Hey guys,
So today I am going to talk about lockpicking. I have been lockpicking for about 2 years now. When I first learned how, I was so excited. Then I realized that if I could learn how, anyone could. Then I lost my sense of security :P
So lock picking is a pretty simple thing to do. You need the tools of course. The most basic things you need are a pick, and a tension wrench.
Ignore the actual lock mechanism in this picture, but the tools themselves are clearly labeled. A pick is used to actually move the tumblers in a lock up and down. The tension wrench is used to slightly twist the lock chamber so that when you move a tumbler up and above the shear line, it gets stuck in the unlock position.
So essentially what you do once you have the tools is this:
1) insert the tension wrench into the lock and apply a slight clockwise pressure to the lock chamber
2) insert the pick into the chamber and feel for the tumblers(pins).
3) start by pushing the first tumbler up and releasing it. It will either catch, or drop back down.
4) Now you just do step 3 on each tumbler. There is always a certain order that pins will catch in (but it is always random) so you will have to try each pin until it sticks. Remember the tension wrench (its pressure) is what is causing the tumblers to stick. If none of the pins seem to be sticking try adding or lessening the pressure.
Now that you have my instructions and are probably confused, here is a link* to a Youtube video which shows the process in action.
*note: The guy in this vid uses a technique known as raking, which is faster, but doesn't work for all locks. Beginners and people in a rush should use that technique.
Oh and here is a link on how to create your own pick and tension wrench if you can't buy them. This is actually how I created my first pick and wrench :)
Remember! Using these techniques and tools may be considered illegal! Never use these methods/tools on property that you DO NOT OWN. This is considered BREAKING AND ENTERING (Or at the very least vandalism), and you could go to JAIL.
Stay tuned ;)
Sunday, 10 April 2011
Friday, 8 April 2011
Hacking using Google
So you guys may have heard about hacking security cameras using google.
If you havn't... read the above line.
Yes, you can get into unsecured security cameras using the Google search engine. Actually you can use most search engines, but Google is the most popular.
The method is simple, you just need to do a search for one of the following lines, and you should be able to access some cameras. The unfortunate part is that many people know about this, so they create websites that respond to these lines. So some sites will just be regular sites, some will be a raw security feed. Just do the search and go through some results till you figure it out.
The most likely candidates are sites that start with a IP address, and then have the line you searched.
Anywho, here are the lines, give em a go, and see what you can see.
* inurl:"ViewerFrame?Mode=
* intitle:Axis 2400 video server
* inurl:/view.shtml
* intitle:"Live View / - AXIS" | inurl:view/view.shtml^
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:"live view" intitle:axis
* intitle:liveapplet
* allintitle:"Network Camera NetworkCamera"
* intitle:axis intitle:"video server"
* intitle:liveapplet inurl:LvAppl
* intitle:"EvoCam" inurl:"webcam.html"
* intitle:"Live NetSnap Cam-Server feed"
* intitle:"Live View / - AXIS"
* intitle:"Live View / - AXIS 206M"
* intitle:"Live View / - AXIS 206W"
* intitle:"Live View / - AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:"MultiCameraFrame?Mode=Motion"
* intitle:start inurl:cgistart
* intitle:"WJ-NT104 Main Page"
* intext:"MOBOTIX M1? intext:"Open Menu"
* intext:"MOBOTIX M10? intext:"Open Menu"
* intext:"MOBOTIX D10? intext:"Open Menu"
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:"sony network camera snc-p1?
* intitle:"sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:"Toshiba Network Camera" user login
* intitle:"netcam live image"
* intitle:"i-Catcher Console - Web Monitor"
I have only tried the top few, but they should all work.
And also - some of the cameras even allow you to remotely control the cameras motor, and pan it around.
Enjoy, and stay tuned
;)
If you havn't... read the above line.
Yes, you can get into unsecured security cameras using the Google search engine. Actually you can use most search engines, but Google is the most popular.
The method is simple, you just need to do a search for one of the following lines, and you should be able to access some cameras. The unfortunate part is that many people know about this, so they create websites that respond to these lines. So some sites will just be regular sites, some will be a raw security feed. Just do the search and go through some results till you figure it out.
The most likely candidates are sites that start with a IP address, and then have the line you searched.
Anywho, here are the lines, give em a go, and see what you can see.
* inurl:"ViewerFrame?Mode=
* intitle:Axis 2400 video server
* inurl:/view.shtml
* intitle:"Live View / - AXIS" | inurl:view/view.shtml^
* inurl:ViewerFrame?Mode=
* inurl:ViewerFrame?Mode=Refresh
* inurl:axis-cgi/jpg
* inurl:axis-cgi/mjpg (motion-JPEG)
* inurl:view/indexFrame.shtml
* inurl:view/index.shtml
* inurl:view/view.shtml
* liveapplet
* intitle:"live view" intitle:axis
* intitle:liveapplet
* allintitle:"Network Camera NetworkCamera"
* intitle:axis intitle:"video server"
* intitle:liveapplet inurl:LvAppl
* intitle:"EvoCam" inurl:"webcam.html"
* intitle:"Live NetSnap Cam-Server feed"
* intitle:"Live View / - AXIS"
* intitle:"Live View / - AXIS 206M"
* intitle:"Live View / - AXIS 206W"
* intitle:"Live View / - AXIS 210?
* inurl:indexFrame.shtml Axis
* inurl:"MultiCameraFrame?Mode=Motion"
* intitle:start inurl:cgistart
* intitle:"WJ-NT104 Main Page"
* intext:"MOBOTIX M1? intext:"Open Menu"
* intext:"MOBOTIX M10? intext:"Open Menu"
* intext:"MOBOTIX D10? intext:"Open Menu"
* intitle:snc-z20 inurl:home/
* intitle:snc-cs3 inurl:home/
* intitle:snc-rz30 inurl:home/
* intitle:"sony network camera snc-p1?
* intitle:"sony network camera snc-m1?
* site:.viewnetcam.com -www.viewnetcam.com
* intitle:"Toshiba Network Camera" user login
* intitle:"netcam live image"
* intitle:"i-Catcher Console - Web Monitor"
I have only tried the top few, but they should all work.
And also - some of the cameras even allow you to remotely control the cameras motor, and pan it around.
Enjoy, and stay tuned
;)
Thursday, 7 April 2011
Good morning everyone,
So I just bought this game called The World Ends With You for DS, and I can't get over how good this game is. You start playing as an angry teen, who wants nothing to do with the world, who is dragged into another dimention. There, he encounters other people who are caught up in the same situation, called "Players". He is forced to partner up with a girl, even though he wants nothing to do with her. They team up to fight "Noise" which are creatures that seem to crawl out of and form from tattoos.These creatures attack anyone without a partner on sight. Thus you embark on a jouney to figure out what the heck is going on, and why you are here. Excellent music, excellent visuals.... It's an awesome game guys. It's RPG style, and your weapons are pins. Yeah, pins, like the things you wear on your backpack. They activate psychic powers, enabling you to summon towers of ice, shoot bolts of electricity, or conjure fire (and many, MANY other efffects).
I highly recommend this game!! Get it! Play it! Love it!
Stay tuned
;)
So I just bought this game called The World Ends With You for DS, and I can't get over how good this game is. You start playing as an angry teen, who wants nothing to do with the world, who is dragged into another dimention. There, he encounters other people who are caught up in the same situation, called "Players". He is forced to partner up with a girl, even though he wants nothing to do with her. They team up to fight "Noise" which are creatures that seem to crawl out of and form from tattoos.These creatures attack anyone without a partner on sight. Thus you embark on a jouney to figure out what the heck is going on, and why you are here. Excellent music, excellent visuals.... It's an awesome game guys. It's RPG style, and your weapons are pins. Yeah, pins, like the things you wear on your backpack. They activate psychic powers, enabling you to summon towers of ice, shoot bolts of electricity, or conjure fire (and many, MANY other efffects).
I highly recommend this game!! Get it! Play it! Love it!
Stay tuned
;)
Wednesday, 6 April 2011
Hi everyone,
So I came across this image a while back, and just wanted to share it with you. I actually carry a copy of it on my phone at all times, just in case it is ever needed. Forgetting your locker combo is such pain. Not anymore!
I may include some lock-picking tutorials in the future if anyone is interested? Let me know in the comments
Stay tuned
;)
Some interesting tools
Hey everyone,
So I came across this neat program. Firstly, this program might be considered illegal, as it can be used to crack passwords - thus you get no links from me! I take no responsibility; I'm just posting the technology behind the program, because it is very interesting. Okay, onto the good stuff!
This particular tool is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms (11 architecture-specific flavors of Unix, DOS, Win32, BeOS, and OpenVMS).
It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash.
Interesting... So the actual attack type behind this software is a dictionary type attack. It basically sets up a nested FOR loop, comparing the password hash (or whatever form of testing you are using) to a dictionary list (which can be custom). Very popular, so if you are a server operator, watch for people using this.
The interesting thing about this type of attack in regards to security, is that there is really no defence against this kind of attack. If the black hat has gotten a encrypted hash of your password - they can try to crack it offline. There is nothing you can do to stop this person once they have the hash - you must simply hope your passwords strength overcomes the dictionary attack (hence using passphrases instead of a password)
I am more interested in brute force attacks personally - they may take longer, but with the right letterlist and enough time they will always crack the password.
Stay tuned, stay classy
;)
So I came across this neat program. Firstly, this program might be considered illegal, as it can be used to crack passwords - thus you get no links from me! I take no responsibility; I'm just posting the technology behind the program, because it is very interesting. Okay, onto the good stuff!
This particular tool is a free password cracking software tool. Initially developed for the UNIX operating system, it currently runs on fifteen different platforms (11 architecture-specific flavors of Unix, DOS, Win32, BeOS, and OpenVMS).
It is one of the most popular password testing/breaking programs as it combines a number of password crackers into one package, autodetects password hash types, and includes a customizable cracker. It can be run against various encrypted password formats including several crypt password hash types most commonly found on various Unix flavors (based on DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash.
Interesting... So the actual attack type behind this software is a dictionary type attack. It basically sets up a nested FOR loop, comparing the password hash (or whatever form of testing you are using) to a dictionary list (which can be custom). Very popular, so if you are a server operator, watch for people using this.
The interesting thing about this type of attack in regards to security, is that there is really no defence against this kind of attack. If the black hat has gotten a encrypted hash of your password - they can try to crack it offline. There is nothing you can do to stop this person once they have the hash - you must simply hope your passwords strength overcomes the dictionary attack (hence using passphrases instead of a password)
I am more interested in brute force attacks personally - they may take longer, but with the right letterlist and enough time they will always crack the password.
Stay tuned, stay classy
;)
Energy Amplifier - The Future Is Now?
Hey everyone,
So a while back I came across something called a energy amplifier. This is an interesting concept. It takes in a certain amount of power and outputs a greater amount. This is fantastic - if it works. The energy amplifier I am talking about is known as THE LEA ELECTRICITY PRODUCING DEVICE.
Sounds impressive, no?
It is a fantastic idea - over night, it could solve the world energy crisis. Hook this baby up to a nuclear reactor and it will triple the amount of energy being produced. Well heck, if it triples the incoming energy, why can't we use it to generate its own power and produce surplus for use in our homes? This is an awesome invention, and if a reality, one of the most important inventions of all time.
Now the unfortunate parts.
The site advertising this amazing device has been under construction since July 2010. There are also no technical specs to speak of. If you navigate to that part of the site, it just says "More information coming soon...". Also... and I am by no means a physicist... But doesn't this break some fundamental laws? The law of conservation of energy, maybe? I'm not entirely sure, but it seems to me that if you are trippling the amount of energy put in, you are actually creating energy from nothing.
The verdict:
As a futuristic technology - very cool idea. But is it likely to actually function, and someday hit the market? Probably not.
P.S. If anyone has ideas on a neat technology for a write up, feel free to leave a comment. I'll check it out!
Stay tuned, and more importantly - stay classy!
;)
So a while back I came across something called a energy amplifier. This is an interesting concept. It takes in a certain amount of power and outputs a greater amount. This is fantastic - if it works. The energy amplifier I am talking about is known as THE LEA ELECTRICITY PRODUCING DEVICE.
Sounds impressive, no?
It is a fantastic idea - over night, it could solve the world energy crisis. Hook this baby up to a nuclear reactor and it will triple the amount of energy being produced. Well heck, if it triples the incoming energy, why can't we use it to generate its own power and produce surplus for use in our homes? This is an awesome invention, and if a reality, one of the most important inventions of all time.
Now the unfortunate parts.
The site advertising this amazing device has been under construction since July 2010. There are also no technical specs to speak of. If you navigate to that part of the site, it just says "More information coming soon...". Also... and I am by no means a physicist... But doesn't this break some fundamental laws? The law of conservation of energy, maybe? I'm not entirely sure, but it seems to me that if you are trippling the amount of energy put in, you are actually creating energy from nothing.
The verdict:
As a futuristic technology - very cool idea. But is it likely to actually function, and someday hit the market? Probably not.
P.S. If anyone has ideas on a neat technology for a write up, feel free to leave a comment. I'll check it out!
Stay tuned, and more importantly - stay classy!
;)
Tuesday, 5 April 2011
Hello blog world!
Hello everyone! I just want to welcome you to my brand new blog! I am going to do a few things in this first post. I will tell you all a little about me, then I will go over some of the goals for this blog. Then I am going to post some content! Also, just a heads up, I will be improving drastically on my posts in the future, this is just a late night post. I have never had a blog before, and my friend turned me onto them. They look cool!
Alright, a little about me. Well, my name is Shaun. I live in frigid Canada, and I am 20 years old. I love technology! I am currently enrolled in a post-seconday instution involving every aspect of computer technology. I really love it, and I hope some of my passion will bleed through into these meager words!
My goals for this blog include several aspects.
In the raw technology side, you can expect posts of emerging technology and why I find it interesting. This may include new gadgets, or information security, or a plethora of other goodies. I forgot to mention! I love security topics! Anything to do with security, or hacking, or pen-tests - love it! My goal in life is to be a top teer pen-tester for microsoft or a government agency one day! So expect some neat security and hacking information (no illegal stuff - don't get your hopes up :P).
On the more personal side, I may from time to time post stories that are happening in my life. Maybe some current events, or maybe even just some new artist I have discovered. These posts won't be explicitly about technology, but in my life, I am never far from some sort of technical device!
So thanks for getting to know me a little better. Now, onto the good stuff!
Today I helped my friend remove a nasty little virus from his computer. The culprit? It's known as vista internet security 2011. It is a pretty standard little bug - it claims to have located several virii on your computer but, alas, it cannot remove them because it is only the trial version. But for a mere price of $60.00 you can upgrade to the full version! Such a steal of a deal.
Anyways, he recognized it as a virus and requested some assistance. I have never actually encountered this virus before, so I just used google to get some information. Ended up we had to modify the registry so we were able to launch a secure anti-virus and we were able to remove it. If anyone else has this virus I highly recommend the folks over at 2-viruses.com. They had some solid information, and helped quite a lot.
Well, that is it for me tonight. I hope you enjoyed my first blog, and expect many more soon. I am thinking for the next one, something about an "infinite energy machine".
Stay tuned and, more importantly, stay classy!
;)
Alright, a little about me. Well, my name is Shaun. I live in frigid Canada, and I am 20 years old. I love technology! I am currently enrolled in a post-seconday instution involving every aspect of computer technology. I really love it, and I hope some of my passion will bleed through into these meager words!
My goals for this blog include several aspects.
In the raw technology side, you can expect posts of emerging technology and why I find it interesting. This may include new gadgets, or information security, or a plethora of other goodies. I forgot to mention! I love security topics! Anything to do with security, or hacking, or pen-tests - love it! My goal in life is to be a top teer pen-tester for microsoft or a government agency one day! So expect some neat security and hacking information (no illegal stuff - don't get your hopes up :P).
On the more personal side, I may from time to time post stories that are happening in my life. Maybe some current events, or maybe even just some new artist I have discovered. These posts won't be explicitly about technology, but in my life, I am never far from some sort of technical device!
So thanks for getting to know me a little better. Now, onto the good stuff!
Today I helped my friend remove a nasty little virus from his computer. The culprit? It's known as vista internet security 2011. It is a pretty standard little bug - it claims to have located several virii on your computer but, alas, it cannot remove them because it is only the trial version. But for a mere price of $60.00 you can upgrade to the full version! Such a steal of a deal.
Anyways, he recognized it as a virus and requested some assistance. I have never actually encountered this virus before, so I just used google to get some information. Ended up we had to modify the registry so we were able to launch a secure anti-virus and we were able to remove it. If anyone else has this virus I highly recommend the folks over at 2-viruses.com. They had some solid information, and helped quite a lot.
Well, that is it for me tonight. I hope you enjoyed my first blog, and expect many more soon. I am thinking for the next one, something about an "infinite energy machine".
Stay tuned and, more importantly, stay classy!
;)
Subscribe to:
Comments (Atom)






