Archive | Network Hacking


23 February 2011 | 14,471 views

Acunetix WVS (Web Vulnerability Scanner) 7 Review – Engine & Scanning Improvements

We wrote our first review of Acunetix WVS 6 back in January 2009 and published an update about the release of Acunetix Web Vulnerability Scanner (WVS) 6.5 in June 2009. The team over at Acunetix have been working hard on version 7 for quite some time and released a new build with added features earlier [...]

Continue Reading


11 February 2011 | 15,202 views

Mallory – Transparent TCP & UDP Proxy

Mallory is a transparent TCP and UDP proxy. It can be used to get at those hard to intercept network streams, assess those tricky mobile web applications, or maybe just pull a prank on your friend. In more technical terms, Mallory is an extensible TCP/UDP man in the middle proxy that is designed to be [...]

Continue Reading


10 February 2011 | 13,617 views

Tunisia Running Country Wide Facebook, Gmail & Yahoo! Password Capture

We have mentioned Facebook plenty of times, they have had their fair share of security issues and we have mentioned Tunisia once way back in regards to Internet Repression. It seems like the government of Tunisia have been basically phishing their users with fake versions of login pages for Facebook, Gmail and Yahoo!. It only [...]

Continue Reading


08 February 2011 | 10,681 views

Proxocket – DLL Proxy For Winsock

Proxocket is a dll proxy project for the main Winsock functions which allows to capture any type of packet and data sent/received by a specific software of your choice and optionally modifying its content or the connect, bind and accept functions through a custom dll very easy to create. Proxocket handles the following functions for [...]

Continue Reading


01 February 2011 | 19,402 views

NiX Brute Force – Parallel Log-in Brute Forcing/Password Cracking Tool

NiX Brute Forcer is a tool that uses brute force in parallel to log into a system without having authentication credentials beforehand. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of NiX is to support a variety of services that allow remote authentication such as: MySQL, SSH, FTP, IMAP. [...]

Continue Reading


26 January 2011 | 11,288 views

Mausezahn – Fast Traffic Generator/Packet Crafting Tool

Mausezahn is a free fast traffic generator written in C which allows you to send nearly every possible and impossible packet. It is mainly used to test VoIP or multicast networks but also for security audits to check whether your systems are hardened enough for specific attacks. Mausezahn can be used for example: As traffic [...]

Continue Reading


18 January 2011 | 14,352 views

Inguma Is Back – The Penetration Testing & Vulnerability Research Toolkit

Inguma is back and being actively developed again. It’s been quite a long time, far too long in fact. We first reported about Inguma way back in 2007 and our latest mention of it was in March 2008. A new version has just been released almost 3 years later with some major changes and a [...]

Continue Reading


25 November 2010 | 13,142 views

BlackSheep – Detect Users Of FireSheep On The Network

As you surely know, things blew up recently at Toorcon 12 with the release of the much talked about Firefox plugin called Firesheep. There were various discussions about how to mitigate against it like using Firefox plug-ins to force SSL connections (where available). Microsoft also tried to secure Hotmail with SSL but kinda b0rked that [...]

Continue Reading


15 November 2010 | 23,503 views

Katana v2 (y0jimb0) – Portable Multi-Boot Security Suite

Katana is a portable multi-boot security suite which brings together many of today’s best security distributions and portable applications to run off a single Flash Drive. It includes distributions which focus on Pen-Testing, Auditing, Forensics, System Recovery, Network Analysis, and Malware Removal. Katana also comes with over 100 portable Windows applications; such as Wireshark, Metasploit, [...]

Continue Reading


11 November 2010 | 10,681 views

ddosim v0.2 – Application Layer DDOS Simulator

DDOSIM simulates several zombie hosts (having random IP addresses) which create full TCP connections to the target server. After completing the connection, DDOSIM starts the conversation with the listening application (e.g. HTTP server). Can be used only in a laboratory environment to test the capacity of the target server to handle application specific DDOS attacks. [...]

Continue Reading