Books & Manuals

Top Resources

  1. How to Improve Success with Reaver Using MAC Addresses
    How to cut down a WPS attack from 10 hours to 5 minutes - by Mr. Penguin
    Updated: 31 Aug 2014
  2. ebooklab
    learn the basics of pentesting - by Fantastic
    Updated: 14 Apr 2013
  3. Computer Hacking Forensics Investigator
    Official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide - by Mr. Penguin
    Updated: 11 Apr 2013
  4. TP-Link TD-W89 Exploitation
    This is a whitepaper that goes into detail on downloading configuration files and exploiting - by Mr. Penguin
    Updated: 29 Aug 2014
  5. Sky Broadband Router SR101 Weak WPA-PSK Generation Algorithm
    Vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker - by Mr. Penguin
    Updated: 29 Aug 2014
  1. Mr. Penguin

    How to Improve Success with Reaver Using MAC Addresses

    How to cut down a WPS attack from 10 hours to 5 minutes
    4/5, 4 ratings
    Updated:
    31 Aug 2014
  2. Mr. Penguin

    TP-Link TD-W89 Exploitation 1

    This is a whitepaper that goes into detail on downloading configuration files and exploiting
    0/5, 0 ratings
    Downloads:
    131
    Updated:
    29 Aug 2014
  3. Mr. Penguin

    Sky Broadband Router SR101 Weak WPA-PSK Generation Algorithm

    Vulnerable to an offline dictionary attack if the WPA-PSK handshake is obtained by an attacker
    0/5, 0 ratings
    Updated:
    29 Aug 2014
  4. Mr. Penguin

    Tenda A5s Router Authentication Bypass

    Suffers from an authentication bypass vulnerability due to improperly trusting cookies
    0/5, 0 ratings
    Updated:
    29 Aug 2014
  5. Mr. Penguin

    Ubiquiti UbiFi Controller 2.4.5 Password Hash Disclosure

    Ubiquiti UniFi Controller version 2.4.6 discloses the administrative password hash via syslog messag
    0/5, 0 ratings
    Updated:
    3 Aug 2014
  6. Mr. Penguin

    DIR-605L Disclosure / Bypass

    DIR-605L suffers from password disclosure and authentication bypass vulnerabilities
    0/5, 0 ratings
    Updated:
    16 Jun 2014
  7. Mr. Penguin

    Default WPA key generator for Sitecom WLR-4000/4004 routers 1.0

    Sitecom WLR-4000 and WLR-4004 both v1 001 suffer from weak firmware encryption and key
    0/5, 0 ratings
    Downloads:
    142
    Updated:
    25 Apr 2014
  8. Mr. Penguin

    Wifi Packet Capturing / Session Hijacking Using Wireshark 2014-04-25

    Details how to perform wifi man in the middle attacks and then sniff the traffic for analysis
    0/5, 0 ratings
    Downloads:
    383
    Updated:
    25 Apr 2014
  9. Mr. Penguin

    Cisco RV110W / RV215W / CVR100W Login Bypass 2014-04-16

    RV110W, RV215W, and CVR100W suffer from a login bypass vulnerability
    0/5, 0 ratings
    Downloads:
    61
    Updated:
    16 Apr 2014
  10. Mr. Penguin

    Pirelli Discus DRG A125g Remote Wifi Password Change 2013/11/23

    Pirelli Discus DRG A125g suffers from a remote wifi password change vulnerability.
    0/5, 0 ratings
    Downloads:
    27
    Updated:
    21 Dec 2013
  11. khackerupp

    CISCO & CEH MINMAP 2013-10-24

    The summary of cisco, cissp, ceh,...in mindmap which is easier for reading and understanding
    0/5, 0 ratings
    Downloads:
    105
    Updated:
    27 Oct 2013
  12. Mr. Penguin

    Hacking IPv6 Networks BRUCON 2012

    These are the slides for the "Hacking IPv6 Networks" security training course
    0/5, 0 ratings
    Downloads:
    242
    Updated:
    29 Apr 2013
  13. Fantastic

    ebooklab v2.0

    learn the basics of pentesting
    4.5/5, 2 ratings
    Downloads:
    445
    Updated:
    14 Apr 2013
  14. Mr. Penguin

    Computer Hacking Forensics Investigator 2

    Official, EC-Council-endorsed CHFI (Computer Hacking Forensics Investigator) study guide
    3.5/5, 2 ratings
    Downloads:
    384
    Updated:
    11 Apr 2013
  15. ImJoJo

    Google Hacking for Penetration Testers Volume 1

    Explore the Dark Side of Googling
    0/5, 0 ratings
    Downloads:
    321
    Updated:
    6 Apr 2013
  16. ImJoJo

    Google Hacking for Penetration Testers Volume 2

    Explore the Dark Side of Googling
    0/5, 0 ratings
    Downloads:
    258
    Updated:
    6 Apr 2013
  17. Fantastic

    Certified Ethical Hacking: 0.0

    learn basics of ethical hacking
    0/5, 0 ratings
    Downloads:
    381
    Updated:
    3 Apr 2013