Category Archives: Security

CiscoROUTER Password Recovery-How to recover cisco ROuter lost password

One of the most frustrating moments as a network administrator is when you desperately want to log on to a Cisco Kartook-R1-LAB and you try all possible passwords you have with no success. Fortunately there is a Cisco password recovery procedure for IOS Kartook-R1-LABs which you can follow and bypass password control in order to […]

Protect yourself from COFEE with some DECAF

Two developers have created “Detect and Eliminate Computer Assisted Forensics” (DECAF). The tool tries to stop Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password-protected or encrypted sources. In response to Microsoft’s Computer Online Forensic Evidence Extractor (COFEE), which helps law enforcement officials grab data from password-protected or […]

Backtrack – How to enable ssh Access

On Backtrack 4 Box i need to access through ssh also need to enable .so here you go how to enable SSH on BT-4 root@Kartook:~# sshd-generate Generating public/private rsa1 key pair. Your identification has been saved in /etc/ssh/ssh_host_key. Your public key has been saved in /etc/ssh/ssh_host_key.pub. The key fingerprint is: 34:ea:36:7f:12:c8:01:a7:ea:e0:fb:d5:cd:75:ee:a5 root@bt The key’s randomart […]

M$ Security Tools : LogonSessions – free

If you think that when you logon to a system there’s only one active logon session, this utility will surprise you. It lists the currently active logon sessions and, if you specify the -p option, the processes running in each session. Download Result Below : C:Documents and SettingsAdministratorDesktop>logonsessions.exe Logonsesions v1.1 Copyright (C) 2004 Bryce Cogswell […]

Win 7 :Disabling User Account Control (UAC)

Disabling User Account Control (UAC) in Windows 7 Warning! This document contains instructions for editing the registry. If you make any error while editing the registry, you can potentially cause Windows to fail or be unable to boot, requiring you to reinstall Windows. Edit the registry at your own risk. Always back up the registry […]