exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 11 of 11 RSS Feed

Files from fk

First Active1999-12-28
Last Active2006-02-25
fk-016.tar.bz2
Posted Feb 25, 2006
Authored by Wizdumb, fk

Forbidden Knowledge Issue 16 - Getting Free M-Net and DSTV, Phreaking Standard Banks Emergency Phones, Haxx0ring Your Electricity, and more.

tags | magazine
SHA-256 | 10d7fa1faf14adb5fbefff1690aeb11879b96d7e5242ff9143dbdd664edb0b6d
fk-012.tar.bz2
Posted Feb 25, 2006
Authored by Wizdumb, fk

Forbidden Knowledge Issue 12 - Farewell.

tags | magazine
SHA-256 | 3dda0853812f574a3bc1a18f1ba79d565829b6d3bb240e141966794093e1d369
fk-011.tar.bz2
Posted Feb 25, 2006
Authored by Wizdumb, fk

Forbidden Knowledge Issue 11 - Unlocking Cellphones, Cisco PIX DoS, and various other articles.

tags | magazine
systems | cisco
SHA-256 | 1b636c8ca7464b22856b0e8cc93ae3071b94ed7e5ccd5295f6b75be0ec8ff63b
fk-018.tgz
Posted Dec 20, 2002
Authored by Wizdumb, fk

Forbidden Knowledge Issue 18 - This issue has information on smart cards and GSM hacking. Includes gsm-hack, a package to communicate with the fake smart card described in the article.

tags | magazine
SHA-256 | f80d18d00accc92b12462e6b9e7eccdfef86aa8fe1da7ddf06eeb87be438c618
fk-017.tgz
Posted Jul 24, 2002
Authored by Wizdumb, fk

Forbidden Knowledge Issue 17 - My Anus iz Huge, Sum Stuf, and Sm Othrr Stufs.

tags | magazine
SHA-256 | a4cb10a843e586f64b77056b70722166bd5d12a962da18ee898cc751f21a023b
fk-0015.tgz
Posted Aug 3, 2001
Authored by Wizdumb, fk

Forbidden Knowledge Issue 15 - Patriotism, Nationalism & other Myths of the 21st Century, Telkom External Extension Number Directory, Telkom/Vodacom/Intercon Warez, Christianity: Repairing the Damage, Detecting a phone-tap in 21st Century South Africa, Vodacom SMS Junk, Modified IIS5 .idq Overflow Sploit, and more.

tags | overflow, magazine
SHA-256 | b48125940004dbc321e781d640821c1d51b2d2445b17970ee3cef1030a1a9404
fk-0014.zip
Posted Apr 21, 2001
Authored by Wizdumb, fk

Forbidden Knowledge Issue 14 - Reconstructing serialized Java objects from sniffer logs, Blackhole TCP/UDP behavior and its effect of nmap, More fun with CyberXpress Internet Kiosks, The lazy man's "PGPDisk for BSD", More fun with Nedbank ATMs, Dumb Motorola T2288 Trick, and "Privacy and other myths of the 21st century".

tags | java, udp, tcp, magazine
systems | bsd
SHA-256 | 39d58aedc6af335d0d57fca798298950eefe903eab83712c5deaa046b7170bb9
fk-0013.tgz
Posted Apr 20, 2001
Authored by Wizdumb, fk

Forbidden Knowledge Issue 13 - Hacking the Cyber Xpress Internet Kiosk, Hacking in Switched Environments, mIRC 5.41 DoS, M-Web Dialup Hostname Reference, Just how stupid Diana PABXs are, More Vodacom VMB hacking nonsense by Wizdumb, Fun with Windoze Networking by Wizdumb, "The Blob", And other true tales of stupidity.

tags | web, magazine
SHA-256 | 2753a98c4e0d6314d14ad99ca5f91a05ffb7bac94087f6c4792d945ce495a46d
Fk9.zip
Posted Mar 24, 2000
Authored by Wizdumb, fk

Forbidden Knowledge Issue 9 - In this issue: VMB's Carriers, Argosoft FTP Server Advisory, Cellphone and Payphone Warez, More Fun with Abusing Telkom, HAM Radio Inphoze, SAIX IP System, The PAN Credit Card System, Secret Zero-day C++ Kodez, Evil Fun with Webmail.Co.Za Users, Crush FTPd / Generic Java DoS attack, and Offline Explorer Advisory.

tags | java, magazine
SHA-256 | e4e3ea7c33fc5534a5d265018db6f1c2a09eaea9ac5e438a5db0676bdc259a92
fk8.addition.txt
Posted Dec 28, 1999
Authored by Wizdumb, fk

Every single file available on buffer overflow mentions that strcpy(), etc, but for some reason no one has noticed that 'cin >>' is also a problem. cin is an extremely commonly used function in C++ code, and it ought to be more widely known that the favoured use of it is insecure. Ditto for improper use of an ifstream.

tags | overflow, magazine
SHA-256 | 5c686b480f99fe136628c3a0fcc4f2d535211911ea90f0bb9272f37fb9849850
fk8.zip
Posted Dec 28, 1999
Authored by Wizdumb, fk

Forbidden Knowledge issue 8 - Interesting Wardialling Results, HTTP Basic Authentication explained, Dialout/PPP on Shiva LANRovers, PHEAR Advisory Re: Divine forces, Buffer Overflow Explained, Introduction to Assembly Programming, and Fun with "Trojan" Wingates.

tags | web, overflow, trojan, magazine
SHA-256 | 3cdbc67db303054ebbbb9406564765b9aae03634d5136a1182fba501b77290dd
Page 1 of 1
Back1Next

File Archive:

October 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Oct 1st
    39 Files
  • 2
    Oct 2nd
    23 Files
  • 3
    Oct 3rd
    18 Files
  • 4
    Oct 4th
    20 Files
  • 5
    Oct 5th
    0 Files
  • 6
    Oct 6th
    0 Files
  • 7
    Oct 7th
    17 Files
  • 8
    Oct 8th
    66 Files
  • 9
    Oct 9th
    25 Files
  • 10
    Oct 10th
    20 Files
  • 11
    Oct 11th
    21 Files
  • 12
    Oct 12th
    0 Files
  • 13
    Oct 13th
    0 Files
  • 14
    Oct 14th
    0 Files
  • 15
    Oct 15th
    0 Files
  • 16
    Oct 16th
    0 Files
  • 17
    Oct 17th
    0 Files
  • 18
    Oct 18th
    0 Files
  • 19
    Oct 19th
    0 Files
  • 20
    Oct 20th
    0 Files
  • 21
    Oct 21st
    0 Files
  • 22
    Oct 22nd
    0 Files
  • 23
    Oct 23rd
    0 Files
  • 24
    Oct 24th
    0 Files
  • 25
    Oct 25th
    0 Files
  • 26
    Oct 26th
    0 Files
  • 27
    Oct 27th
    0 Files
  • 28
    Oct 28th
    0 Files
  • 29
    Oct 29th
    0 Files
  • 30
    Oct 30th
    0 Files
  • 31
    Oct 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close