Archive | May, 2009


28 May 2009 | 5,076 views

WarVOX 1.0.1 Released – Telephony Analysis & War Dialing Suite

WarVOX is a suite of tools for exploring, classifying, and auditing telephone systems. Unlike normal wardialing tools, WarVOX works with the actual audio from each call and does not use a modem directly. This model allows WarVOX to find and classify a wide range of interesting lines, including modems, faxes, voice mail boxes, PBXs, loops, [...]

Continue Reading


27 May 2009 | 4,711 views

Obama To Create Cyber Security Czar In White House

It looks like Obama is taking a serious stance on Cyber Security and Cyber Crime with his introduction of a new position which will be known as the ‘Cyber Czar’. As a senior White House official this is quite a serious position with the responsibility of protecting both the US government networks and looking out [...]

Continue Reading


26 May 2009 | 12,310 views

Technitium FREE MAC Address Changer v5 R2 Released for Windows

It’s been a while since the last update of Technitium back in June 2008, the latest release is v5 R2 with support for Windows 7 RC. Technitium MAC Address Changer allows you to change Media Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has [...]

Continue Reading


22 May 2009 | 7,383 views

DNS DDoS Attack Takes Down China Internet

The latest news is a few million Chinese Internet users had trouble accessing any websites yesterday due to a DDoS attack on the DNS system from one of the countries registrars. It just shows that China has an inherently weak infrastructure if such a large portion of people can be disrupted with an attack to [...]

Continue Reading


21 May 2009 | 4,328 views

BugSpy – Crawls The Web For Open Source Software Bugs

BugSpy is an interesting web site I came across recently, put together using a Python Framework (django) it aggregates bugs from as many open source projects as it can find. Preferably critical bugs. You can search by tag (e.g java, email or php ) or by product name (e.g Ubuntu, Typo3 or Samba). http://bugspy.net/

Continue Reading


20 May 2009 | 5,638 views

Google Poisoning Attack Gumblar Still Causing Problems

I thought this would have been stamped out by now, but sadly it’s still going on. With the advent of cheap web hosting and easy to use CMS systems like WordPress more and more people are managing their own websites (gone are the days of Geocities). More people with websites means more FTP details to [...]

Continue Reading


19 May 2009 | 10,492 views

Retarded E-mails – Brute Force, Change School Grades, Hack US Military & MORE

It’s been a few months since the last Retard Update, and it’s definitely been slower since I posted the disclaimer and link on the Contact Page. There have been some weird ones, one worders, one liners and stuff in foreign languages. Anyway let’s get started with a classic ‘script-kiddy I can’t operate my computer‘ type [...]

Continue Reading


18 May 2009 | 8,779 views

Samurai Web Testing Framework 0.6 Released – Web Application Security LiveCD

You may remember we wrote about Samurai being released back in November 2008, it’s been quite a while since the last update. The authors have updated and fixed a number of issues with the environment as well as improved performance of the java based tools. They have also included a virtual machine of the environment. [...]

Continue Reading


14 May 2009 | 22,260 views

Trojan in Counterfeit Copies of Windows 7 Builds Botnet

This latest mass infection is through a vector I really don’t understand, see as though you can legitimately download Windows 7 from Microsoft. I guess people just prefer BitTorrent downloads to HTTP downloads, and whoever had this smart idea capitalized on that. Microsoft should perhaps do something about that and put out a legitimate BitTorrent [...]

Continue Reading


13 May 2009 | 69,987 views

Pangolin – Automatic SQL Injection Tool

Pangolin is an automatic SQL injection penetration testing tool developed by NOSEC. Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management [...]

Continue Reading