Archive | General Hacking




Microsoft Releases Out-Of-Band Patch For IE 0-Day Vulnerability

Ah Microsoft is treating this one seriously after France and Germany advised users to avoid IE. The current strain being exploited only targets IE6 users, but one security company has developed an exploit for IE8 which also bypasses DEP (Data Execution Prevention). It was rumoured this was the exploit used last week to compromise Google […]

Tags: , , , , , , , , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Home Secretary says McKinnon must face US trial

Since the last update almost a year ago when Gary won the right to appeal against extradition, the latest news in the Gary Mckinnon saga is that his extradition to the US for trial will be going ahead. Even with his apparent medical condition of Ass Burgers Asperger’s it seems he will be extradited anyway […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

UCSniff 3.0 Released – VoIP/IP Video Sniffing Tool

UCSniff is a VoIP & IP Video Security Assessment tool that integrates existing open source software into several useful features, allowing VoIP and IP Video owners and security professionals to rapidly test for the threat of unauthorized VoIP and Video Eavesdropping. Written in C/C++, and available on Linux and Windows, the software is free and […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Using Cloud Computing To Crack Passwords – Amazon’s EC2

Now this is interesting a proper mathematical calculation for using cloud computing to crack passwords, now Amazon has opened up their EC2 (Elastic Compute Cloud) the cost of massive parallel processing power has come right down. And guess what, someone thought of using it to crack passwords. It seems the cut-off would be a 12 […]

Tags: , , , , , , , , , , , , ,

Posted in: General Hacking, Password Cracking | Add a Comment

UK Government To Launch ‘Hack Idol’

Now this should be interesting, perhaps they should turn it into a hacking based reality TV show? From the description though it looks more centered around defense than offense and perhaps should be called ‘System Administrator Idol’. Not quite so catchy though is it. Well at least they doing something to try and nurture talent […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Flawfinder – Source Code Auditing Tool

Flawfinder is a program that examines source code and reports possible security weaknesses (flaws) sorted by risk level. It’s very useful for quickly finding and removing at least some potential security problems before a program is widely released to the public. It’s a static analysis source code auditing tool. Flawfinder is specifically designed to be […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

TJX Hacker Albert “Segvec” Gonzalez Indicted By Federal Grand Jury

We’ve been following the whole TJX saga for quite some time now since way back in September 2007 when the hack became public as the Largest Breach of Customer Data in U.S. History and in August 2008 when the TJX Credit Card Hackers Got Busted. The legal system has ticked along and now they have […]

Tags: , , , , , , , , , , , ,

Posted in: General Hacking, Legal Issues, Privacy | Add a Comment

IKECrack – IKE/IPSec Authentication Cracking Tool

IKECrack is an open source IKE/IPSec authentication crack tool. This tool is designed to bruteforce or dictionary attack the key/password used with Pre-Shared-Key [PSK] IKE authentication. The open source version of this tool is to demonstrate proof-of-concept, and will work with RFC 2409 based aggressive mode PSK authentication. IKE Agressive Mode BruteForce Summary Aggressive Mode […]

Tags: , , , , , , , ,

Posted in: General Hacking | Add a Comment

Stoned Bootkit – Windows XP, 2003, Vista, 7 MBR Rootkit

What is Stoned Bootkit? A bootkit is a boot virus that is able to hook and patch Windows to get load into the Windows kernel, and thus getting unrestricted access to the entire computer. It is even able to bypass full volume encryption, because the master boot record (where Stoned is stored) is not encrypted. […]

Tags: , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

Dan Kaminsky & Kevin Mitnick Hacked

If any of you follow the mailings lists or the ‘scene’ as it’s known, you’d be familiar with PHC, Phrack, Gobbles, ~el8, Silvio, gayh1tler and the whole Whitehat Holocaust AKA pr0j3kt m4yh3m. (Back when it went public). The war against whitehats has started up again more vehemently recently with zine known as zero for owned […]

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·