I don’t write on the forensics side of security much, but I thought this was an interesting topic that I’d not seen covered much before. While I was doing my research on USB hardware key loggers I learned quite a bit about USB devices that I did not know before. Besides Vendor IDs and Product IDs, some devices also have a serial number associated with them.
Без рубрики
Hacking and Pen-Testing With The Nokia 770/800/810 Notes
The n770 and n800 are Linux based mobile devices from Nokia that are designed for portable web surfing, Internet Tablets as Nokia calls them. The platform for these devices is know as Maemo and since it’s Linux based many hackers have extended its functionality greatly. Since both models have built in WiFi and Bluetooth, and the older 770 model has come down in price ($130 when I got mine),
What can you find out from an IP?
Here I will outline some use full Unix and NT commands for finding out more information about a given IP. Some of these techniques will fail depending on firewall rule sets.
Changing Your MAC Address In Window XP/Vista, Linux And Mac OS X (Sometimes known as MAC spoofing)
First let me explain a few things about MAC addresses. MAC stands for Media Access Control and in a sense the MAC address is a computer’s true name on a LAN. An Ethernet MAC address is a six byte number, usually expressed as a twelve digit hexadecimal number (Example: 1AB4C234AB1F).