Archive | Windows Hacking


18 June 2006 | 7,776 views

Microsoft got Defaced

No, it wasn’t Microsoft.com, still, a very cool hack. Microsoft France suffered an attack by a Turkish group, going by the handle of TiTHacK. You can check TiTHacK ‘profile’ over at Zone-H. By the looks of things, he has been really busy today. At the time of this writing, the site still hasn’t been fixed. […]

Continue Reading


17 June 2006 | 8,469 views

New MSN Worm Hitting Users – BlackAngel.B

Well this week there was a Yahoo! Email worm, now also follows a vindictive new worm targetting MSN called BlackAngel.B. The reports come from the anti-virus software company Panda Software. When activated the worm delivers a fateful terror message and then attempts to disable any protection software such as anti-virus, firewall or Windows system applications […]

Continue Reading


13 June 2006 | 16,175 views

Windows Vista Preview Release Download & Torrent

You can get your hands on the windows vista preview release beta2. This is for those of you who are wondering how the interface of the new windows vista will look like and the new feel of the new operating system. You can find the minimum system requirements here. You can download vista here. It’s […]

Continue Reading


31 May 2006 | 6,458 views

Fake Microsoft Patch – BeastPWS-C

If you receive a e-Mail alert of a new patch for your Windows XP OS, think again before opening the link present on the message. The spammed emails, which purport to come from patch@microsoft.com, claim that a vulnerability has been found ‘in the Microsoft WinLogon Service’ and could ‘allow a hacker to gain access to […]

Continue Reading


23 May 2006 | 23,070 views

hackers playground… windows?

Only as I am writing these lines I can imagine some people who will start laughing when reading this article… But my dear friends this may be the real thing… will see who will laugh 10 years from now… I. Introduction This article was ment to be, because, as you will notice, more and more […]

Continue Reading


23 May 2006 | 3,374 views

Trojan for the Word Vulnerability in the Wild

We all knew it was just a matter of time until the ‘thing’ was out. PandaLabs has detected the appearance of 1Table.A, a malicious code that exploits a recently detected critical vulnerability in Microsoft Word, and which also affects versions of MS Office 2003 and XP. Microsoft confirmed today the existence of this vulnerability and […]

Continue Reading


15 May 2006 | 3,407 views

Microsoft Patching Practises Come Under Fire

Aye…it’s not the first time. The question came up, is Microsoft silently fixing security vulnerabilities and deliberately obfuscating details about patches in its monthly security bulletins? Matthew Murphy, a security researcher who has worked closely with the MSRC (Microsoft Security Response Center) in the past, is accusing the software maker of ‘misleading’ customers by not […]

Continue Reading


04 May 2006 | 4,530 views

AV Firms Say Windows Vista Security Claims are Bullsh*t

It seems the faith in Microsoft from the security industry is at an all time low, not surprising really with the amount of flaws that have been coming out in both the OS and the crapware forced upon its users like Internet Explorer Exploder. Anti-virus firms at Infosec say they expect Vista and IE7 to […]

Continue Reading


02 May 2006 | 4,417 views

Microsoft Shelves Support for RSA SecurID in Vista

Switchback? For the worst? Aww Microsoft would never compromise our security for the sake of convenience or their profit line right? Microsoft has shelved plans to include native support for RSA’s SecurID tokens in Windows Vista, even though the company has been trialling the technology for almost two years. In February 2004, Microsoft chairman Bill […]

Continue Reading


02 May 2006 | 6,711 views

Proof of Concept for Internet Explorer Modal Dialog Exploit

Pretty interesting and imaginative way to exploit the flaw in IE…yeah I know linked to ActiveX again, all the more reason to use Firefox right? It just shows that the browser really is a point of entry, this could be useful for a penetration test, another way to show how easy it is to get […]

Continue Reading