Wednesday, February 16, 2011

CrazyEngineers Forum - Computer Science & IT Engineering

CrazyEngineers Forum - Computer Science & IT Engineering


slashfear's phishing live demo!!

Posted: 15 Feb 2011 12:39 PM PST

Hi guys!!

This time I am back with phishing ;) this video shows you how phishing works!! this is for education purpose only.......

NOTE: THIS IS FOR AWARENESS AND EDUCATION PURPOSE ONLY AND I WILL NOT TAKE ANY CLAIM FOR YOUR ACTIONS!!

Following are the technical details:

SCRIPTING LANGUAGE USED: HTML, PHP

Here is the video I made...... Hope you enjoy it!!



WARNING: PLEASE DO NOT TRY THIS.... IT WILL CAUSE YOU SERIOUS TROUBLE!!!

Bottom line when ever your asked to login into gmail or any other mail client please check the url before you jump in and type your user name and password!! ;)


-Arvind

Password retrieval in lost or stolen iPhones/iPads [Video Inside]

Posted: 15 Feb 2011 03:21 AM PST

Scientists at the Fraunhofer Institute for Secure Information Technology (SIT) test laboratory in Germany have shown how someone who steals or finds an iPhone or iPad can use existing software to "jailbreak" the device and gain access to the command shell. A secure shell (SSH) server can then be installed to enable them to run their own software on the device. Both procedures can be carried out even if the device is locked.
The attackers can then upload a script to the device to use the device's own tools to give them access to the keychain, which is Apple's password management system. The keychain entries can then be downloaded to the attacker's computer.


The attack is successful because in the current operating system in "i" devices (iOS) large parts of the file system are accessible even if the device is locked, and the cryptographic key is not protected by the passcode.






Information Source: physorg.com

Computer Forensics & Investigation: A different career option

Posted: 15 Feb 2011 03:02 AM PST

No comments:

Post a Comment