Archive | December, 2006

wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool

Find your website's Achilles' Heel


WWWhack is a brute force utility that will try to crack web sites guarded by an web access password. This utility can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a combination of username/password that is accepted by the web server.

This shows the weakness in securing sensitive areas of your web site by the web authentication method alone.

wwwhack19.zip

To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ‘2001’.

Once again this is an oldskool tool but a lot of people are still seeking it, for learning purposes I presume as there are better alternatives now like thc-hydra.

You can download wwwhack 1.9 here.


To avoid any network issues the zip file is passworded, the password is darknet123.

Your anti-virus software may find a Win32.Hacktool or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.


Posted in: Hacking Tools, Web Hacking

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Recent in Hacking Tools:
- DMitry – Deepmagic Information Gathering Tool
- Automater – IP & URL OSINT Tool For Analysis
- shadow – Firefox Heap Exploitation Tool (jemalloc)

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,981,469 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,434,253 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 680,892 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


IE & Firefox Both Effected by Fake Login Flaw

Find your website's Achilles' Heel


It seems the recent fake login flaw effects both Internet Exploder and Firefox.

Good to keep alert and with the new update mechanism it’s very simple to update your Firefox installation.

The latest versions of both Firefox and Internet Explorer are vulnerable to an unpatched flaw that allows hackers to snaffle users’ login credentials via automated phishing attacks.

The information disclosure bug affects the password manager in Firefox 2.0 and its equivalent in IE7. Firefox’s Password Manager, for example, fails to properly check URLs before filling in saved user credentials into web forms. As a result, hackers might be able to swipe users credentials via malicious forms in the same domain, providing users have already filled out forms on this domain.

Basically you just need to disable the feature that rememebrs the passwords, and it seems for once the vector is slightly more serious for Firefox users than for IE users.

Samples of attacks utilising the flaw have already been reported on MySpace. Firefox 2.0 users might be more at risk from the flaw because IE7 does not automatically fill in saved information. Security notification firm Secunia advises users to disable the “remember passwords for sites” option in their browsers pending the delivery of patches.

This so-called reverse cross-site request flaw was discovered by security researcher Robert Chapin, who explains the issue in greater depth in an advisory here.

Reverse cross site scripting? The names are getting more and more complicated.

Source: The Register


Posted in: Exploits/Vulnerabilities, Web Hacking

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- shadow – Firefox Heap Exploitation Tool (jemalloc)
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,985 views
- AJAX: Is your application secure enough? - 120,149 views
- eEye Launches 0-Day Exploit Tracker - 85,576 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


GoldenEye (GoldEye) Password Cracker – Download goldeye.zip or goldeneye.zip

Find your website's Achilles' Heel


GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.

It should not be use by others to hack sites – this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.

Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.

Notes

GoldenEye works with different types of wordlists:

GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!

If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.

Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.

GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.

Access tab

The url box: if you don’t remember the members url you can

  • search through the list
  • or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.

Options|Advanced tab:

  • Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
  • Server Response: the standard values are ‘200’ for ok and ‘401’ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
  • Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
  • Referer: If the attacked server needs the url of the refering site, enter it here.

Wordlist tools tab

  • Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
  • General wordlist options:
    • Define a mininum and maximum length for the userID and password (standard settings 1-32)
    • Convert the list: All passes will be converted ‘on-the-fly’.
    • Wordlist style: If you want to use single lists: check this option.
  • Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
    “Common manipulations” are predefined manipulations.
    On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!

Security check

  • Server security test: It tests the attacked server for other security holes.
  • Proxy test: tests the proxy-speed. The values are in milliseconds.

Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.

You can download GoldenEye 1.0 here.

To avoid any network issues the zip file is passworded, the password is darknet123.


Posted in: Hacking Tools, Password Cracking, Web Hacking

Tags: , , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Web Hacking | Add a Comment
Recent in Hacking Tools:
- DMitry – Deepmagic Information Gathering Tool
- Automater – IP & URL OSINT Tool For Analysis
- shadow – Firefox Heap Exploitation Tool (jemalloc)

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,981,469 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,434,253 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 680,892 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Some Relaxing on the DMCA Regulations

Your website & network are Hackable


There seems to be have been some slight relaxation on the DMCA regulations lately, which is a good thing for the majority of people!

There have been many grey cases and sadly most have fallen on the side of the big corporations, finally something on our side!

The U.S. Copyright Office specified new rules Wednesday allowing cellphone owners to hack software designed to prevent them from using their phones on competing carriers. Retrogaming enthusiasts will also be permitted to crack copy protection on abandoned titles, albeit for “archival” purposes only.

I think it’s perfectly reasonable, if I buy a peice of hardware or whatever I should completely own it and be able to use it for whatever I want, I shouldn’t be limited by the company that sold it to me.

And Abandonware is ok!

And thankfully a thumbs up for educators too.

The rules also allow teachers to copy “snippets” from DVDs for educational compilations, and confer the right to have third-party software read copy-protected electronic books –if you’re blind.

The Digital Millenium Copyright Act (DMCA) has been held to crimizalize circumvention of any kind of software protection, even in the pursuit of applications that would have previously been considered fair use. There is at least one ongoing legal action concerning recycled cell phones based on this law, according to Librarian of Congress James H. Billington. But not after today.

You can see the full list of 6 exemptions here.

Source: Wired Blog


Posted in: Legal Issues

Tags: , , , , , , ,

Posted in: Legal Issues | Add a Comment
Recent in Legal Issues:
- The Panama Papers Leak – What You Need To Know
- FBI Backed Off Apple In iPhone Cracking Case
- TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

Related Posts:

Most Read in Legal Issues:
- Class President Hacks School Grades - 80,703 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,635 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,627 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


TXDNS 2.0.0 Released – DNS Digger for Brute Force

Find your website's Achilles' Heel


TXDNS 2.0.0 has been released.

TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques:

  • Typos
  • TLD rotation
  • Dictionary attack
  • Brute force

This new version features a distributed model which further boosts TXDNS’s parallelism and performance. This model allows a TXDNS client to send jobs to a TXDNS server over a clear or encrypted TCP channel.

For example, to put a TXDNS host on listening mode:

By default TXDNS listens on port 5353. On the client side you may postany query jobs by appending ‘-c xx.xx.xx.xx’ to the regular query syntax (where xx.xx.xx.xx is the host’s IP running TXDNS on listening mode), for example:

Using -cr instead of -c will force the TXDNS server to redirect all output to the client, so basically you get the results from the server’s job right on the client console. Note that file system streams are not redirected, which means that any file switches (-f or -h) will still have the remote host as root reference.

To encrypt all the traffic between the client and the server just append ‘–key ‘ to the regular syntax on both the client and server.

A new –countdown option has been added as a very basic synchronization mechanism, and by default, any jobs, no matter remote or local will now delay for 5s before firing. If you want to bypass this countdown delay you’ll have to add ‘–countdown 0’.

You can read more and download at:

http://www.txdns.net


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- DMitry – Deepmagic Information Gathering Tool
- Automater – IP & URL OSINT Tool For Analysis
- shadow – Firefox Heap Exploitation Tool (jemalloc)

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,981,469 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,434,253 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 680,892 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Firefox Patches 8 Security Vulnerabilities with 2.0.0.1

Your website & network are Hackable


Grab the new Firefox now, 2.0.0.1! 8 Security Vulnerabilities have been fixed in this last release of the year 2006.

I’m glad to see Firefox upholding their quick turnaround and rapid fixing of issues that spring up during development and improvement of their product.

Mozilla has released the first update for the Firefox 2.0 browser to fix eight security vulnerabilities.

According to the company, release 2.0.0.1 of Firefox fixes flaws in memory corruption as well as the way the browser executes RSS (really simple syndication), Javascript and CSS (cascading style sheets) code, among other vulnerabilities. Mozilla also patched similar flaws in its Firefox 1.5 browser.

Five of the eight flaws were rated as critical, according to Firefox. A critical rating means a Firefox user would be vulnerable to attack and remote software installation on their machines just from browsing the Web in the usual fashion. Two of the flaws were rated as high, while one received a low security-risk rating, Firefox said.

Mozilla’s advisory and information on the update can be found on the company’s Web site.

Danish security firm Secunia ApS also posted information about the patches on its Web site.

Source: Infoworld


Posted in: Exploits/Vulnerabilities, Web Hacking

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- shadow – Firefox Heap Exploitation Tool (jemalloc)
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,985 views
- AJAX: Is your application secure enough? - 120,149 views
- eEye Launches 0-Day Exploit Tracker - 85,576 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Awareness of Phishing is on the Up – But so are Monetary Losses

Your website & network are Hackable


It seems like phishers are changing their tactics to those similar to spammers, rather than going for big targets and mass mails they are turning to more wealthy customers and fewer but larger bounties.

Imagine if they can nail a few big ones, they are set.

Online fraudsters are turning their attentions away from large banks and increasingly targeting wealthy consumers as phishing schemes continue to lure large numbers of people into unknowingly sharing their private information with criminals, reports Gartner.

Americans are losing fewer dollars to online phishing schemes as a whole, but Internet-savvy, affluent PC users are being hit up for more money than ever, according to the latest Gartner research.

Based on a survey of 5,000 consumers in the United States, Gartner said users are being assaulted with more phishing attacks than ever before and are falling for more of the gimmicks. Yet at the same time, customers are losing less money to the schemes, due to a growing awareness of the online fraud model, as banks and other businesses spoofed in the attacks have put more tools in place to help identify suspicious behavior.

So phishing is on the up…and so are monetary losses, people are generally losing less but more people are losing and wealthier people are being targeted so the average has gone up.

There really is an amazing amount of phishing going on

artner estimates that 109 million U.S. adults received phishing e-mails during the last 12 months, compared to only 57 million in 2004. An estimated 24.4 million Americans went on to click on phishing e-mails in 2006, up from approximately 11.9 million in 2005. The company said 3.5 million adults gave sensitive information to fraudsters in 2006, compared to only 1.9 million adults last year.

Based on the survey, the average loss per victim has grown from $257 to $1,244 per victim in 2006. Finding a refund for money lost to the schemes has also become harder: Consumers recovered approximately 80 percent of their cash in 2005, but are getting back an average of only 54 percent in 2006.

The moral of the story is…don’t fall for it, because it is your fault and it’ll be hard to get your money back.

Awareness generally is higher, but people are still getting conned left right and center.

As with any technology, it enables bad just as well as good.

Source: Eweek


Posted in: Legal Issues, Phishing

Tags: , , , , , , , , , ,

Posted in: Legal Issues, Phishing | Add a Comment
Recent in Legal Issues:
- The Panama Papers Leak – What You Need To Know
- FBI Backed Off Apple In iPhone Cracking Case
- TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

Related Posts:

Most Read in Legal Issues:
- Class President Hacks School Grades - 80,703 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,635 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,627 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Merry Christmas to All

Your website & network are Hackable


It’s been a good year for Darknet since the relaunch in February and I’d like to take this chance to thank you for your readership, with over 2300 RSS subscribers during the week the readership has grown into a solid base.

I’d like to thank you all for reading, commenting and linking to Darknet and supporting what we are doing, we hope to continue providing you with the latest, most important news, tutorials and articles about information security.

Geek Xmas

Merry Christmas to all of you and your families/loved ones.

Hack safe and I hope you got some great gadgets for xmas.


Posted in: Site News

Tags: , ,

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,592 views
- Get the ball rollin’ - 19,003 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,263 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


projectBypass

Find your website's Achilles' Heel


Today while browsing I suddenly came across projectBypass, which is a very useful website which acts as a proxy, and assures us 100% anonymity:

Make ProjectByPass your homepage for 100% secure web surfing! Keep your online activity free from potential attackers.

…of course I have my doubts about this because…

ProjectByPass.com is a FREE Web Based CGI Proxy that allows users to have complete anonymity while browsing the internet. The ProjectByPass CGI Proxy can also be used to bypass school or business filters to play games or visit otherwise blocked websites. Remember, everything that is done with the CGI Proxy is logged to prevent from malicious activity. ProjectByPass.com did not publish any of the information seen within the CGI Proxy, we’re simply a portal to help get you there.

100% anonymity?…I posted it separately from the topic Browse Anonymously at Work or School – Bypass Firewall & Proxy because it has some useful extra options like: remove (cookies, scripts, ads) and hide referrer information.

It’s worth trying it out ;)

www.projectBypass.com


Posted in: Privacy

Tags: , , ,

Posted in: Privacy | Add a Comment
Recent in Privacy:
- BeautifulPeople.com Leak Exposes 1.1M Extremely Private Records
- Recon-ng – Web Reconnaissance Framework
- IPGeoLocation – Retrieve IP Geolocation Information

Related Posts:

Most Read in Privacy:
- Browse Anonymously at Work or School – Bypass Firewall & Proxy - 180,158 views
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,401 views
- Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies - 122,649 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Skype Worm in the Wild – W32.Chatosky

Find your website's Achilles' Heel


A new worm is spreading fast on the Skype network, it’s activated by a malicious Skype Chat link and it has been seen in the wild in numerous places.

Apparently the dangerous link starts with “Check this!” pointing to a .org/.biz address, if you click the link you’ll become infected.

There have been no reports of unpatched issues with Skype so the vector for the attack at present is unknown, after discussion with the Skype developers it’s found the Trojan is using features from the Skype API to propogate, so there is no flaw in Skype.

The end-user who is running Skype does get notified that a program is attempting to access it and must acknowledge it.

From Websense the details we have are:

  • The filename is sp.exe
  • Assuming the file is run it appears to drop and run a password stealing Trojan Horse
  • The file also appears to run another set of code that uses Skype to propagate the original file
  • The file is packed and has anti-debugging routines (NTKrnl Secure Suite packer)
  • The file connects to a remote server for additional code
  • The original site has been black holed and is not serving the code anymore
  • The original infections appear to be in APAC region (Korea in particular)

It appears that Symantec uses name W32.Chatosky when they released a description document about the worm.

The malware queries Skype for random users every three minutes and an error message is being displayed if there is no Skype installed to the system.

As always be wary :)


Posted in: Malware, Network Hacking

Tags: , , , , , , , ,

Posted in: Malware, Network Hacking | Add a Comment
Recent in Malware:
- Cuckoo Sandbox – Automated Malware Analysis System
- movfuscator – Compile Into ONLY mov Instructions
- MISP – Malware Information Sharing Platform

Related Posts:

Most Read in Malware:
- Nasty Trojan Zeus Evades Antivirus Software - 77,514 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,635 views
- US considers banning DRM rootkits – Sony BMG - 44,988 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95