Tag Archives: attacker

Recommended Attacker

How To Use DeAuth To Hack Into A WiFi Network

UPDATE: Looks like this video is no longer available but you can refer to our guide on “How to Crack Wep” instead.

Have you noticed that your neighbor locked his wireless network down recently? Well, now you can get back on his network and have some fun doing things that you would never do on your own IP address.

A DeAuth

Click Here to Read Full Article

Leave a comment

Arduino DIY – How to Make a “Binary” Keyless Entry System using Servo Motors!

video://www.youtube.com/watch?v=GU8Ej0c2R14

Well, I have been busy yesterday and today with bunch of clients working on various different projects.

Anyways, here’s a great DIY on how to make your own keyless entry system using Arduino and servos.

Of course, the best part about the keyless entry system is that it uses “binary” code in which the user must 

Click Here to Read Full Article

Leave a comment

Memory Hack – How to Hack Encryption Keys by Freezing Memory!

video://www.youtube.com/watch?v=JDaicPIgn9U

Here’s a nice example of how hackers can easily freeze memory of the computer to retrieve the encryption key.

Abstract Contrary to popular assumption, DRAMs used in most modern computers retain their contents for seconds to minutes after power is lost, even at operating temperatures and even if removed from a motherboard. Although DRAMs become less reliable when they are not refreshed, they are not immediately erased, and their contents persist sufficiently for malicious (or forensic) acquisi

Click Here to Read Full Article

Leave a comment

Stun Gun with Flashlight!

Definitely in today’s society, you might want to consider getting a Stun Gun to protect yourself.  Of course, a gun can do the same job but it may kill someone while the Stun Gun doesn’t.

This Stun Gun is made of high quality ABS engineered plastic, this unit functions as a very powerful high voltage (200K) shock generator and a extremely bright flashlight in a very small and light weight

Click Here to Read Full Article

2 Comments