Archive | Network Hacking

Advertisements


19 January 2007 | 512,338 views

Wep0ff – Wireless WEP Key Cracker Tool

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless […]

Continue Reading


15 January 2007 | 17,640 views

SPIKE Proxy – Application Level Security Assessment

SPIKE Proxy is part of the SPIKE Application Testing Suite, It functions as an HTTP and HTTPS proxy, and allows the web developer or web application auditor low level access to the entire web application interface, while also providing a bevy of automated tools and techniques for discovering common problems. These automated tools include: Automated […]

Continue Reading


12 January 2007 | 27,535 views

Nmapview – Graphical Interface (GUI) for Nmap on Windows

Finally a replacement for the way outdated and rather crappy NmapFE! Unfortunately sometimes we do have to actually use Windows, and Nmap cleverly overcame the problems with raw sockets on Windows SP2 by using ATM frames instead, so it’s cool. Now we just need a decent GUI so it fits into the whole scheme of […]

Continue Reading


09 January 2007 | 9,887 views

MTR – Traceroute on Steroids

MTR was written by Matt Kimball, with contributions by many people. Take a look at the “AUTHORS” file in the distribution. Roger Wolff took over maintenance of MTR in october 1998. MTR combines the functionality of the ‘traceroute’ and ‘ping’ programs in a single network diagnostic tool. As MTR starts, it investigates the network connection […]

Continue Reading


02 January 2007 | 228,481 views

Cain & Abel – Download the Super Fast and Flexible Password Cracker with Network Sniffing

Cain & Abel is easily one of our favourite password crackers here at Darknet, especially because it’s oldskool but still under development, unlike most other projects which have been abandoned as time passed. Cain & Abel has some awesome stuff built in like native network sniffing and network password grabbing. Cain & Abel is a […]

Continue Reading


28 December 2006 | 7,099 views

TXDNS 2.0.0 Released – DNS Digger for Brute Force

TXDNS 2.0.0 has been released. TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques: Typos TLD rotation Dictionary attack Brute force This new version features a distributed model which further […]

Continue Reading


21 December 2006 | 11,316 views

Skype Worm in the Wild – W32.Chatosky

A new worm is spreading fast on the Skype network, it’s activated by a malicious Skype Chat link and it has been seen in the wild in numerous places. Apparently the dangerous link starts with “Check this!” pointing to a .org/.biz address, if you click the link you’ll become infected. There have been no reports […]

Continue Reading


18 December 2006 | 12,489 views

SinFP 2.0.4 – OS Detection – Now Works On Windows

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations […]

Continue Reading


30 November 2006 | 12,427 views

Hacking Tor – A Flaw Appears?

It seems finally someone has found a flaw in the way Tor works, a way to beat it and find out who is using the system. Perhaps an end to the most anonymous system on the Internet? I got this info fresh from SANS. One of our readers sent in a very worrying analysis of […]

Continue Reading


23 November 2006 | 6,429 views

Vulnerability Assessment and Operational Security Testing Methodology (VAOST) – version 0.2 released

Here is a newly released VA methodology, the author believes it to be more focused, and thus cost effective VA process. It may map to internal work, but it is probably more suited to external sites. It’s gone through a couple of revisions so it’s a bit more polished now. You can find the notes […]

Continue Reading


Advertisements