Archive | Privacy


20 May 2008 | 5,851 views

Three Charged With Hacking Dave & Buster’s Chain

Another big heist in the US netting a whole lot of juicy information on credit and debit cards, over half a million USD lost in this case alone. There’s a whole lot of fraud going on.. Not bad for fiddling with the cash register system of a restaurant chain. It just shows, anyone dealing with […]

Continue Reading


14 May 2008 | 7,297 views

browserrecon – Passive Browser Fingerprinting

Most of todays tools for fingerprinting are focusing on server-side services. Well-known and widely-accepted implementations of such utilities are available for http web services, smtp mail server, ftp servers and even telnet daemons. Of course, many attack scenarios are focusing on server-side attacks. Client-based attacks, especially targeting web clients, are becoming more and more popular. […]

Continue Reading


12 May 2008 | 12,956 views

Metagoofil v1.4 Released – Metadata and Information Gathering Tool

Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available on the target/victim website. It will generate a html page with the results of the metadata extracted, plus a list of potential usernames very useful for preparing a bruteforce attack on open services like ftp, pop3,web applications, vpn and so […]

Continue Reading


02 May 2008 | 6,968 views

US Really Owns Your Data Now!

A while back we reported how US customs owns your data, now it’s getting even worse. 10 days ago the US appeals court gave them rights to COPY all your data without notice even if there are no suspicions. Anyone want to talk about dilution of intellectual property? Privacy? Or just basic human rights.. In […]

Continue Reading


25 April 2008 | 5,929 views

Chocolate Owns Your Passwords

The same old story, if you ask people for something they will most likely give it without thinking of the consequences.. Even more so if you are a pretty girl, and in this case you offer someone chocolate. Hey who doesn’t love chocolate? I have to say I don’t love it enough to give out […]

Continue Reading


23 April 2008 | 6,349 views

Russia Heavy Handed Registration for Wifi

It seems like Russia wants to keep a tight reign on things, anything with Wifi capability must be licenses! That includes your phone…imagine having to apply for a permit to have a wireless AP at home? Rather ridiculous no? Business travellers to Russia might want to keep their laptops and iPhones well-concealed – not from […]

Continue Reading


22 April 2008 | 21,822 views

WifiZoo v1.3 Released – Passive Info Gathering for Wifi

WifiZoo is a tool to gather wifi information passively. It is created to be helpful in wifi pentesting and was inspired by ‘Ferret‘ from Errata Security. The tool is intended to get all possible info from open wifi networks (and possibly encrypted also in the future, at least with WEP) without joining any network, and […]

Continue Reading


13 March 2008 | 38,683 views

Goolag – GUI Tool for Google Hacking

cDc (Cult of the Dead Cow) recently released a GUI driven tool for Google Hacking called Goolag. Google Dorks have been around for several years and have been researched most assiduously by Johnny I Hack Stuff. If one searches the Web, one will find multiple collections of dorks, and also some applications – standalone and […]

Continue Reading


05 March 2008 | 8,479 views

Australia to Follow the UK in Terminating Content Pirates

It seems like most countries are getting more serious about the illegal downloading and the protection of intellectual property, after the UK recently proposed disconnecting ‘pirates’ from the Internet – Australia is now considering following suit. I guess this is just the start, laws will become more heavy handed and draconian as most of it […]

Continue Reading


22 February 2008 | 8,725 views

laptop and data theft protection

A UK firm Virtuity has created data protection software called BackStopp which comes with ’self-destruct’ technology based on Wi-Fi and RFID tags that starts to run as and when a laptop is moved from its designated space. So in layman’s terms, if the laptop is moved from its permitted zone (which is set by the […]

Continue Reading