image_hacking

Welcome to ITswapshop.com/hacking. Here you will find quality and detailed tutorials and articles on "ethical hacking". Brute-Force, Denial-of-Service, Exploits, and Wi-Fi are some of the topics you will see covered here. Again, these tutorials should only be used on equipment you own or manage to test your own servers security. Do not perform any "hacking" or any attacks you find on this site on any equipment unless you have explicit permission to do so, as it is illegal in many cases.

Most Hits Today

While this method may not technically be hacking, it definitely exploits a weakness in uninformed users. Perhaps you've heard of the site, http://www.fakemailgenerator.com/. It's commonly used by people to create a free temporary email address to use when you want to avoid getting spam to your primary email account.

Most Hits All Time

Hydra is a tool that makes cracking protocols such as ssh, ftp and telnet relatively easy. In my example, I will be cracking SSH using Hyrda 5.9.1 on Ubuntu 10.10 64 bit (***Update for Ubuntu 12.04 - Replace all references of Hydre 5.9.1 with Hyrda 7.3, which can be downloaded here). Although this example uses Ubuntu, these commands should work on any Debian based system such as Debian and Linux Mint.