Archive | December, 2007

Nmap Port Scanner 4.50 Released for Download

Find your website's Achilles' Heel


At last a new major release of Nmap!

If for some odd reason you don’t already know what Nmap is, it is a free and open source utility for network exploration or security auditing. Many systems and network administrators also find it useful for tasks such as network inventory, managing service upgrade schedules, and monitoring host or service uptime. Nmap uses raw IP packets in novel ways to determine what hosts are available on the network, what services (application name and version) those hosts are offering, what operating systems (and OS versions) they are running, what type of packet filters/firewalls are in use, and dozens of other characteristics.

The changelog shows 320 changes since 4.00 with a lot of great stuff in this release! It has a brand new GUI and results viewer (Zenmap), a scripting engine allowing you to write your own scripts for high-performance network discovery (or use one of the 40 scripts shipped with it), the 2nd generation OS detection system (now with more than a thousand fingerprints), nearly 1,500 more version detection signatures, and a lot more!

Zenmap is the official Nmap Security Scanner GUI. It is a multi-platform (Linux, Windows, Mac OS X, BSD, etc.) free and open source application which aims to make Nmap easy for beginners to use while providing advanced features for experienced Nmap users. Frequently used scans can be saved as profiles to make them easy to run repeatedly. A command creator allows interactive creation of Nmap command lines. Scan results can be saved and viewed later. Saved scan results can be compared with one another to see how they differ. The results of recent scans are stored in a searchable database.

Zenmap for Nmap

More on Zenmap here:

Zenmap – the Nmap GUI

You can download the new Nmap here:

Nmap 4.50

Or read more here.


Posted in: Hacking Tools, Network Hacking, Security Software

Tags: , , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment
Recent in Hacking Tools:
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- UFONet – Open Redirect DDoS Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,987,616 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,458,386 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 684,382 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Microsoft Plugs 11 Serious Flaws in December Update

Your website & network are Hackable


Seen as though we’ve been having a good bash on Microsoft recently, here’s some more relevant news. The December update from Microsoft has delivered patches for 11 series flaws spanning both IE6 & IE7 and all their currently supported operating systems (Windows 2000, Windows XP and Windows Vista).

So if you are running Windows, make sure you get your updates downloaded and installed before you’re away from your PC during this festive season.

Microsoft today released software updates to plug at least 11 security holes in PCs powered by its Windows operating systems and other software. Windows users can download the fixes either directly through the Microsoft Update Web site or via Automatic Updates.

December’s seven update bundles includes fixes for four separate security holes in Internet Explorer 6 and IE7, vulnerabilities that are considered critical for Windows 2000, Windows XP and Windows Vista users. Microsoft rates a flaw “critical” if it can be exploited to break into vulnerable systems with little or no help from the user, save perhaps for browsing a Web site or by clicking on a malicious link in an e-mail or instant message.

Seems like even though Internet Exploder Explorer is such a ‘stable’ and ‘mature’ product – it’s not immune to serious problems. I’m sorry but it’s a web-browser..how complicated can it be!

Microsoft also issued critical updates to fix at least two different problems with the way Windows handles the processing and display of various video and audio files. The first of those is a serious vulnerability in the “Windows media file format” — chiefly, files that end in “.asf” and “.wmv” — used principally by the Windows Media Player software bundled with the operating system. Another patch addresses a critical flaw in most versions of “DirectX,” a Windows component that handles the display of a variety of video file formats (files that end in “.wav” and “.avi” for example). Again, these are especially dangerous flaws because they can be exploited merely by getting users to view maliciously crafted video files via a Web browser or e-mail.

Of the seven patch bundles released today, only two did not affect Windows Vista systems, suggesting that the vulnerable components were carried over into Vista from older versions of the OS despite the multi-year secure coding review conducted for Vista. That said, two of the bundles were released to plug security holes that were found exclusively in Vista.

This news directly related to what we have been discussing recently, how previous Windows flaws carry over into the supposidly ‘all-new’ Windows Vista.

Only TWO of the problems did not effect Vista, which shows that the problems that effect an OLD (8 years old now) OS like Windows 2000 are still effecting Vista.

Source: Security Fix


Posted in: Exploits/Vulnerabilities, Windows Hacking

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- Pompem – Exploit & Vulnerability Finder
- Bug Bounties Reaching $500,000 For iOS Exploits

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,456 views
- AJAX: Is your application secure enough? - 120,210 views
- eEye Launches 0-Day Exploit Tracker - 85,653 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


KisMAC – Free WiFi Stumbler/Scanner for Mac OS X

Your website & network are Hackable


KisMAC is an opensource and free stumbler/scanner application for Mac OS X. It has an advantage over MacStumbler/iStumbler/NetStumbler in that it uses monitor mode and passive scanning.

KisMAC supports several third party PCMCIA cards – Orinoco, PrismII, Cisco Aironet, Atheros and PrismGT. USB Prism2 is supported as well, and USB Ralink support is in development. All of the internal AirPort hardware is supported as well.

System Requirements

  • Mac OS 10.4
  • A Mac with a supported PCMCIA, USB or internal AirPort

Features


  • Reveals hidden/cloaked/closed SSIDs
  • Shows logged in Clients (with MAC Addresses, IP addresses and signal strengths)
  • Mapping and GPS support
  • Can draw area maps of network coverage
  • PCAP import and export
  • Support for 802.11b,g,n
  • Different attacks against encrypted networks
  • Deauthentication attacks
  • AppleScript-able
  • Kismet drone support (capture from a Kismet drone)

Active mode, also referred to as managed mode, sends probe requests and is pretty boring.
Passive mode is more commonly known as monitor mode, and passively monitors what’s already in the air without interfering in it.
Active attacks like deauth and reinjection (where supported) require your device to be in monitor or passive mode.

You can download KisMAC here:

KisMAC

Or read more here.


Posted in: Apple, Hacking Tools, Wireless Hacking

Tags: , , , , , , , , , , ,

Posted in: Apple, Hacking Tools, Wireless Hacking | Add a Comment
Recent in Apple:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- FBI Backed Off Apple In iPhone Cracking Case
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

Related Posts:

Most Read in Apple:
- KisMAC – Free WiFi Stumbler/Scanner for Mac OS X - 83,036 views
- Apple Struggling With Security & Malware - 24,140 views
- Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) - 15,969 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Serious Flaw in Popular Media Players from Microsoft and AOL

Your website & network are Hackable


It looks like there is a fairly serious vulnerability in some of the popular media player packages out in the wild packaged as a MP4 file (due to the MP4 codec from 3ivx), it effects Windows Media Player 6.4 and Windows Media Player Classic, which are made by Microsoft, and AOL’s Winamp version 3.5.

All the more reason to use VLC! This follows fairly shortly after a couple of quite serious vulnerabilities in Quicktime.

Security researchers are warning that popular media players offered by Microsoft and AOL are vulnerable to attacks that can completely compromise a user’s PC.

Attack code has already been released for the bug, which has been confirmed in a codec used by older versions of Windows Media Player, made by Microsoft, and in AOL’s Winamp. A Symantec researcher has warned that users of other players may also be at risk because the vulnerability itself resides in a commonly used MP4 codec produced by a company called 3ivx Technologies.

“The exploit works by supplying victims with a maliciously formed MP4 file,” Raymond Ball wrote for Symantec’s DeepSight Threat Management System. “When a victim unknowingly clicks a link that appears safe, the MP4 content is delivered, causing the exploit to run.”

At least it’s not Microsoft’s fault this time, but they did use a dodgy codec so I guess some of the blame lays with them right?

They could have checked it out properly before bundling it into their software.

A researcher who goes by the name SYS 49152 released exploit code here, here and here that targets Windows Media Player 6.4 and Windows Media Player Classic, which are made by Microsoft, and AOL’s Winamp version 3.5. Each uses the 3ivx MP4 codec, which is vulnerable to a stack overflow.

Secunia describes the Windows Media Player vulnerabilities as “highly critical,” the second-highest rating on Secunia’s five-tier scale. The vulnerability reporting service didn’t have a rating for the Winamp vulnerability.

No patch is available. Ball recommends users remove the codec or disable media players that use the MP4 codec until the hole is plugged. That strikes us as overkill. Taking care not to click on suspicious links in browsers and email programs should suffice.

So watch out, attack vectors are getting more varied – don’t let your guard down during this merry season.

Source: The Register


Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- Pompem – Exploit & Vulnerability Finder
- Bug Bounties Reaching $500,000 For iOS Exploits

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,456 views
- AJAX: Is your application secure enough? - 120,210 views
- eEye Launches 0-Day Exploit Tracker - 85,653 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


scanrand – Download Stateless TCP Scanner with Syn Cookies

Find your website's Achilles' Heel


Scanrand is extremely quick and effective port scanner. It works by forking two distinct processes:

  • One to send the initial queries
  • One to receive responses and reconcile them from the above

This makes it extremely fast.

If you haven’t heard of the suite, Scanrand is one of the five tools in Paketto Keiretsu by Dan “Effugas” Kaminsky of Doxpara Research.

Scanrand implements numerous options; reasonable defaults are selected when no specific guidance is received from the user. The only thing mandated is a target destination, which may be specified using either a FQDN(Fully Qualified Domain Name) or a numeric specification.

These numerics may employ any number of dashes, commas, or combination thereof at the same time. For example, scanrand 10.0.1-255.1-10,20:80,137-139 works fine.

More ports will be scanned by default when scanning a single host than when sca
nning a network. Scanrand is able to estimate remote hopcount by examining incoming TTLs.

Note please to install scanrand you need to first install the provided libnet, libtomcrypt and libpcap tarballs.

It’s a good alternative to nmap for certain purposes

You can read a good article on Scanrand here:

Scanrand Dissected: A New Breed of Network Scanner

The article includes nmap vs scanrand.

You can download Scanrand here (as part of Paketto):

paketto-1.10.tar.gz

Or read more here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- PowerOPS – PowerShell Runspace Portable Post Exploitation Tool
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- UFONet – Open Redirect DDoS Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,987,616 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,458,386 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 684,382 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


SANS Top 20 Vulnerabilities Published for 2007

Your website & network are Hackable


It’s that time of the year, our annual christmas present – the Sans Top 20 Vulnerabilities for 2007.

The SANS Top 2007 list is not “cumulative.” We include only critical vulnerabilities from the past year or so. If you have not patched your systems for long time, it would be wise to patch the vulnerabilities listed in the Top 20 2006 list as well as those in the prior lists. At the end of this document, you will find a short FAQ (list of frequently asked questions) that answers questions you may have about the project and the way the list is created.

This year’s list of top risks diverges from lists in past years that focused on very specific technical vulnerabilities that could be fixed by tweaking a configuration or applying one patch. Because attackers are moving so quickly today, such point-fixes are outdated almost immediately. For that reason, this year’s list of top risks focuses more on the areas that attackers are targeting and where organizations need to enhance their security processes to ensure consistent application of technical fixes.

Read the full list here:

Sans Top 20


Posted in: Exploits/Vulnerabilities, General Hacking

Tags: , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- Pompem – Exploit & Vulnerability Finder
- Bug Bounties Reaching $500,000 For iOS Exploits

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,456 views
- AJAX: Is your application secure enough? - 120,210 views
- eEye Launches 0-Day Exploit Tracker - 85,653 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


November Commenter of the Month Competition Winner!

Your website & network are Hackable


Competition time again!

As you know we started the Darknet Commenter of the Month Competition on June 1st and it ran for the whole of June and July. We have just finished the sixth month of the competition in November and are now in the seventh, starting a few days ago on December 1st – Sponsored by GFI.

We are offering some pretty cool prizes like iPods and PSPs, along with cool GFI merchandise like shirts, keyrings and mugs.

And now the winner will also get a copy of the Ethical Hacker Kit.

GFI Goodies

Keep up the great comments and high quality interaction, we really enjoy reading your discussions and feedback.

Just to remind you of the added perks, by being one of the top 5 commenter’s you also have your name and chosen link displayed on the sidebar of every page of Darknet, with a high PR5 (close to 6) on most pages (4000+ spidered by Google).

So announcing the winner for November…it’s dirty! dirty is a relative newcomer in commenting here, but he’s very active!

Commenter November

Thanks to everyone else who commented and thanks for your links and mentions around the blogosphere!

Feel free to share Darknet with everyone you know :)

Keep commenting guys, and stand to win a prize for the month of December.

We are still waiting for pictures from backbone, Sandeep and TRDQ and dre of themselves with their prizes!

Winner of the month for June was Daniel with 35 comments.
Winner of the month for July was backbone with 46 comments.
Winner of the month for August was TheRealDonQuixote with 53 comments.
Winner of the month for September was Sandeep Nain with 32 comments.
Winner of the month for October was dre with 19 comments.


Posted in: Site News

Tags: , , , , , , , , ,

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,606 views
- Get the ball rollin’ - 19,005 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,264 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


MSF eXploit Builder – Free Win32 Exploit Development Platform

Your website & network are Hackable


The MSF eXploit Builder (MSF-XB) is a free win32 application (GUI) that wants to be an Exploit Development Platform. The main goal is to speed up the exploit development process, this is accomplished by using the powerful functionalities and neat design of The Metasploit Framework.

MSF-XB automatically generates MSF compliants exploits modules.

The MSF-XB package also includes for your convenience:

Fuzzers

  • TAOF, The Art Of Fuzzing v0.3.2
  • ProxyFuzz v0.1, Rodrigo Marcos
  • FileFuzz v1.0.2510.28439, iDefense
  • FTPfuzz v1.0, Infigo
  • WinFuzz v1.0.0.1, Fakehalo

Handy Tools

  • Findjmp2, Class101
  • branchseeker
  • Faultmon
  • mycrc
  • Sysinternals (Microsoft) PStools
  • wget.exe, GNU
  • xCmd (remotexec clone)
  • nc.exe
  • A local database of opcodes/return addresses (Cross-platforms, 10 locales, fast and reverse queries)
  • An ASCII table
  • A lot of converters (Ascii, Hex, Byte, Unicode …)
  • Malcode Analyst Pack v0.2
  • Process Stalker, iDefense

REQUIREMENTS

  • Please edit and customize the MSF-XB.INI file
  • MSF-XB requires the Metasploit Framework installed to work properly (http://www.metasploit.com ): Version 3 is recommended
  • MSF-XB requires a debugger to be installed (Immunity Debugger)

You can download MSF eXploit Builder here:

MSF-XB.EXE (84Mb)

MD5 41e83b8cb8d60d689bff191eb7842fc1
SHA1 1cb0e457c9fa59da8f147a96afb9c1a056a4e655

Or read more here.


Posted in: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking

Tags: , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities
- Pompem – Exploit & Vulnerability Finder
- Bug Bounties Reaching $500,000 For iOS Exploits

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 235,456 views
- AJAX: Is your application secure enough? - 120,210 views
- eEye Launches 0-Day Exploit Tracker - 85,653 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Malware Numbers Still Increasing Rapidly

Find your website's Achilles' Heel


It seems like malware numbers are going up, rather than down as I would expect. But then if you think about it as a numbers game, the more people that come online – the more in absolute terms that are going to have nefarious intent. This means more hackers, more script kiddies and more malware.

It’s getting to be exponential though – but I guess we are safe as it’s not getting much more advanced than it was 10 years ago.

Finnish security vendor F-Secure has collected twice as many malicious software samples this year than it has over the last 20 years, a trend that highlights the growing danger of malicious software on the Internet.

Through the end of 2006 and 20 years prior, F-Secure counted a total of 250,000 samples, said Mikko Hypponen, F-Secure’s chief research officer. This year alone, 250,000 samples have been counted, he said.

I think a lot of them are just variations on existing viruses or worms, trying to modify them to bypass anti-virus solutions and make them a bit more intelligent.

Still not seeing much polymorphic stuff though.

Statistics on malware from antivirus companies can vary since the data is often derived from what their customers experience while using their software, and it depends on how widely that software is used.

But other security vendors have also noted the flood of new malware on the Internet over the last few years. Symantec said earlier this year that it detected 212,101 new malicious code threats between January and June, an increased of 185 percent over the same period a year prior.

The astounding increase shows that hackers “are generating large number of different [malware] variants on purpose to make the lives of antivirus vendors more difficult,” Hypponen said.

Get that Avast! installed on all your relatives computers and keep them safe, along with Firefox of course.

Source: Network World


Posted in: General News, Malware

Tags: , , , , , , , , , ,

Posted in: General News, Malware | Add a Comment
Recent in General News:
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?
- Twitter Breach Leaks 250,000 User E-mails & Passwords

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,427 views
- eEye Launches 0-Day Exploit Tracker - 85,653 views
- Seattle Computer Security Expert Turns Tables On The Police - 44,187 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Technitium FREE MAC Address Changer v4.7 – Released for Download

Find your website's Achilles' Heel


The newest version of Technitium MAC Address Changer was released a while back, v4.7. There are some minor changes and it’s looking to be pretty polished for a free tool.

Of course some might say “It’s just a registry entry? What’s the big deal?” Well this just makes it easier, especially when you are doing audits and such changing your MAC address is something you might do quite often.

Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample information regarding each NIC in the machine. Every NIC has an MAC address hard coded in its circuit by its manufacturer. This hard coded MAC address is used by windows drivers to access Ethernet Networks (LAN). This tool can set a new MAC address to your NIC, bypassing the original hard coded MAC address.

Technitium MAC Address Changer v4.7 is coded in Visual Basic 6.0.

  • Changes MAC address of Network Interface Card (NIC) including Wireless LAN Cards, irrespective of its manufacturer or its drivers.
  • Has latest list of all known manufacturers (with corporate addresses) to choose from. You can also enter any MAC address and know which manufacturer it belongs to.
  • Allows you to select random MAC address from the list of manufacturers by just clicking a button.
  • Restarts your NIC automatically to apply MAC address changes instantaneously.
  • Allows you to create Configuration Presets, which saves all your NIC settings and makes it very simple to switch between many settings in just a click and hence saves lot of time.
  • Allows you to Import or Export Configuration Presets to or from another file, which saves lot of time spent in reconfiguration.
  • Has command line interface which allows you to perform all the tasks from the command prompt or you can even create a DOS batch program to carry out regular tasks (see help for command line parameter details).
  • Displays all information you would ever need to know about your NIC in one view like Device Name, Configuration ID, Hardware ID, Connection Status, Link Speed, DHCP details, TCP/IP details etc.
  • Displays total bytes sent and received through the NIC.
  • Displays current data transfer speed per second.
  • Quick keyboard shortcuts for most operations.

You can download Technitium MAC Address Changer v4.7 here:

Technitium MAC Address Changer v4.7

Or read more here.


Posted in: Network Hacking, Security Software

Tags: , , , , , , ,

Posted in: Network Hacking, Security Software | Add a Comment
Recent in Network Hacking:
- fping 3 – Multi Target ICMP Ping Tool
- WOL-E – Wake On LAN Security Testing Suite
- dnmap – Distributed Nmap Framework

Related Posts:

Most Read in Network Hacking:
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,458,386 views
- Wep0ff – Wireless WEP Key Cracker Tool - 514,527 views
- THC-Hydra – The Fast and Flexible Network Login Hacking Tool - 328,113 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95