Archive | July, 2007


31 July 2007 | 13,685 views

Wfuzz – A Tool for Bruteforcing/Fuzzing Web Applications

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. The tool is based on dictionaries and ranges, you choose where you want to [...]

Continue Reading


30 July 2007 | 4,519 views

Hackers Steal U.S. Government Corporate Data from PCs – AGAIN

Seems like a social engineering type attack again relying on human ignorance and stupidity. Based around some kind of malware reporting back to a central repository. Remember kids if a deal is too good to be true…it isn’t. Hackers stole information from the U.S. Department of Transportation and several U.S. companies by seducing employees with [...]

Continue Reading


27 July 2007 | 4,887 views

Babel Enterprise – Cross Platform System Auditing Tool

Babel Enterprise is a systems auditing tool. Babel performs a security level check of the machine, or hardening. The check consists of a number of auditing tests that obtain a snap of the security status of each machine. The result is a security index of the system that is given after each execution. It a [...]

Continue Reading


26 July 2007 | 7,661 views

TimeWarner DNS Hijacking IRC Servers to Stop DDoS Attacks

An interesting happening this week, some ISP’s have been jacking the DNS entries for certain IRC networks to crack down on zombie/bot infections. Is it ethical? Should they be doing this to their users? I first got wind of this from a post on Full Disclosure mailing list from an IRC network administrator. You can [...]

Continue Reading


25 July 2007 | 9,523 views

Dr. Morena – Firewall Configuration Testing Tool

Dr.Morena is a tool to confirm the rule configuration of a Firewall. The configuration of a Firewall is done by combining more than one rule. Sometimes a rule configuration may reside in a place other than the basic rule configuration place. In such a case, it is difficult to confirm whether it is an intended [...]

Continue Reading


24 July 2007 | 14,579 views

Some Guidelines on How to Secure your Ubuntu Installation

Since Ubuntu is getting so fantastically popular nowadays I thought this might be useful to some of you. I personally think Ubuntu is great, the features, ease of installation, stability and especially the work they have done on things like wireless drivers make it a breeze to get up and running. It is a pretty [...]

Continue Reading


23 July 2007 | 19,868 views

piggy – Download MS-SQL Password Brute Forcing Tool

Piggy is yet another tool for performing online password guessing against Microsoft SQL servers. It supports scanning multiple servers using a dictionary file or a file with predefined accounts (username and password combinations). It’s a pretty simple tool and has a Win32 binary verson – it is a command line tool however.

You can [...]

Continue Reading


22 July 2007 | 67,469 views

The greatest virus of all time

There is a virus on the net from a long time, the damage inflicted by it is unstoppable, or at least that was though, check it out yourself …just kidding, it does not exist but such a virus would be something great =)

Continue Reading

Tags: ,

20 July 2007 | 227,228 views

Learn to use Metasploit – Tutorials, Docs & Videos

Metasploit is a great tool, but it’s not the easiest to use and some people get completely lost when trying to get the most out of it. To help you guys out here is a bunch of links, videos, tutorials and documents to get you up to speed. You can start with this, a good [...]

Continue Reading


19 July 2007 | 13,268 views

FTester – Firewall Tester and IDS Testing tool

The Firewall Tester (FTester) is a tool designed for testing firewalls filtering policies and Intrusion Detection System (IDS) capabilities. The tool consists of two perl scripts, a packet injector (ftest) and the listening sniffer (ftestd). The first script injects custom packets, defined in ftest.conf, with a signature in the data part while the sniffer listens [...]

Continue Reading