Archive | April, 2008

Wireshark v1.0.0 Released – Cross Platform Graphical Packet Sniffer

Find your website's Achilles' Heel

After nearly 10 years of developement Wireshark (formely known as Ethereal) has finally reached version 1!

For those that don’t know, Wireshark is the world’s foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions.

Wireshark development thrives thanks to the contributions of networking experts across the globe. It is the continuation of a project that started in 1998.


Wireshark has a rich feature set which includes the following:

  • Deep inspection of hundreds of protocols, with more being added all the time
  • Live capture and offline analysis
  • Standard three-pane packet browser
  • Multi-platform: Runs on Windows, Linux, OS X, Solaris, FreeBSD, NetBSD, and many others
  • Captured network data can be browsed via a GUI, or via the TTY-mode TShark utility
  • The most powerful display filters in the industry
  • Rich VoIP analysis
  • Read/write many different capture file formats: tcpdump (libpcap), Catapult DCT2000, Cisco Secure IDS iplog, Microsoft Network Monitor, Network General Sniffer® (compressed and uncompressed), Sniffer® Pro, and NetXray®, Network Instruments Observer, Novell LANalyzer, RADCOM WAN/LAN Analyzer, Shomiti/Finisar Surveyor, Tektronix K12xx, Visual Networks Visual UpTime, WildPackets EtherPeek/TokenPeek/AiroPeek, and many others
  • Capture files compressed with gzip can be decompressed on the fly
  • Live data can be read from Ethernet, IEEE 802.11, PPP/HDLC, ATM, Bluetooth, USB, Token Ring, Frame Relay, FDDI, and others (depending on your platfrom)
  • Decryption support for many protocols, including IPsec, ISAKMP, Kerberos, SNMPv3, SSL/TLS, WEP, and WPA/WPA2
  • Coloring rules can be applied to the packet list for quick, intuitive analysis
  • Output can be exported to XML, PostScript®, CSV, or plain text

This is one tool EVERYONE involved in security or network administration should be familiar with.

You can download Wireshark here:

Wireshark v1.0.0

Or read more here.

Posted in: Hacking Tools, Network Hacking, Security Software

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment
Recent in Hacking Tools:
- Zenmap – Official Cross-Platform Nmap GUI
- nishang – PowerShell For Penetration Testing
- DyMerge – Bruteforce Dictionary Merging Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,995,659 views
- Brutus Password Cracker – Download AET2 - 1,491,456 views
- wwwhack 1.9 – Download Web Hacking Tool - 689,049 views

iFrame Piggybacking on Google Searches to Install Malware

Find your website's Achilles' Heel

These spammers and scammers are getting rather clever, and very sneaky. This is still epedemic and seems to be happening more and more. It takes a re-write of many of the large sites online..which frankly isn’t going to happen is it?

It just shows once again the spammers will think of all kinds of weird little tricks to get their goods pimped online

Hackers have found a new way to get Google to point to malicious websites with the help of unwitting websites such as TorrentReactor, ZDNet Asia and several other CNET-owned properties.

As a result, more than 101,000 Google search results that appeared to lead to pages of legitimate sites actually directed end users to sites that attempted to install malware.

The hack, which was first documented Wednesday by Netherlands-based researcher Dancho Danchev, takes advantage of the practice by many sites of logging search queries typed into their search boxes and storing them where search engine bots can see them. The terms are then indexed by Google and other search engines and included in the results they return. Exploiting the weakness is as easy as typing popular search terms into a popular website along with the text of an IFRAME that points to a malicious website. Within time, the strings will be included in results returned by Google and others.

Pretty dodgy eh? These ones are straight installing malware too, not even pointing to phishing sites or straight up adverts/porn sites.

This is going for mass infection, possible a part of some large botnet operation.

In the second half of 2007, 51 per cent of sites hosting malware were legitimate destinations that had been compromised, as opposed to sites specifically set up by criminals, according to security firm Finjan. In the case here, neither ZDNet Asia nor TorrentReactor were compromised, although the criminals were clearly taking advantage of their strong page ranking and the trust that many end users have in them.

The injected IFRAME redirects unwitting users to sites associated with the Russian Business Network, F-Secure says. The sites try to install malicious programs with names including XP Antivirus 2008 and Spy Shredder Scanner.

The attackers are also notable for the care they’ve taken to cover their tracks. The malicious sites will only attack users who click on the link as it’s returned from Google or another major search engine. Client-side honeypots or security researchers who merely type the address into a browser will receive an error message indicating the site is unavailable.

Even if the site itself is secure, a small architecture flaw allows things like this to flourish, apparently ZDNet Asia fixed the issue. There are still 100’s of other large sites still effected though.

Source: The Register

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers, Web Hacking

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Malware, Spammers & Scammers, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Mirai DDoS Malware Source Code Leaked
- mimikittenz – Extract Plain-Text Passwords From Memory
- Massive Yahoo Hack – 500 Million Accounts Compromised

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 236,172 views
- AJAX: Is your application secure enough? - 120,327 views
- eEye Launches 0-Day Exploit Tracker - 85,810 views