Ubuntu 13.04 so this guide is based on that. It should be fairly similar enough for 12.04 LTS but if I get the chance…

Read this article

John the Ripper on OSX

Compiling John the Ripper with OpenCL and CUDA and multicore CPU support on OSX If you was to head over to the John the Ripper site and downloaded John the Ripper, you'll find that by default it only run on a single core. However with modern systems having multiple cores…

Read this article

welcome

With thanks to Craig over at legobot who mentioned Ghost on Twitter leading me to try it out. Luckily for me, its public release was the next day! I've previously used Wordpress, but it's far too bloated for me. I just want to make simple posts, mainly stuff I've done…

Read this article