THE

SPRAWL

  •  
  •  
  •  
  • sprawllatest

    oracle authentication

    Oracle Authentication process requires users to provide correct username, password, database hostname, and instance name (SID). Read more.

    freedom downtime

    A revealing documentary about two high profile hacker cases: Mark Abene and Kevin Mitnick. The documentary includes interviews with a number of guest speakers including Bruce Sterling, Lewis Depayne, John Markoff, Jeff Moss, Mike Roadancer, Bernie S., and many others. This film is directed by Emmanuel Goldstein of 2600. Read more.

    hack attack

    A 1994 Yorkshire Television Production for Discovery Channel documentary - Hacker Attack, is a well balanced account of the hacker, security, and electronic crime worlds in late 80s and early 90s. It begins by featuring Mark Abene incarcerated in Schuylkill talking about his views on hacking and the story of MoD. Emmanuel Goldstein is displayed throughout the documentary talking about the hacker community during 2600 meetings and on the Off the Hook radio show. Next 'Hacker Attack' turns to the darker side of hacking when we jump into unmarked NYPD surveillance van to track down cloned cellular phones. There is an extensive coverage of credit card fraud, high tech robbery, and industrial espionage. At last we can watch Winn Schwartau and Dan Farmer talk about threats to our financial and military infrastructures. Throughout the documentary, there are snippets of anonymous hackers breaking into various computer systems. Read more.

    hackers: outlaws and angels

    A Discovery Channel documentary on the outlaws and angels of the Internet covers a wide range of white hat hackers and computer security industry representatives. In this documentary you will learn how the infamous Captain Zap changed the clocks of the telephone system to give discount rates to all subscribers. You will also be exposed to computer forensics shops set up by NYPD and Kroll Associates, as well as security monitoring centers from ISS. Read more.

    telephony tones

    This article lists known tones that occur on the telephone line. Tones include the ones generate by the phone company, consumer products (e.g. answering machines, faxes, etc.), dialup services, etc. Read more.

    warrock protocol analyzer

    Download wr-protocol.py
    Size 1.2 KB
    DateJanuary 1st, 2009
    Version0.1

    Warrock Protocol Analyzer decodes encoded traffic generated by a popular game Warrock. Using this tool, you can study the protocol, intercept login and password in clear text, use as a foundation for active attacks. You need Scapy for this script to work. Read more.

    port scanning

    Discovering open ports on a networked system is an important reconnaissance step used to enumerate potentially vulnerable services. In this article you will learn a number of techniques used to perform fast and reliable port scans while bypassing many trivial defenses. Read more.

    nmap

    nmap (Network MAPper) is a network port scanner with service version and operating system detection engines. The tool was originally developed by Fyodor and published in Phrack Issue 51 in 1997. The tool is command line although a number of GUIs exist. nmap runs on a variety of platforms including Linux, *BSD, Windows, and others. Read more.



    π
    ///\oo/\\\