Skip to content
Question Defense
Technical answers for technical questions
Question Defense
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact
Linkedin page opens in new windowTwitter page opens in new window
Search:
Search
  • Backtrack Linux
    • Backtrack Article Request
  • HTTP ERROR
  • Kali Linux
    • Kali Linux Article Request
  • Privacy Policy
  • Tools
    • Class Of Device – Bluetooth CoD List In Binary And Hex
    • phpMyAdmin Blowfish Secret Generator
  • Documentation
    • check_postgres.pl
    • Linux Man Pages
      • insmod
      • kill
      • Logrotate
      • ls
      • lsmod
      • mail
      • modprobe
      • more
      • mysqldump
      • ntfsprogs
      • ntfsresize
      • pg_dump
      • psql
      • rmmod
      • screen
    • Monarch
      • Monarch Commands
      • Monarch Control
      • Monarch Escalations
      • Monarch Groups
      • Monarch Management of Nagios Hosts
      • Monarch Managing Nagios Contacts
      • Monarch Managing Nagios Hosts
      • Monarch Profiles
      • Monarch Services Template
      • Monarch Time Periods
      • Monarch Tools
  • Tags
  • Contact

Tag Archives: attack

You are here:
  1. Home
  2. Entries tagged with "attack"

Information Security

WordPress Site Redirected To tenderloin.osa.pl Via Search Engine Click Jacking

SecurityBy alexOctober 3, 20112 Comments

So earlier today I noticed a discrepancy in traffic to question-defense.com and because of a previous incident I knew exactly where to look. Sure enough a similar attack had been performed which we are coining Search Engine Click Jacking. In this case we are sure that a single files permissions were left open and the…

Information Security

Oclhashcat Fingerprint Attack [VIDEO]

SecurityBy purehateNovember 24, 2010Leave a comment

I recently presented at Hack3rcon in West Virginia on the subject of using Oclhashcat and a fingerprint attack to crack password hash’s.The original article by Atom can be found here. This is the video I made for a back up of my talk in case the live demo failed.

Technology Insights

The Social Engineering Toolkit: Creating Fake Web Sites to Own Boxes

InsightsBy purehateFebruary 23, 201041 Comments

One of the hottest new tools in Backtrack 4 final is the Social Engineering Toolkit otherwise known as SET. The tool was written by a major contributor to Backtrack, David Kennedy (ReL1k). He is also a friend.  The homepage for SET is http://www.secmaniac.com/ and there is more useful information there.

Technology Insights

How to Read /var/log/btmp, Rotate the btmp Log With Logrotate

InsightsBy alexJuly 3, 200926 Comments

The btmp log keeps track of failed login attempts. I have seen on a default linux setup with logrotate configured where the btmp log is left out of rotation and eventually grows out of hand. So first you want to make sure that the btmp log is rotated using logrotate with the below information. Log…

Technology Insights

Change the Table Prefix of WordPress Blog MySQL Database from wp_

InsightsBy alexMarch 8, 20098 Comments

The directions below will provide simple instructions on changing the prefix to your WordPress blog’s MySQL database from wp_ to whatever you choose. Its a good idea to change this prefix to prevent zero-day SQL injection attacks from being performed against your WordPress installation since your database tables will be known to everyone if you…

Question Defense
© 2021 question-defense.com
Go to Top