Archive | General Hacking




Fully Integrated Defense Operation (FIDO) – Automated Incident Response

FIDO is an orchestration layer which enables an automated incident response process by evaluating, assessing and responding to malware. FIDO’s primary purpose is to handle the heavy manual effort needed to evaluate threats coming from today’s security stack and the large number of alerts generated by them. As an orchestration platform FIDO can make using […]

Tags: , , , , , , , ,

Posted in: Countermeasures, General Hacking, Security Software | Add a Comment

BADLOCK – Are ‘Branded’ Exploits Going Too Far?

So there’s been hype about this big exploit coming, for over a month, before anything was released. It had a name, a website and a logo – and it was called Badlock. And now it’s out, and it’s more like Sadlock – really a local network DoS against DCE/RPC services on Windows and Linux with […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment

Dradis – Reporting Platform For IT Security Professionals

Dradis is an open source reporting platform for IT Security, tailored towards the types of information that need to be shared amongst an information security team during a professional engagement. It provides a centralized repository of information using a web interfaced based client/server architecture. It also supports 15+ different tools including Burp, Nessus, Nmap, Qualys […]

Tags: , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment

Kid Gets Arrested For Building A Clock – World Goes NUTS

So, today we have a tale of the fabled American knee-jerk reaction, this time to a 14 year old Muslim boy who made a cool clock and brought it to school. He got arrested, cuffed and fingerprinted – over a science project. Yah, arrested for building a clock. That seems like a slightly harsh reaction, […]

Tags: , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment

Drones, Tor & Remailers – The Story Of A High-Tech Kidnapping

This whole thing sounds like something straight out of CSI: Cyber with references to Drones, Tor, remailers, anonymous image sharing and the scrubbing of meta data. Pretty interesting reading, although it rather smells like a lot of exageration. A super high-tech kidnapping – gone wrong in the end. Whoever wrote tho e-mails sent to the […]

Tags: , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

U.S. State Department Hacked

So the U.S. government has been getting fairly hammered lately with breaches/attacks hitting the White House, USPS (Postal Service) and NOAA. The latest victim of this onslaught has been the State Department, which had to totally shut down their email systems on November 14th after discovering various ‘areas of concern’. I wonder who’s going to […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

Kali Linux – The Most Advanced Penetration Testing Linux Distribution

So Linux Live CDs based around hacking or penetration testing used to be a super big deal, they died down a bit in the last few years. The king of the hill back in 2011 used to be BackTrack and the last time we mentioned it was when BackTrack 5 came out. This article is […]

Tags: , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking | Add a Comment

Microsoft Says You SHOULD Re-use Passwords Across Sites

Ok so we constantly tell people not to reuse passwords across sites, because if they are stored in plain text (and leaked) those naughty hackers now have your e-mail address AND your password and can wreak havoc on your life. Which is pretty much true, but Microsoft disagrees and there is some validity to what […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

Dradis v2.9 – Information Sharing For Security Assessments

Dradis is an open source framework to enable effective information sharing, specially during security assessments. It’s a tool specifically to help in the process of penetration testing. Penetration testing is about information: Information discovery Exploit useful information Report the findings But penetration testing is also about sharing the information you and your teammates gather. Not […]

Tags: , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment

MagicTree v1.3 Available For Download – Pentesting Productivity

Have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting bits of output from a bunch of typescripts into a report? We certainly did, and that’s why we […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Security Software | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·