Skip to content

WindowsTechs.com

Collaborate Disseminate

Menu

Primary menu

  • Home

Author Archives: user5623335

Has anyone successfully set-up the original Sub7?

Posted on December 21, 2021 by user5623335

When I first entered the information security sector in 2007 I remember reading about a dated trojan called Sub7, released in 1999.
Focusing on the legacy version, not the new release, has anybody been able to successfully use it for testi… Continue reading Has anyone successfully set-up the original Sub7?→

Posted in ip, network, RAT, Trojan, VirtualBox

Public dataset of compromised users

Posted on August 28, 2020 by user5623335

I am looking for some type of public data set for my own internal research.
It should contains users and some type of identifiable information (IP, fingerprint, cookie etc…), at least some of the users in the data set should have had som… Continue reading Public dataset of compromised users→

Posted in indicator-of-compromise, research, Shodan, Statistics

Register an @yahoo.de email?

Posted on August 7, 2020 by user5623335

Years ago I created an account and put my reset email as example@yahoo.de by mistake, it should have been @yahoo.com.
Recently, I tried to access my old account but could not remember the password. When I tried to reset my email it wanted … Continue reading Register an @yahoo.de email?→

Posted in email, Email Spoofing, Yahoo

Secure code makes exploitation easier with CPU vulnerabilities?

Posted on June 26, 2020 by user5623335

I researched CPU vulnerabilities in the past, such as Specter and Meltdown.
I read that one of those attacks is made easier if the code is a certain way. I cannot remember if it was related to being efficiently written, securely written, o… Continue reading Secure code makes exploitation easier with CPU vulnerabilities?→

Posted in CPU, exploit-development, meltdown, secure coding, SPECTRE

Have I used LUKS properly?

Posted on January 2, 2020 by user5623335

I am about to go travelling to some high risk countries where corrupt officials will most likely try to go through my laptop and external HDD.

I am using Linux Mint and LUKS. Could someone please tell me based on these pictu… Continue reading Have I used LUKS properly?→

Posted in Disk Encryption, linux, luks

Basic questions about shellcode

Posted on November 6, 2019 by user5623335

Is the hex code at the top of this source file the same as the assembly at the bottom, as in they do the same thing?

How can I convert assembly into hex like in this source code file? I frequently see it being used in payloa… Continue reading Basic questions about shellcode→

Posted in Shellcode

Tor hidden service URLs [migrated]

Posted on February 6, 2019 by user5623335

I was told years ago that whenever a new hidden service is created it is added to a list, so there is a record of every hidden service ever created. I believe the list is somewhere on the Tor project website.

If this is true… Continue reading Tor hidden service URLs [migrated]→

Posted in tor

How is executable shellcode inserted?

Posted on January 12, 2019 by user5623335

How is shellcode (the payload) added to an executable file? Assume it is close source.

How does the hacker then get the address of where it is? They need this for when they overwrite the return address…

After the above is… Continue reading How is executable shellcode inserted?→

Posted in ASLR, buffer overflow, C, Shellcode

Recover deleted WhatsApp message

Posted on August 4, 2018 by user5623335

I was having a chat with a friend and they deleted a WhatsApp message before I could read it.

I am on Android.

Is there a way to recover it?

Continue reading Recover deleted WhatsApp message→

Posted in Android, phone, recovery, Whatsapp

How to continue where I left off on reaver?

Posted on September 16, 2017 by user5623335

I was attempting to brute-force the WPS PIN on my home router to check the security of my network. Strangely, after three days it still had not finished, I believe this is because my computer was far away from the router whil… Continue reading How to continue where I left off on reaver?→

Posted in Kali Linux, linux, wifi, WPA2, wps

Post navigation

Newer posts →

Primary Sidebar Widget Area

Infocon Status

Internet Storm Center Infocon Status

Recent Posts

  • ISC Stormcast For Tuesday, May 12th, 2026 https://isc.sans.edu/podcastdetail/9928, (Tue, May 12th) May 12, 2026
  • Microsoft PowerToys now lets you control your monitor from the taskbar – here’s how May 12, 2026
  • The Walls Don’t Have Ears, But Fiber Optic Does May 12, 2026
  • Pressure mounts on Canvas as data leak extortion deadline looms May 11, 2026
  • Honda Wants to Complicate Your E-Motorcycle May 11, 2026

Tag Cloud

Agriculture Alzheimer's Disease Art Audio Automation Bluetooth Building and Construction Campervan Camping Cancer Coronavirus (COVID-19) Cycling Dementia Diabetes DNA Electric Vehicles Food Home House Huawei Indiegogo MIT Mobility Moon New Atlas Audio NVIDIA Off-grid Off-road Pedal-assisted Photography Physics Radio Repair RV Samsung Satellite Sony SpaceX spoofing sustainable design The Immune System Tiny Footprint Training Water Zoom

Archives

  • Facebook
  • Twitter
  • Linkedin
  • Email
Copyright © 2026 WindowsTechs.com. All Rights Reserved.
Theme: Catch Box by Catch Themes
Scroll Up