• Ethical hacking

    Bluetooth Hacking Tools Part – I

    by  • March 24, 2009 • Bluebugging, Bluejacking, Bluesnarfing, Bluetooth hacking, Ethical hacking, Tools • 1 Comment

    There are some tools essential for bluetooth hacking purpose: 1. BlueScanner: In this the tool hacker searches for bluetooth enable device. After that it will try to extract as much information as possible for each newly discovered device . 2. BlueSniff: Blue Sniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. 3. […]

    Read more →

    Firewall Responses Detection & Breaking The Firewalls

    by  • March 23, 2009 • Exclusive, Firewalls Breaking, Student Series • 1 Comment

    The behavior of packets and its responses explained last post has been noted by a number of firewall vendors. By understanding such enumerations,  the have modified their security system’s for high anonymity by spoofing the source address of the RST/ACK packet to be that of the target host. As such, the response received by an […]

    Read more →

    Firewalk Attack: Beyond The Boundaries of Security.

    by  • March 21, 2009 • Amol Wagh, Black Hat, Ethical hacking, Exclusive, Student Series • 0 Comments

    Firewalk which was developed by two masterminds known as developed by Mike Schiffman and Dave Goldsmith furthers the techniques used both by static port traceroutes and hping. It can be successfully implemented to scan a host downstream from a security gateway to assess what rules relate to the target system, without any packets having to […]

    Read more →


    by  • March 20, 2009 • Bluetooth hacking, Ethical hacking • 1 Comment

    Bluetooth  is wireless technology of data and voice. It requires very low power .It has range from  10m-100m.It can transfer upto 1Mb/s of data. What is blue-tooth hacking ? Blue-tooth hacking is hacking the other device without the knowing that device.It is also know as Bluesnarfing. Blue-tooth hacking not only limited to cell phones ,but […]

    Read more →

    Reverse Connection for Bypassing The Firewall

    by  • December 3, 2008 • Ethical hacking, Vulnerabilities • 0 Comments

    If you use reverse connection you can also bypass Hardware Firewalls. The reverse connection is nothing more than the target server connect to the client instead of the client connect to the target server: Client:20 <——- Target Server:30 Target Server:30 ——–> Client:20 A bi-directional connection between 2 sides has been established. Normally Hardware firewalls only […]

    Read more →

    IP Spoofing Attack

    by  • November 1, 2008 • Amol Wagh, Black Hat, Ethical hacking, Exclusive, IP, Network Security • 2 Comments

    Internet Protocol i.e IP addresses are unique and used for digital data communication for internet. Any mailing system or website technology works on the same principle of digital communication. Every computer connected to Network have its unique IP address. When Person A sends an email  to person B, The mail is assigned with the header […]

    Read more →