Archive | General Hacking


27 June 2011 | 6,126 views

Last Chance To Get 10% Off Penetration Testing – Student Course

A couple of weeks back we posted about the new course suited to beginners by eLearnSecurity – we also offered an exclusive 10% Discount for Darknet readers – Penetration Testing – Student Course/Training by eLearnSecurity (Get 10% Off Until June 30th!). This is just a reminder that this offer expires in THREE days on June […]

Continue Reading

13 June 2011 | 7,284 views

IMF (International Monetary Fund) Suffer Major Breach In Sophisticated Cyberattack

Oh dear, another big organization has fallen foul to the whole RSA SecurID hack – it seems that way anyway. In combination with a Spear Phishing attack (similar to the one carried out on high level US officials via Gmail recently) hackers have busted the IMF wide open. It seems to be a very targeted […]

Continue Reading

09 June 2011 | 10,456 views

Penetration Testing – Student Course/Training by eLearnSecurity

Introduction You may remember a while back we reviewed the Penetration Testing – Pro course by eLearnSecurity here – eLearnSecurity – Online Penetration Testing Training and we posted about the course update here – Penetration Testing Course Pro 1.1 – New Version & New Module. The latest news is they’ve come out with a truly […]

Continue Reading

10 May 2011 | 5,940 views

VUPEN Whitehats Claim To Have Broken Chrome Sandbox

The big news recently is that someone has finally managed to pop the formidable Chrome browser, as we know from following Pwn2Own – it’s been safe for 3 years in a row. It has a sandbox, ASLR and DEP and that’s a pretty heavy combination to keep users safe from malicious software coming in via […]

Continue Reading

18 April 2011 | 7,784 views

Adobe Patches Latest Flash Zero Day Vulnerability

There’s been a lot of news about this Adobe Flash Player vulnerability as apparently it has been exploited in the wild and Adobe were willing to push out an out-of-band patch for it – which means in their eyes it is really serious. They don’t have a great reputation for testing their software before releasing […]

Continue Reading

11 April 2011 | 6,714 views

TJX Hacker Albert Gonzalez Claims Government Made Him Do It

The latest news from the tinfoil hat wearing conspiracy camp is that Albert Gonzalez the TJX hacker who was convicted in 2009 was authorized to hack by the US Government. Back in 2009 we posted about that too – TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury. And now he’s saying his actions […]

Continue Reading

16 February 2011 | 17,041 views

Apple Adds greenpois0n Jailbreak Detection to iBooks Software

Apple has pulled out some new tricks in it’s war against the unstoppable jailbreak machine, this time leveraging on the iBooks application. It’s quite a neat implementation, it appears the new iOS update with iBooks dropped an un-signed application on the phone and tries to run it – if it executes it assumes the device […]

Continue Reading

09 February 2011 | 11,804 views

Penetration Testing Course Pro 1.1 – New Version & New Module

Penetration Testing Course Pro 1.1 release aims at addressing all of the suggestions collected in the first 6 months of activity and adds 1 new module and 50 minutes of video training on Social Engineering Toolkit. As reviewed by us before (eLearnSecurity – Online Penetration Testing Training) this course is becoming a very popular choice […]

Continue Reading

12 January 2011 | 15,534 views

MagicTree – Penetration Tester Productivity Tool

MagicTree is a penetration tester productivity tool, it allows easy and straightforward data consolidation, querying, external command execution, and report generation. In case you wonder, “Tree” is because its stores all the data in a tree, and “Magic” because it is designed to magically do the most cumbersome and boring part of penetration testing – […]

Continue Reading

02 December 2010 | 13,958 views

Cloud Computing Use By Criminals Increasing

Over the last couple of years Cloud Computing has started gaining some real leverage, it’s being deployed on a wide scale, it’s becoming more affordable and the platforms supplying such services are becoming more stable. Of course the natural progression of this wider adoption is the focus of the security community and naturally the bad […]

Continue Reading