Archive | March, 2008


14 March 2008 | 22,911 views

Nipper 0.11.5 Released – Network Device Configuration Security Auditing Tool

Nipper performs security audits of network device configuration files. The report produced by Nipper includes; detailed security-related issues with recommendations, a configuration report and various appendices. Nipper has a large number of configuration options which are described on this page Nipper currently supports the following device types: Cisco Switches (IOS) Cisco Routers (IOS) Cisco Firewalls [...]

Continue Reading


13 March 2008 | 38,445 views

Goolag – GUI Tool for Google Hacking

cDc (Cult of the Dead Cow) recently released a GUI driven tool for Google Hacking called Goolag. Google Dorks have been around for several years and have been researched most assiduously by Johnny I Hack Stuff. If one searches the Web, one will find multiple collections of dorks, and also some applications – standalone and [...]

Continue Reading


12 March 2008 | 4,625 views

Cyber Storm II – US, UK & 3 Others Involved in Mock Cyberwar

This is pretty interesting – US, UK, Canada, Australia and New Zealand are taking part in a fictitious cyberwar as an exercise to prepare and plan for sustained cyber attacks including some of which have actually caused power outages. I personally think it’s a great idea, I must have missed Cyber Storm I as this [...]

Continue Reading


11 March 2008 | 6,554 views

Fusil Fuzzer 0.7 – Fuzzing Functions in Python

Fusil is a fuzzing framework written in Python and distributed under GNU GPLv2 license. Fusil allows you to easily write “Fuzzing Projects” from a set of functions such as: Create a process Compile a C program Watch a process Watch syslog and so on Fusil uses small “agents” which exchange messages to launch actions. e.g. [...]

Continue Reading


10 March 2008 | 6,302 views

VXers Group 29A Calls it Quits

It seems the VX groups are all destined to die out slowly, viruses for fun, learning and definitely not profit are on the way out. Like many other things its become a commercial market. The top infector this month being Adware for the first time ever, not a virus. 29A is one of the old [...]

Continue Reading


07 March 2008 | 7,530 views

Ferret Version 1.1 – Data Seepage Detection Tool

Ferret works on the concept of “data seepage”: bits of benign data that people willingly broadcast to the world (as opposed to “leakage”, which is data people want to hide from the world). Examples of data seepage are what happens when you power-on your computer. It will broadcast to the world the list of WiFi [...]

Continue Reading


06 March 2008 | 2,855 views

February Commenter of the Month Competition Winner!

ompetition time again! As you know we started the Darknet Commenter of the Month Competition on June 1st and it ran for the whole of June and July. We have just finished the ninth month of the competition in February and are now in the tenth, starting a few days ago on March 1st – [...]

Continue Reading


05 March 2008 | 8,472 views

Australia to Follow the UK in Terminating Content Pirates

It seems like most countries are getting more serious about the illegal downloading and the protection of intellectual property, after the UK recently proposed disconnecting ‘pirates’ from the Internet – Australia is now considering following suit. I guess this is just the start, laws will become more heavy handed and draconian as most of it [...]

Continue Reading


04 March 2008 | 37,795 views

Burp Suite v1.1 Available for Download

One of our favourite all time tools for attacking web applications has been updated! Burp Suite has now reached version 1.1! This is a major release – not a minor upgrade. Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to [...]

Continue Reading


03 March 2008 | 6,487 views

New Sophisticated Botnets Discovered

It seems like botnets are getting more sophisticated – we thought the Storm Worm was pretty hot, but some of these new contenders are showing the guys on the dark side has some advanced understanding of technology and the architecture many companies use…this enables them to get deeper inside and remain undetected Researchers have unearthed [...]

Continue Reading