Archive | February, 2007

THC-Hydra – The Fast and Flexible Network Login Hacking Tool

Don't let your data go over to the Dark Side!


THC-Hydra rocks, it’s pretty much the most up to date and currently developed password brute forcing tool around at the moment.

It supports a LOT of services and protocols too.

Number one of the biggest security holes are passwords, as every password security study shows. Hydra is a parallelized login cracker which supports numerous protocols to attack. New modules are easy to add, beside that, it is flexible and very fast.

THC-Hydra

There are already several login hacker tools available, however none does either support more than one protocol to attack or support parallelized connects.

Currently this tool supports:

TELNET, FTP, HTTP-GET, HTTP-HEAD, HTTPS-GET, HTTP-HEAD, HTTP-PROXY, LDAP2,
LADP3, SMB, SMBNT, MS-SQL, MYSQL, POSTGRES, REXEC, SOCKS5, VNC, POP3, IMAP,
NNTP, PCNFS, ICQ, SAP/R3, Cisco auth, Cisco enable, SMTP-AUTH, SSH2, SNMP,
CVS, Cisco AAA.


However the module engine for new services is very easy so it won’t take a long time until even more services are supported. Planned are: SSH v1, Oracle and more…

This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system.

There is a lot more information contained in the README file here.

You can download Hydra here:

hydra-5.4-src.tar.gz

Compile and install (./configure; make; make install)

IF you want the windows version you can grab this Cygwin version:

hydra-5.4-win.zip

More info is available here:

THC-Hydra Homepage


Posted in: Hacking Tools, Network Hacking, Password Cracking

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Password Cracking | Add a Comment
Recent in Hacking Tools:
- Recon-ng – Web Reconnaissance Framework
- INURLBR – Advanced Search Engine Tool
- DNSRecon – DNS Enumeration Script

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,968,777 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,385,238 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 673,846 views

Get 50% off your second year with our 2-year deal!


0-day Vulnerability Effects Solaris – Disable Telnet NOW!

Cybertroopers storming your ship?


Solaris is pwned by a similar vulnerability to one discovered on AIX systems in 1994.

Yes people that’s 13 years ago…and Sun are still vulnerable, as reported by SANS.

The following will give you root on a lot of Solaris systems:

Cool eh?

The Internet Storm Center is urging system administrators to disable or restrict telnet functionality to contain the zero-day vulnerability, which, according to center, affects only the most recent versions of Solaris and OpenSolaris.

Sun executives talk up secure Solaris at just about every turn. However, some simple tinkering with the OS’s telnet user environment variable can give outsiders free reign with no authentication requirements. No special tools are required to exploit the vulnerability. Sans has long urged against the use of reusable clear-text passwords when administering telnet.

A Sun spokesman says the company has been able to verify the vulnerability and is in the process of testing a fix. He also says that by default telnet is disabled in Solaris 10, and users would have to follow a series of steps to enable it and even more to allow it to administer root privileges. Sun has long recommended Solaris SecureShell as a more secure alternative to telnet.

So disable telnet now, if you haven’t already..Yes I know Sun are still teaching people to use telnet in their classes, which I find kind of sad.

Like someone else said, I doubt any of us would even use telnet on an exposed system…but we have all worked for corporations or seen people that would.

Source: The Register


Posted in: Exploits/Vulnerabilities, Network Hacking, UNIX Hacking

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Network Hacking, UNIX Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- DROWN Attack on TLS – Everything You Need To Know

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,052 views
- AJAX: Is your application secure enough? - 119,981 views
- eEye Launches 0-Day Exploit Tracker - 85,452 views

Get 50% off your second year with our 2-year deal!


AccessDiver – Web Site Security Testing Tool

Cybertroopers storming your ship?


AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site.

AccessDiver can detect security failures on your web pages. It has multiple efficient tools which will verify the robustness of your accounts and directories accurately. So, you will know if your customers, your users and yourself can safely use your web site.

AccessDiver

Here is a quick list of the features available:

  • Contains fast security that uses up to 100 bots to do its analysis.
  • Detects directory failures by comparing hundreds of known problems to your site.
  • AccessDiver is fully proxy compliant and has a proxy analyzer (speed / anonymity) and a proxy hunter built-in.
  • A built-in word leecher helps you increase the size of your dictionaries to expand and reinforce your analysis.
  • A powerful task automizer manages your jobs transparently. You can tackle unlrelated tasks while Accessdiver is working, saving you time.
  • An on-the-fly word manipulator lets you increase the strength of your dictionaries easily when doing your analyzis.
  • A PING tester is included to tell you the efficiency of your site and the efficiency of an Internet address you would like to access.
  • A DNS resolver lets you look up the host name of an IP address and reverse the process to learn an unknown host name.
  • A feature called ‘HTTP debugger’ helps your understanding of how actual HTTP protocol works. It opens up the process so you see what really happens during a connection problem.
  • A WHOIS gadget lets you retrieve owner information of a domain name (in case you would like to buy the domain or contact the actual owner).
  • An update notifier automatically tells you when a new version of AccessDiver is available.

You can find out more here and download AccessDiver here:

AccessDiver


Posted in: Hacking Tools, Web Hacking

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Recent in Hacking Tools:
- Recon-ng – Web Reconnaissance Framework
- INURLBR – Advanced Search Engine Tool
- DNSRecon – DNS Enumeration Script

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,968,777 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,385,238 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 673,846 views

Get 50% off your second year with our 2-year deal!


Google Fixes Serious Vulnerability in Gmail

Don't let your data go over to the Dark Side!


Google started the new year by fixing a serious vulnerability in Gmail.

This was quite an interesting case and once again (as everything relating to web apps seems to be nowdays) it was an XSS flaw that allowed malicious attackers to steal your contact list, leading to some pretty bad information leakage.

Google has fixed a vulnerability in its popular GMail web mail service that creates a means for hackers to steal users’ contact lists.

The cross-site scripting flaw stemmed from the decision by GMail to store contact lists in a JavaScript file. GMail always saves contact lists as JavaScript code using the same URL, so a script featuring this URL can read out the fields of a users’ contact list. GMail failed to check what sites were attempting to run this “callback” function.

There was a previous very similar flaw on Google which effected computers with multiple Gmail users.

As a result users logged into GMail, or other Google services sharing the same login, are liable to hand over their contact list to spammers or other miscreants providing they are tricked into visiting a maliciously constructed website. Exploitation would have been as simple as fooling users into visiting a hostile website through spam messages sent to users’ email accounts.

Coders failed to take into account that it was a bad idea to save sensitive data as JavaScript, under predictable URLs, a problem Google watchers spotted shortly after Google made the coding changes last week

I do like Google though, they tend to fix things pretty fast!

Source: The Register


Posted in: Exploits/Vulnerabilities, Web Hacking

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- DROWN Attack on TLS – Everything You Need To Know

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,052 views
- AJAX: Is your application secure enough? - 119,981 views
- eEye Launches 0-Day Exploit Tracker - 85,452 views

Get 50% off your second year with our 2-year deal!


Happy 1 Year Anniversary to the Relaunch of Darknet

Cybertroopers storming your ship?


Yes it’s been exactly one year since Darknet was relaunched in it’s new form supported by WordPress and a variety of posts about tools, tutorials and the latest news from the information security and specifically ethical hacking areas.

The first post of the new site:

Welcome to Darknet – The REBIRTH

It’s been an interesting year with 2 posts being published on the front page of Slashdot and 6-7 reaching the front page of Digg.

Those posts of note would be:

Basically the top few you can find at the Darknet Popular page.

You can have a look through the Darknet Archives for some other stuff to read if you are interested.

We’d like to take this opportunity to thank all of our loyal readers, RSS subscribers, e-mail subscribers and random browsers for taking some time to look at this site, read and comment on our articles.

We would of course love more comments!

And if there’s any particular topics you’d like us to cover do let us know and we’ll work on something.

Do help promote Darknet by mentioning it to your friends, or even better if you have a blog or website, do drop us a link and a mention in one of your posts!


Posted in: Site News

Tags: , , , , , , , , ,

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,563 views
- Get the ball rollin’ - 18,990 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,250 views

Get 50% off your second year with our 2-year deal!


Secunia Releases Software Inspector

Don't let your data go over to the Dark Side!


Feature Overview – The Secunia Software Inspector:

  • Detects insecure versions of applications installed
  • Verifies that all Microsoft patches are applied
  • Assists you in updating your system and applications
  • Runs through your browser. No installation or download is required.

How Does it Work:

The Secunia Software Inspector relies on carefully crafted “Secunia File Signatures” to recognise applications on your system. The detected applications are then matched against our “Secunia Advisory Intelligence” to determine whether an application is up-to-date or not. The results are then used to advise you on how to update to more secure releases of the insecure applications.

Microsoft Windows Update is used to determine if your system is missing security updates from Microsoft.

The Secunia Software Inspector covers the most common/popular end user applications:

  • Internet browsers
  • Internet browser plugins
  • Instant messaging clients
  • Email clients
  • Media players
  • Operating systems

Minimum Requirements:

  • Windows 2000, Windows XP, or Windows 2003
  • Sun Java JRE 1.5.0_06
  • Internet Explorer 6.x, Opera 9.x, or Firefox 1.5.x
  • Latest version of Microsoft Windows Update

You can find the Inspector here:

Secunia Software Inspector


Posted in: Exploits/Vulnerabilities, Security Software, Windows Hacking

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Security Software, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- BADLOCK – Are ‘Branded’ Exploits Going Too Far?
- DROWN Attack on TLS – Everything You Need To Know

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,052 views
- AJAX: Is your application secure enough? - 119,981 views
- eEye Launches 0-Day Exploit Tracker - 85,452 views

Get 50% off your second year with our 2-year deal!


Spam on the Increase – Image Spam Accounting for More

Cybertroopers storming your ship?


As always, spam filters get better and smarter, but so do spammers..and frankly spammers have more to gain by beating the spam filters so they always work harder and think in more innovative ways.

As they get their spam resembling real emails more and more, the spam filters become less accurate.

On top of that they start using images to get the spam message across so it’s even harder to filter.

Earlier this year we thought the good guys were winning the war against spam. Back in January, I talked to spam fighters who were claiming victory in the spam wars. One company told me that the volume of spam had stopped growing at double-digit rates for the first time.

But that may have changed. Researchers and IT managers are now complaining that spam levels have risen significantly in recent months — some organizations have reported increases as high as 80 percent. Overall spam volume has increased 67 percent since August 2006, according to Barracuda Networks, an enterprise security appliance vendor.

I have noticed a massive surge in spam recently, especially comment and trackback spam, that’s why I’ve had to install more aggressive antispam measures on this site as it was getting overwhelming.

The new breed of spam manages to evade filters because it contains no suspect words, is sent from hundreds of thousands of different PCs, and includes no links. How does it work?

The new spam evades traditional spam filters because it doesn’t include any text — instead, it uses an image embedded in the body of an e-mail to deliver its message. This image includes text that displays the spammer’s message. But to make it hard for spam filters that may use optical character recognition technology to scan and read the text in the images, spammers are getting sneakier. They’re sending pictures with textured backgrounds or various colors to throw off the filters. They’re also varying the font for each letter of the text.

This way a spam filter can’t tell an unsolicited stock tip from a holiday picture of the family.

People are doing some interesting stock manipulation scams involving spam and penny stocks, do read the rest of the article at Infoworld.

Source: Infoworld


Posted in: General News, Phishing, Spammers & Scammers

Tags: , , , , , , , , , ,

Posted in: General News, Phishing, Spammers & Scammers | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,365 views
- eEye Launches 0-Day Exploit Tracker - 85,452 views
- Seattle Computer Security Expert Turns Tables On The Police - 43,608 views

Get 50% off your second year with our 2-year deal!


Caecus – Web Brute Forcing Tool with OCR Support

Cybertroopers storming your ship?


Caecus is a unique tool which can bruteforce some OCR form based protections.

As far as we know at Darknet, this is the only publicly available OCR brute forcing tool.

These scripts generates a digital image as an extra layer of security called OCR. Some versions of this script also use session id’s to keep track of this information.

Caecus

Using Caecus, you can now successfully run attacks on these sites.

There are some ocr sites that use another form type. You can recognize them by the fact that they have a ‘grid’ behind the numbers in the image. Caecus cannot test these sites…yet!

You can read more about download Caecus here:

Caecus at Deny.de


Posted in: Hacking Tools, Web Hacking

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Recent in Hacking Tools:
- Recon-ng – Web Reconnaissance Framework
- INURLBR – Advanced Search Engine Tool
- DNSRecon – DNS Enumeration Script

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,968,777 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,385,238 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 673,846 views

Get 50% off your second year with our 2-year deal!


Cafepress.com Under Heavy DDoS Attack

Don't let your data go over to the Dark Side!


Towards the end of last year Cafepress.com came under heavy DDoS attack (Distributed Denial of Service) which took it down for some time.

The problem with DDoS attacks is there’s not much you can do to prevent it, if that guy has enough zombies resulting in enough bandwidth, you are going down.

DDoS attacks have gotten pretty ingenious in the last couple of years due to the online extortion games going on.

In a statement to store owners, Jill Ambrose of CafePress.com said the targeted attack had resulted in “significant service interruptions”.

“As of right now some customers have access that appears normal, some have intermittent access, and some have no access at all. We will continue to update the CafePress Community Forum (http://forums.cafepress.com/eve) as we have more to share, and we urge you to check there for the most recent information,” she said. “We do consider this an attack on CafePress, but we’re most disturbed at how this victimises our community of Shopkeepers.”

I wonder who they pissed off this time?

The motive and source of the attack remain unclear. CafePress.com said it was “working with the proper authorities” in trying to resolve and investigate the source of the attack. CafePress.com handles the website hosting, order fulfillment and payment processing on behalf of various store owners.

Distributed denial of service attacks are used by hackers to disrupt the operation of websites by flooding sites with spurious traffic from zombie computers in an attempt to make them inaccessible to the general public. Experts at net security firm Sophos speculate that the hackers may have deliberately targeted CafePress.com in the run-up to the holidays, a prime shopping period.

Well it seems like site is still slow now, I’m not sure if they are still being attacked or not.

As a side note, to see if anyone actually reads what I write…would anyone be interested in buying some l33t t-shirts if I set up a Darknet Cafepress store?

Source: The Register


Posted in: General News, Network Hacking

Tags: , , , , , , , ,

Posted in: General News, Network Hacking | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,365 views
- eEye Launches 0-Day Exploit Tracker - 85,452 views
- Seattle Computer Security Expert Turns Tables On The Police - 43,608 views

Get 50% off your second year with our 2-year deal!


Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis

Cybertroopers storming your ship?


Introducing a pair of tools that go well together and give you some good control for HTTP transaction analysis and looking at the security of web applications.

Odysseus is a tool designed for testing the security of web applications.

Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Odysseus will intercept an HTTP session’s data in either direction and give the user the ability to alter the data before transmission.

For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Odysseus will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server.

As data is transmitted between the two nodes, Odysseus decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.

You can find more and download Odysseus here:

http://www.bindshell.net/tools/odysseus

Telemachus is a companion utility for Odysseus, allowing further analysis and manipulation of the HTTP transactions that have passed through Odysseus.

Telemachus can communicate with the currently active instance of Odysseus, or alternately load a previously saved Odysseus activity log file.

Although primarily designed to be used in conjunction with Odysseus, Telemachus can be used a stand-alone utility.

You can download Telemachus here:

http://www.bindshell.net/tools/telemachus


Posted in: Hacking Tools, Network Hacking, Web Hacking

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment
Recent in Hacking Tools:
- Recon-ng – Web Reconnaissance Framework
- INURLBR – Advanced Search Engine Tool
- DNSRecon – DNS Enumeration Script

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,968,777 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,385,239 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 673,846 views

Get 50% off your second year with our 2-year deal!