Finding and Using Browser-saved Passwords: Another video from Starry Sky

This entry is part 3 of 32 in the series [ Hacker Night School ]

Yeah, we all do it, right? We let our browser store our passwords for all those sites we visit every day. It’s easy, it’s convenient, and it’s really easy to hack. Starry shows us how to reveal these passwords, swipe them and use them in another browser. Plus: he demos what you can do about …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a VPN ]

This entry is part 5 of 32 in the series [ Hacker Night School ]

Starry Sky and Glenn Norman discuss using a VPN or proxy server https://youtu.be/7CCuE5oobMQ Now take the Quiz: 1. What of these statements is the most accurate description of a proxy. a. Hides your IP address b. Makes it look like you’re coming from a different IP address c. Makes your web traffic (ports 80 and …

TechRepublic’s “The hacking toolkit: 13 essential network security utilities”

I won’t speak for every hacker, but this hacker loves tools. Especially tools that tell me interesting things, even small, incremental things that lead me to larger discoveries. So I’m quick to leap on articles like this one: http://www.techrepublic.com/pictures/the-hacking-toolkit-13-essential-network-security-utilities/ Here’s the list: The Social-Engineer Toolkit: Hacking Layer 8 (http://www.social-engineer.org) Metasploit: Packaging up all those handy …

[ Hacker Night School ] :: Encoding and Decoding: Base64, ASCII, etc.

This entry is part 27 of 32 in the series [ Hacker Night School ]

Encoding and Decoding: It’s Not Encryption There’s a form of hiding data that isn’t exactly encryption; it’s just simple encoding into another format that most people won’t be able to read. FTP passwords, for example, are encoded in FileZilla using Base 64 format. Hexadecimal Encoding This simply involves taking 8-bit (one Byte) information and splitting …

[ Hacker Night School ] :: [ Hiding Your Ass ] :: [ Using a Proxy Server ]

This entry is part 6 of 32 in the series [ Hacker Night School ]

One of the trickiest things about hacking is knowing what kind of anonymity tool to use, when. If what you are doing involves only the Internet (i.e. web pages and web sites), the right anonymity tool is a proxy server. “Proxy” means “stand-in” or “intermediary” (look it up; research is your specialty, right?), and a …