Archive | Windows Hacking


09 June 2010 | 9,683 views

Microsoft Patches At Least 34 Bugs Including Pwn2Own Vulnerability

What a massive mother-load of patches Microsoft has unleashed on this month patching more than 34 security vulnerabilities including the fairly high profile vulnerability exploited at the Pwn2Own contest earlier this year in April. Good news as long as all the average Internet users actually use Windows Update and install the latest patches, which somehow [...]

Continue Reading


26 May 2010 | 14,293 views

Bruter v1.0 Final Released – Parallel Network Login Brute Forcing Tool

We wrote about Bruter v1.0 ALPHA version back in 2008, recently they announced the release of v1.0 Final! Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication. It [...]

Continue Reading


20 May 2010 | 11,789 views

Metasploit 3.4.0 Hacking Framework Released – Over 100 New Exploits Added

Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. Update [...]

Continue Reading


12 May 2010 | 8,466 views

New Argument Switch Attack Bypasses Windows Security Software

There’s been a lot of highly technical and most theoretical attacks lately, academic season really is in full swing. This is a very neat attack which is being labeled somewhere between catastrophic and mildly annoying depending on who you ask. It effects most of the major Anti-virus vendors, it’s called an argument-switch attack and leverages [...]

Continue Reading


09 April 2010 | 7,867 views

StreamArmor – Discover & Remove Alternate Data Streams (ADS)

StreamArmor is a tool for discovering hidden alternate data streams (ADS) and can also clean them completely from the system. It’s advanced auto analysis coupled with online threat verification mechanism makes it the best tool available in the market for eradicating the evil streams. StreamArmor comes with fast multi threaded ADS scanner which can recursively [...]

Continue Reading


29 December 2009 | 6,263 views

Microsoft IIS Semicolon Bug Leaves Servers Vulnerable

The latest news breaking over the Christmas period is that of a fairly serious bug in IIS that allows local file inclusion (LFI) of any filetype due a bug in the way IIS filters handle semicolons (;). Secunia has confirmed the vulnerability “on a fully patched Windows Server 2003 R2 SP2 running Microsoft IIS version [...]

Continue Reading


14 December 2009 | 6,782 views

Microsoft CAT.NET v1.1.1.9 – Binary Code Analysis Tool .NET

CAT.NET is a binary code analysis tool that helps identify common variants of certain prevailing vulnerabilities that can give rise to common attack vectors such as Cross-Site Scripting (XSS), SQL Injection and XPath Injection. CAT.NET is a snap-in to the Visual Studio IDE that helps you identify security flaws within a managed code (C#, Visual [...]

Continue Reading


03 December 2009 | 9,285 views

Microsoft Leaves Users Waiting For Black Screen Of Death Fix

The news this week has been a flaw in Microsoft‘s all versions of Windows labeled as the “Black Screen of Death”, they did acknowledge the problem a few days ago (in a roundabout way) but basically said it wasn’t their fault and it wasn’t widespread. The blame is currently being passed around and as of [...]

Continue Reading


01 December 2009 | 17,326 views

Process Hacker v1.7 Released – Process Viewer & Memory Editor

Process Hacker is a free and open source process viewer and memory editor with unique features such as powerful process termination and a Regex memory searcher. It can show services, processes and their threads, modules, handles and memory regions. Key Features Viewing, terminating, suspending and resuming processes. Restarting processes, creating dump files, detaching from any [...]

Continue Reading


24 November 2009 | 12,440 views

Metasploit 3.3 Released! Exploitation Framework

What is Metasploit? The Metasploit Framework is a development platform for creating security tools and exploits. The framework is used by network security professionals to perform penetration tests, system administrators to verify patch installations, product vendors to perform regression testing, and security researchers world-wide. The framework is written in the Ruby programming language and includes [...]

Continue Reading