Nov 30, 2009

Metasploit AV Evasion Technique





How to modify the meterpreter binary and make it undetectable by an Anti-Virus.


# ITS™
# 2008 - 2009

Nov 22, 2009

Hacking WPA with Pyrit



Pyrit takes a step ahead in attacking WPA-PSK and WPA2-PSK, the protocols that protect today's public WIFI-airspace. Pyrit's implementation allows to create massive databases, pre-computing part of the WPA/WPA2-PSK authentication phase in a space-time-tradeoff. The performance gain for real-world-attacks is in the range of three orders of magnitude which urges for re-consideration of the protocol's security. Exploiting the computational power of Many-Core- and other platforms through ATI-Stream, Nvidia CUDA, OpenCL and VIA Padlock.

# ITS ©
# 2008 - 2009

Modifying an MSN Conversation using an Ettercap Filter



In this video, Thomas shows us how to modify an MSN conversation at the network level. He uses an Ettercap filter and MITM attack to make this happen. The basic idea is to hijack the victim's Layer 2 and have all his traffic go through the attacker. Then the attacker can modify the traffc on the fly and inject it back into the network.

# ITS ©
# 2008 - 2009