Archive | 2006


20 December 2006 | 36,105 views

XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool

XSS Shell is a powerful XSS backdoor which allows interactively getting control over a Cross-site Scripting (XSS) vulnerability in a web application. Demonstrates the real power and damage of Cross-site Scripting attacks. WHAT IS XSS SHELL ? XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by XSS-Proxy (http://xss-proxy.sourceforge.net/). Normally [...]

Continue Reading


19 December 2006 | 7,644 views

Save Your Reputation Online with ReputationDefender

This is a pretty interesting idea and for once it addresses a real requirement. A lot of stories have hit the press about people getting fired or ‘dooced’ because of stuff online or not even getting jobs because of something found on MySpace. So up pops a company that is willing to protect your reputation [...]

Continue Reading


18 December 2006 | 12,457 views

SinFP 2.0.4 – OS Detection – Now Works On Windows

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations [...]

Continue Reading


14 December 2006 | 6,048 views

the Art of Virology 02h

This is the one and only (and first article) which will present you the source code of a virus on Darknet, and a lame one too :) Theory again… First should mention a couple of things which haven’t been specified till now. This virus is going to be an appending virus: An appending virus is [...]

Continue Reading


14 December 2006 | 16,737 views

Hackers Break Into Water Processing Plant Network

When things like this happen it’s kinda of scary, like a while back when someone managed to get into a highly secure power station network through a stupid contractors laptop that was connected to the net via dialup and to the uber ‘secure’ power station LAN. An infected laptop PC gave hackers access to computer [...]

Continue Reading


13 December 2006 | 8,397 views

Backframe (Formerly Backweb) JavaScript Attack Console

There has been a recent release of Backframe (Formerly Backweb) Attack Console. Backframe Attack Console was started as an experiment to create a full featured attack console for exploiting web browsers, web users and remote applications. Those who are familiar with XSS Proxy or even BEEF might already be familiar with the core principles of [...]

Continue Reading


11 December 2006 | 5,549 views

Massive Data Theft Operation Uncovered

UK Police have uncovered a fairly massive data theft operation with a total close to 8,500 victims. It’s quite worrying when things like this are uncovered as if 1 is uncovered or discovered…imagine how many aren’t found out about, just like exploits. British electronic-crime detectives are investigating a massive data theft operation that stole sensitive [...]

Continue Reading


08 December 2006 | 7,140 views

NMAP 4.20 released

This is just a simple warning to all NMAP users out there. If you’re registered on the announcement mailing list you already now this, otherwise, heads up. NMAP 4.20 has been released with something that looks promising. 2nd generation OS detection. The changelog is available here. Enjoy!

Continue Reading


08 December 2006 | 9,561 views

Linux Reverse Engineering Hacker Challenge

The first round results of the Linux Reverse Engineering Hacker Challenge are out! http://www.hackerchallenge.org It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first Hacker [...]

Continue Reading


07 December 2006 | 5,011 views

(IN)SECURE Magazine ISSUE 1.9 – December 2006

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. It can be distributed only in the form of the original non-modified PDF document. The 9th issue of (IN)SECURE magazine was recently released, in this issue you can find the following: Effectiveness of security by admonition: a case [...]

Continue Reading