Archive | February, 2011

JBoss Autopwn – JSP Hacking Tool For JBoss AS Server

Your website & network are Hackable


This JBoss script deploys a JSP shell on the target JBoss AS server. Once deployed, the script uses its upload and command execution capability to provide an interactive session.

Features

  • Multiplatform support – tested on Windows, Linux and Mac targets
  • Support for bind and reverse bind shells
  • Meterpreter shells and VNC support for Windows targets

Installation

Dependencies include

  • Netcat
  • Curl
  • Metasploit v3, installed in the current path as “framework3”

You can download JBoss Autopwn here:

jboss-autopwn.zip

Or read more here.


Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It
- Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,763 views
- AJAX: Is your application secure enough? - 120,107 views
- eEye Launches 0-Day Exploit Tracker - 85,538 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements

Find your website's Achilles' Heel


We wrote our first review of Acunetix WVS 6 back in January 2009 and published an update about the release of Acunetix Web Vulnerability Scanner (WVS) 6.5 in June 2009.

The team over at Acunetix have been working hard on version 7 for quite some time and released a new build with added features earlier this year in February. It also has an entirely new attack vector, DOM XSS.

If you are already familiar with WVS, it’ll feel on the surface much the same as the old version as the interface hasn’t changed drastically (which is a good thing).

Acunetix WVS (Web Vulnerability Scanner) 7

Most of the improvements and major changes in version 7 are under the hood, but at first use you will notice the difference. The scanner is much faster and seems more intelligent (there were noticeably less false positives than I remember in version 6) and it has much better support for Web 2.0 and AJAX powered web applications. That is of course a huge area now and very important for a tool like this that focuses on Web Security to support well (the modules have been re-written to support technologies such as such as JSON, XML and more). It also helps that it uses new unique verification techniques so you don’t have to wade through all the false positives by hand.

The order and layout of the scan results is also clearer and easier to follow with better sections and more information about each alert.

Acunetix WVS (Web Vulnerability Scanner) 7

The information given is also more complete with links to the original advisory and for application based flaws, it’s also extremely easy to see the full headers returned by the web server, relaunch the attack with the HTTP Editor, retest the alert or mark it as a false positive.

Acunetix WVS 7

It also gives suggestions on how to fix the issue, these are usually quite general though rather than specific technical instructions. One thing I really like about WVS it’s a very well equipped scanner which can crawl, scan, do vulnerability checks and has a bunch of handy tools for comparing results and even fuzzing.


With the HTTP Fuzzer can define your own character sets, iterations, use files and much more. It’s a very neat tool and not only for fuzzing, you can also use it to validate query sets to create your own valid input rules for WVS to test.

Acunetix WVS HTTP Fuzzer

Another useful tool to have built in to this kind of application is a local HTTP Proxy – which is labeled in WVS as HTTP Sniffer. The HTTP Sniffer acts as a proxy and allows you to capture, examine and modify HTTP traffic between an HTTP client and a web server. You can also enable, add or edit traps to trap traffic before it is sent to the web server or back to the web client.

It also has a tool called the Authentication Tester, which you can use to perform dictionary/brute-force attacks against login pages which use both HTTP (NTLM v1, NTLM v2, digest) or form based authentication. This tool uses two predefined text files (dictionaries) which contain a list of common user-names and passwords. You can add your own combinations to these text files. It’s a very easy to setup brute-forcing tool for form-based authentication testing.

Acunetix WVS Authentication Tester

For those of who do this for a living, the Compare Results tool is great for those clients you scan regularly – it even allows you compare site structure. With this and regular scans you can easily monitor if and when any vulnerabilities are introduced and keep things under control.

Acunetix WVS Compare Results Tool

Overall this new version of WVS feels similar to version 6 but somehow tighter, faster and more efficient – if you liked WVS before, you’ll love it now.

As an addition for the more advanced users, you can actually write your own Acunetix WVS Vulnerability Checks now too. As the new Checks are JavaScript in WVS 7 – it’s faster, easier and more flexible to write completely new Checks or edit existing Checks.

You can get the tool and detailed scripting reference to develop your own Checks here:

Acunetix_SDK.zip

More details about that here:

Creating custom vulnerability checks for Acunetix WVS Version 7

Acunetix WVS Trial Edition

Download Acunetix Web Vulnerability Scanner v7 trial edition from here.

There are also some useful resources here:


Posted in: Advertorial, Database Hacking, Exploits/Vulnerabilities, Hacking Tools, Network Hacking, Web Hacking

Tags: , , , , , , , , , , , , , , ,

Posted in: Advertorial, Database Hacking, Exploits/Vulnerabilities, Hacking Tools, Network Hacking, Web Hacking | Add a Comment
Recent in Advertorial:
- Defence In Depth For Web Applications
- 13 WordPress Security Tips From Acunetix
- Acunetix WVS 10 Released – Keeping Your Website Secure just got Easier

Related Posts:

Most Read in Advertorial:
- eLearnSecurity – Online Penetration Testing Training - 41,443 views
- Acunetix Web Vulnerability Scanner 6 Review - 15,261 views
- Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements - 15,084 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Arachni v0.2.2.1 – Web Application Security Scanner Framework

Find your website's Achilles' Heel


Arachni is a feature-full, modular, high-performance Ruby framework aimed towards helping penetration testers and administrators evaluate the security of web applications.

Arachni is smart, it trains itself by learning from the HTTP responses it receives during the audit process. Unlike other scanners, Arachni takes into account the dynamic nature of web applications and can detect changes caused while traveling through the paths of a web application’s cyclomatic complexity. This way attack/input vectors that would otherwise be undetectable by non-humans are seamlessly handled by Arachni.

Finally, Arachni yields great performance due to its asynchronous HTTP model (courtesy of Typhoeus). Thus, you’ll only be limited by the responsiveness of the server under audit and your available bandwidth.

Note: Despite the fact that Arachni is mostly targeted towards web application security, it can easily be used for general purpose scraping, data-mining, etc with the addition of custom modules.

Module, report and plugin writers are allowed to easily and quickly create and deploy their components with the minimum amount of restrictions imposed upon them, while provided with the necessary infrastructure to accomplish their goals. Furthermore, they are encouraged to take full advantage of the Ruby language under a unified framework that will increase their productivity without stifling them or complicating their tasks.


Although some parts of the Framework are fairly complex you will never have to deal them directly. From a user’s or a component developer’s point of view everything appears simple and straight-forward all the while providing power, performance and flexibility.

There is a new version of Arachni which features numerous optimizations, new modules, new plug-ins and a brand new, although experimental, Web user interface (adding support for distributed deployment, parallel scans and basic report management).

The changelog for this version is extremely long and you can view the full list of changes on the authors blog here – Arachni v0.2.2.1 is out!. You can also view the release changelog here.

All available installation options and usage instructions can be found in the homepage and the GitHub page.

You can watch a screencast of the new WebUI here:

With the new release, there is also the new Arachni Google Group, if you’re hacking or using Arachni and have a related questions you can contact the author and the community here.

You can download Arachni v0.2.2.1 here:

Zapotek-arachni-v0.2.2.1.zip

Or read more here.


Posted in: Hacking Tools, Web Hacking

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Recent in Hacking Tools:
- Unicorn – PowerShell Downgrade Attack
- Wfuzz – Web Application Brute Forcer
- wildpwn – UNIX Wildcard Attack Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,978,204 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,420,698 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 679,023 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Apple Adds greenpois0n Jailbreak Detection to iBooks Software

Your website & network are Hackable


Apple has pulled out some new tricks in it’s war against the unstoppable jailbreak machine, this time leveraging on the iBooks application.

It’s quite a neat implementation, it appears the new iOS update with iBooks dropped an un-signed application on the phone and tries to run it – if it executes it assumes the device is jailbroken and throws and error. This is true even for legitimate content you’ve purchased from iTunes..

Apple has opened a new chapter in its campaign against hackers with a feature that prevents jailbroken iDevices from accessing iBooks.

According to the Social Apples blog, iPhones and iPads running the latest iOS firmware contain a “jailbreak check” that automatically detects when the devices have been unlocked using the greenpois0n jailbreak kit. Jailbroken devices that attempt to load content using the iBooks application – even legally acquired e-books – display an error message that reads: “There is a problem with the configuration of your iPhone. Please restore with iTunes and reinstall iBooks.”

“Comex,” a hacker with the iPhone Dev Team, said in a Twitter post that “iBooks drops an improperly signed binary, tries to execute it, and if it works concludes that the device is jailbroken and refuses to open the book.”

Apple are in a tough spot as the courts have already ruled that jailbreaking your own iPhone is legal so they can’t try and get the coders behind the jailbreaks arrested/sued/disrupted – like Sony did in the recent Geohot case.

It’ll be interesting to see if they take this technique any further and use it to disable the whole phone? Perhaps they legally can’t do that, but they can disable access to iTunes/iBooks and so on. Either way I’m pretty sure there are a bunch of hackers out there right now working on a way to crack it.


Apple finds itself in the same predicament as Sony, maker of the PlayStation 3 game console. Both companies want to control what software customers can run on their consoles to boost sales of authorized titles and prevent potential piracy. Unlike Sony, which hauled more than 100 jailbreakers into federal court, Apple is largely barred from taking legal action, thanks to a move last year by the US Copyright Office exempting jailbreaking from the Digital Millennium Copyright Act.

The report comes on the heels of a recent announcement that greenpois0n is now able to apply an untethered jailbreak to second-generation AppleTVs. Untethered jailbreaks are the preferred method of unshackling iDevices since the change persists even after they are rebooted. It’s still not clear exactly what can be done with a jailbroken AppleTV. One option is to run NitoTV, a user interface that loads playlists and displays weather forecasts. It’s automatically installed when greenpois0n is run.

Sony can (sadly) continue taking action against people who hack their consoles, Apple thankfully cannot – however I’m pretty sure they are going to continue trying to find ways to block/annoy jailbreakers.

We wrote about the original AppleTV jailbreak quite some time back and there has been recent news that second-generation AppleTVs are now vulnerable to untethered jailbreaks from greenpoisOn too.

Source: The Register


Posted in: Exploits/Vulnerabilities, General Hacking

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It
- Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,763 views
- AJAX: Is your application secure enough? - 120,107 views
- eEye Launches 0-Day Exploit Tracker - 85,538 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Mallory – Transparent TCP & UDP Proxy

Find your website's Achilles' Heel


Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend.

In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be run as a gateway.

The goal is to man in the middle traffic for testing purposes. The ideal setup for Mallory is to have a “LAN” or “Victim” network that Mallory acts as the gateway for. This can be configured within a virtal machine environment using host only network interfaces. The victim virtual machines then configures the Mallory machine as the gateway by manually setting its gateway. The gateway machine will have at least one WAN interface that grants Internet access. The victim network then uses the Mallory gateway to route traffic.

Folder Structure

  • ca – certificate authority files including Mallory’s private key
  • certs – MiTM certs that are created on the fly
  • db – directory where mallory stores all database files
  • mallory – empty directory
  • src – where the code lives
  • scripts – scripts used to configure mallory enviorment

Resources

You can download Mallory here:

mallory-tip.tar.gz

Or read more here.


Posted in: Hacking Tools, Network Hacking

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
Recent in Hacking Tools:
- Unicorn – PowerShell Downgrade Attack
- Wfuzz – Web Application Brute Forcer
- wildpwn – UNIX Wildcard Attack Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,978,204 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,420,698 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 679,023 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Tunisia Running Country Wide Facebook, Gmail & Yahoo! Password Capture

Find your website's Achilles' Heel


We have mentioned Facebook plenty of times, they have had their fair share of security issues and we have mentioned Tunisia once way back in regards to Internet Repression.

It seems like the government of Tunisia have been basically phishing their users with fake versions of login pages for Facebook, Gmail and Yahoo!. It only works for users that aren’t using the https:// AKA SSL version of the sites, but then again who knows how much coverage FireSheep got in the Tunisian media.

It seems Tunisia has their own version of the Great Firewall of China to censor the content served up to its citizens and this system was used to inject the malicious JavaScript.

Malicious code injected into Tunisian versions of Facebook, Gmail, and Yahoo! stole login credentials of users critical of the North African nation’s authoritarian government, according to security experts and news reports.

The rogue JavaScript, which was individually customized to steal passwords for each site, worked when users tried to login without availing themselves of the secure sockets layer protection designed to prevent man-in-the-middle attacks. It was found injected into Tunisian versions of Facebook, Gmail, and Yahoo! in late December, around the same time that protestors began demanding the ouster of Zine el-Abidine Ben Ali, the president who ruled the country from 1987 until his ouster 10 days ago.

Danny O’Brien, internet advocacy coordinator for the Committee to Protect Journalists, told The Register that the script was most likely planted using an internet censorship system that’s long been in place to control which pages Tunisian citizens can view. Under this theory, people inside Tunisian borders were led to pages that were perfect facsimiles of the targeted sites except that they included about 40 extra lines that siphoned users’ login credentials.

It seems to be a very wide-spread attack (which effects the whole country) when in fact the targets of the attack are only a select group (anti-government protesters and organizations).

The ‘unknown parties’ which have carried out this attack have used the stolen Facebook credentials to shut down groups, block page and group administrators and delete/block pages administered by Journalists and Anti-government networks such as TAKRIZ.

It’s a pretty interesting twist on things, we’ve heard of governments blocking sites like Facebook an we’ve heard of cyber-terrorism where governments target other countries….but this is the first case I’ve read about a government essentially hacking it’s own citizens!


“Because it seems to be a perfect copy of the Facebook page, the first thing you assume is the Tunisian government has very cleverly injected the JavaScript as the data went through,” he said.

He said similar phishing attempts targeting Tunisian protestors date back to June, and possibly much earlier.

Although The Tech Herald reported on the rogue scripts three weeks ago, the revelations escaped wide notice until now. On Monday, members of the anti-Tunisian TAKRIZ network warned supporters to stop relying on its Facebook page (at facebook.com/takrizo) after discovering on Friday that all administrative access to it had been suspended.

This is consistent with Danny O’Brien’s findings from earlier this month, which said that unknown parties have used the pilfered credentials “to delete Facebook groups, pages, and accounts, including Facebook pages administrated by Sofiene Chourabi, a reporter with Al-Tariq al-Jadid, and the account of local online video journalist Haythem El Mekki.”

Also on Monday, The Atlantic reported that members of Facebook’s security team first became aware of the mass credential slurp in the days immediately following Christmas, when they began receiving similar reports of mass deletions of Tunisian dissidents’ pages.

There was enough reports to alert Facebook themselves to the problem and they began investigating the issue around Christmas. It was them who realized something very bad was going on amidst one of the worst political upheavals in decades.

By January 5th Facebook found it pretty clear that an entire country’s worth of passwords were in the process of being stolen, they promptly forced all users from Tunisia to SSL connections to mitigate the problem.

Of course the ISP can still downgrade the connection request from SSL to a normal http:// connection, but so far Facebook states they haven’t seen that happen. Also, being the government Tunisia can issue valid, signed SSL certificates and make any site it wants https://.

Source: The Register


Posted in: Legal Issues, Network Hacking, Privacy

Tags: , , , , , , , , , , ,

Posted in: Legal Issues, Network Hacking, Privacy | Add a Comment
Recent in Legal Issues:
- The Panama Papers Leak – What You Need To Know
- FBI Backed Off Apple In iPhone Cracking Case
- TalkTalk Hack – Breach WAS Serious & Disclosed Bank Details

Related Posts:

Most Read in Legal Issues:
- Class President Hacks School Grades - 80,699 views
- Hospital Hacker GhostExodus Owns Himself – Arrested - 47,618 views
- One Of The World’s Most Prolific Music Piracy Groups Busted - 43,615 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Penetration Testing Course Pro 1.1 – New Version & New Module

Find your website's Achilles' Heel


Penetration Testing Course Pro 1.1 release aims at addressing all of the suggestions collected in the first 6 months of activity and adds 1 new module and 50 minutes of video training on Social Engineering Toolkit. As reviewed by us before (eLearnSecurity – Online Penetration Testing Training) this course is becoming a very popular choice for Penetration Testing Training.

eLearnSecurity

In the first 6 months of the course there has been an unexpected success and eCPPT, first born as a proof of attendance of the course, is now in the certification path of a lot of students in 2011 as a preparatory course for more advanced courses.


As for the changes and the additions, as you should know the area of Social Engineering has changed in the last 2-3 years and social networks and the Social Engineer Toolkit have boosted the number of targeted and advanced attacks against people.

Students of eCPPT will now learn everything about SET and will be introduced to Social Engineering with nice real world scenarios and the use of social networking tools for advanced attacks.

The great thing is that the existing students got this update for free and they will continue to get new updated for free until 2.0 release.

The course developers also realized that the most important feature for their students was the opportunity of getting their exam report reviewed by an instructor and to recieve real feedback. So the certification is felt by the student as a final test on the skills acquired as well as yet another opportunity to learn more about the business and professional aspects of being a pentester.

They also have a lot of cool new projects going on under the radar and they will give word soon, through the Darknet community.


Posted in: Advertorial, General Hacking

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , , , , , ,

Posted in: Advertorial, General Hacking | Add a Comment
Recent in Advertorial:
- Defence In Depth For Web Applications
- 13 WordPress Security Tips From Acunetix
- Acunetix WVS 10 Released – Keeping Your Website Secure just got Easier

Related Posts:

Most Read in Advertorial:
- eLearnSecurity – Online Penetration Testing Training - 41,443 views
- Acunetix Web Vulnerability Scanner 6 Review - 15,261 views
- Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements - 15,084 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Proxocket – DLL Proxy For Winsock

Find your website's Achilles' Heel


Proxocket is a dll proxy project for the main Winsock functions which allows to capture any type of packet and data sent/received by a specific software of your choice and optionally modifying its content or the connect, bind and accept functions through a custom dll very easy to create.

Proxocket handles the following functions for both ws2_32.dll and wsock32.dll:

  • WSAStartup,
  • socket,
  • WSASocketA,
  • WSASocketW,
  • closesocket,
  • connect,
  • WSAConnect,
  • bind,
  • accept,
  • WSAAccept,
  • recv,
  • recvfrom,
  • WSARecv,
  • WSARecvFrom,
  • WSARecvEx,
  • send,
  • sendto,
  • WSASend,
  • & WSASendTo.

It has also specific support for TCP, UDP, ICMP, IGMP and RAW packets with handling of SOCK_STREAM, SOCK_DGRAM and SOCK_RAW on both incoming and outgoing data.

The project is divided in two parts:

  1. monitoring/sniffing: a CAP file in tcpdump format will be generated for any captured packet, this is the default operation
  2. user’s custom manipulation of the captured data: through a custom myproxocket.dll edited and created by the same user is possible to have control over the captured data like creating a rudimental firewall for a specific software or editing the data which will be passed to the main program on the fly or creating a decompressor/decrypter/protocol_analyzer and so on

Read the text file inside for more information and if you want to write a plugin take a look at the source code ofthe myproxocket.c example.

The following are some “example plugins” the author wrote for proxyfying the main program and or doing some things:

NOTE: If you have Vista and the local ws2_32/wsock32 dlls are not loaded try to set the registry key “HKEY_LOCAL_MACHINE\Software\Microsoft\WindowsNT\CurrentVersion\Image File Execution Options\DevOverrideEnable” to 1.
NOTE: The exported functions of myproxocket.dll MUST be declared as CDECL, this is default on Mingw but not on other compilers.
NOTE: Do NOT use Cygwin for compiling the myproxocket plugins.

There’s some good information on how to use Proxocket here.

You can download Proxocket here:

proxocket.zip

Or read more here.


Posted in: Hacking Tools, Network Hacking, Windows Hacking

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment
Recent in Hacking Tools:
- Unicorn – PowerShell Downgrade Attack
- Wfuzz – Web Application Brute Forcer
- wildpwn – UNIX Wildcard Attack Tool

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 1,978,204 views
- Brutus Password Cracker – Download brutus-aet2.zip AET2 - 1,420,698 views
- wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool - 679,023 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Canadian Dating Site PlentyofFish.com Hacked

Your website & network are Hackable


Something which caused some kind of stir last week was the hacking of the Canadian dating site Plenty of Fish (sometimes known as PoF) which rose to fame on the Webmaster forums for SEO due to a picture of Markus Frind holding an Adsense cheque for $132,000 for two months earning.

For anyone not familiar with the site, it’s a kind of craigslist for dating – simple oldskool interface, no charges, no premium memberships and finally a place for all the other dating sites to advertise.

The news started to come out that there were some major flaws in the site and hackers had managed to download the whole member database including plain text passwords as no hashing was using (shocker).

What do you do when you find out that someone has hacked into your Website and possibly stolen the personal information of thousands of users?

If you’re Markus Frind, you email the hacker’s mother.

It’s all part of a bizarre story involving an an Argentinian hacker, a Vancouver Website owner, a former Washington Post reporter, threatening phone calls and alleged attempted extortion.

On Sunday night, Mr. Frind, the founder and chief executive of the popular free online dating website PlentyOfFish.com — which is headquartered in Vancouver — posted a note to his personal blog telling a story about how a hacker from Argentina allegedly tapped into the Plenty of Fish database and stole the emails, user names and passwords of the site’s users.

In the 990-word blog post, Mr. Frind details his account of what happened.

Plenty of Fish hacked, CEO recounts bizarre ordeal with hacker in blog post

Markus Frind went on to rant about the hacker Chris Russo and some kind of extortion scheme that was going on, plus he made some kind of underhanded swipe (which he later took back) that Brian Krebs was involved in it.


This is not a statement from Plentyoffish, i’ll post something in the morning. This is a personal post about what it feels like to be hacked /extorted and the intense pressure and stress you are put under. Not to mention how annoying it is to have someone constantly harassing and trying to scare your wife at all hours of the day. I think a slept a total of 2 hours a night for a week….. Plentyoffish was hacked last week and we believe emails usernames and passwords were downloaded. We have reset all users passwords and closed the security hole that allowed them to enter.

Plentyoffish Hacked.

Krebs of course also reported on things from his side.

Hackers have breached the database of online dating site PlentyOfFish.com, exposing the personal and password information on nearly 30 million users. In response, the company’s founder has implied that the editor of KrebsOnSecurity.com was involved in an elaborate extortion plot.

PlentyofFish.com Hacked, Blames Messenger

We at Darknet also received an e-mail from someone identifying himself as Chris Russo last week, the e-mail is reproduced in full below:

Continue Reading →


Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy, Web Hacking

Tags: , , , , , , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Legal Issues, Privacy, Web Hacking | Add a Comment
Recent in Exploits/Vulnerabilities:
- Intel Hidden Management Engine – x86 Security Risk?
- TeamViewer Hacked? It Certainly Looks Like It
- Serious ImageMagick Zero-Day Vulnerabilities – ImageTragick?

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 234,763 views
- AJAX: Is your application secure enough? - 120,107 views
- eEye Launches 0-Day Exploit Tracker - 85,538 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95


Happy Chinese New Year 2011

Find your website's Achilles' Heel


To all those celebrate – we wish you a healthy, happy and prosperous new year of the Rabbit.

Happy Chinese New Year 2011

Gong Hey Fat Choy/Gong Xi Fa Cai


Posted in: Site News

Posted in: Site News | Add a Comment
Recent in Site News:
- A Look Back At 2015 – Tools & News Highlights
- A Look Back At 2014 – Tools & News Highlights
- Yes – We Now Have A Facebook Page – So Please Like It!

Related Posts:

Most Read in Site News:
- Welcome to Darknet – The REBIRTH - 36,585 views
- Get the ball rollin’ - 19,000 views
- Slashdot Effect vs Digg Effect Traffic Report - 12,258 views

Malwarebytes Anti-Exploit Premium | 1 Year 1 PC for $24.95