Archive | March, 2007


30 March 2007 | 12,238 views

Metasploit Exploit Framework Version 3.0 Released

Finally it’s out of BETA, Metasploit Framework Version 3.0 has been released and it’s a lot more Windows friendly. The Metasploit Framework (“Metasploit”) is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a [...]

Continue Reading


29 March 2007 | 7,010 views

Agnitum Outpost Firewall PRO Review

Agnitum Outpost Firewall Pro is a software based firewall I respect a lot, and used to actually use…It used to be fairly light weight, secure and had some good features the other firewalls at the time didn’t have (system file integrity checking and so on). But nowadays with NAT routers, the need for desktop firewalls [...]

Continue Reading


27 March 2007 | 11,163 views

FireCAT – Firefox Catalog of Auditing Tools

After the web 2.0 hacking with firefox and its plugins article I wrote some months ago, recently I found a new way to transform firefox in the ultimate pen-testing tool… actually it has been lying in my inbox for days… …new Firefox Framework Map collection of the most useful security oriented extensions. We called the [...]

Continue Reading


27 March 2007 | 4,732 views

JBroFuzz 0.5 from OWASP – Stateless Network Protocol Fuzzer

OWASP JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. Written in Java, it allows for the identification of certain classess of security vulnerabilities, by means of creating malformed data and having the network protocol in question consume the data. The purpose of this application is to provide a [...]

Continue Reading


26 March 2007 | 9,609 views

Hackers Attack Root Servers and Slow Internet Key Traffic

Well at least it shows the Internet is not very susceptible to such attacks due to its distributed nature, even if the root nameservers are down, the DNS system still functions. This was a pretty heavy attack though and the most significant in the past 5 years or so, someone testing their ego I guess. [...]

Continue Reading


23 March 2007 | 14,755 views

ObiWaN – Web Server Brute Forcing from Phenoelit

This Phenoelit tool called ObiWaN is written to carry out brute force security testing on Webservers. The idea behind this is webservers with simple challenge-response authentication mechanism mostly have no switches to set up intruder lockout or delay timings for wrong passwords. In fact this is the point to start from. Every user with a [...]

Continue Reading


22 March 2007 | 4,491 views

Check Point VPN-1 Power VSX NGX – Virtual Firewalls Get Clustered

Clustered Firewalls? What on earth next, beowulf IDS systems? Check Point has added cluster support and more granular controls to its virtual firewall software, memorably named Check Point VPN-1 Power VSX NGX. Virtual firewalls can now be distributed around a server cluster, with standby firewalls on alternative servers. System administrators can also shift processor power [...]

Continue Reading


22 March 2007 | 4,449 views

Backup Platinum – CD, FTP & LAN Backup Software Review

Backup Platinum is an Windows platform backup program to make another copy of your important stuff so if your PC burns/gets pwned/crashes etc you won’t lose everything. It supports backup by Hard or USB drives, CD-R/W or DVD±R/RW media, FTP server or Local Area Network (LAN). It’s easy enough to download and install, you can [...]

Continue Reading


21 March 2007 | 5,832 views

Technika – Automate Common Exploit Tasks

Technika was developed for the computer security professionals to automate common exploitative task from the browser. It acts like a standard OS shell scripting environment. You can script everything from the currently viewed page just like Greasemonkey (spawn processes, unrestricted XMLHttpRequest connections and sockets). You can autorun bookmarklets and perform safe operations on the currently [...]

Continue Reading


20 March 2007 | 3,182 views

Up to a Quarter of Internet Connected Machines Could be Zombies

It’s a scary thought to find out perhaps a quarter of Internet connected machines could be zombies…The sad part is, I think it could well be true, as most of the non tech savvy Internet users I know still use Internet Exploder and their machines are riddled with crapware, trojans, viruses and spyware. Imagine how [...]

Continue Reading