Archive | General Hacking


15 April 2014 | 1,788 views

Kvasir – Penetration Testing Data Management Tool

Penetration Testing Data Management can be a nightmware, because well you generate a LOT of data and some information when conducing a penetration test, especially using tools – they return lots of actual and potential vulnerabilitites to review. Port scanners can return thousands of ports for just a few hosts. How easy is it to [...]

Continue Reading


14 May 2013 | 12,899 views

PentesterLab.com – Excercises To Learn Penetration Testing

PentesterLab is an easy and straight forwards way to learn the basics of penetration testing. It provides vulnerable systems in a virtual image, and accompanying exercises that can be used to test and understand vulnerabilities. Just decide what course you want to follow, download the course and start learning. You can easily run the course [...]

Continue Reading


26 April 2013 | 3,325 views

New eLearnSecurity Course – WAPT – Web Application Penetration Testing

eLearnSecurity is coming out with a new course, it’s intended to be a comprehensive training on web application penetration testing with large coverage of the newest attack vectors introduced by HTML5 and other W3C protocols. Over 40 new labs in the Coliseum cloud based virtual lab are included in the course. Course Description The Web [...]

Continue Reading


02 October 2012 | 3,622 views

Hackers Break Into White House Military Network

It’s been a while, but hey I’m back! So here’s a news story that caught my eye today – it’s been a while since we’ve reported on a Spear Phishing attack, and guess what? Yes, last time it was also perpetrated by Chinese, but it was targeting Google’s Gmail. Targeted Phishing Attacks Carried Out On [...]

Continue Reading


20 July 2012 | 478 views

Nvidia Investigates Claims Of Online Store Compromise During Spate Of Hacking

Just a few days back we posted about Yahoo! Voices Hacked With SQL Injection – Passwords In Plaintext, and most recently it seems someone has been going after Nvidia pretty hard. They have already had a few web properties hacked including their forum, the developer zone and their research site. The latest break in the [...]

Continue Reading


14 May 2012 | 6,296 views

CODENAME: Samurai Skills – Real World Penetration Testing Training

Introduction Yes, there’s another new kid on the block when it comes to penetration testing training, this course is known as CODENAME: Samurai Skills by Ninja-Sec. I’m not going to go and compare this to any other course out there as I think there’s a place for all of them, and they all have pros [...]

Continue Reading


21 March 2012 | 6,304 views

eLearnSecurity Launches Newly Updated & Refreshed Penetration Testing Professional Training v2

Introduction It’s been a while since we’ve mentioned this course, of course since we mentioned it back in May 2010 – eLearnSecurity – Online Penetration Testing Training – eLearnSecurity has been making continuous improvements to the course-ware and the subject matter. But now in 2012, it’s time for them to release their major facelift – [...]

Continue Reading


28 February 2012 | 9,193 views

MagicTree v1.1 Released For Download – Pen-Testing Productivity Tool

If you aren’t aware (yes we wrote about MagicTree v1.0) what MagicTree is.. Think of it this way, have you ever spent ages trying to find the results of a particular portscan you were sure you did? Or grepping through a bunch of files looking for data for a particular host or service? Or copy-pasting [...]

Continue Reading


28 December 2011 | 11,972 views

US Subway Stores POS Hacked For $3Million Dollars

Honestly there hasn’t been much news over the holiday period, well maybe there was but no one bothered reporting it. There was the Stratfor case of course, which Anonymous is saying wasn’t anything to do with them. The scale of this incident somehow reminds me of the whole TJ MAXX fiasco a few years back. [...]

Continue Reading


05 October 2011 | 9,571 views

Security By Obscurity Not So Bad After All?

I’m sure you’ve been taught, as have I – that security through or by obscurity is bad (changing port numbers, removing service banners and so on). I’ve personally always used it, as an additional line of defence on my systems. As a hacker I know, the more information a system gives me straight off the [...]

Continue Reading