Darknet - The Darkside

Don`t Learn to HACK - Hack to LEARN. That`s our motto and we stick to it, we are all about Ethical Hacking, Penetration Testing & Computer Security. We share and comment on interesting infosec related news, tools and more. Follow us on Twitter, Facebook or RSS for the latest updates.

01 January 2007 | 85,317 views

eEye Launches 0-Day Exploit Tracker

Cyber Raptors Hunting Your Data?

Ah finally a decent 0-day exploit tracker, one that isn’t underground and could be fairly useful to everyone.

0-day as basically stated in the article is an exploit not known publicly or available publicly well before any patches are available, some private groups often have exploits for a year or more before someone else discovers them, makes them public and they inevitably get fixed.

Like the famous remote exploit in Windows RPC, private groups had that for almost 2 years before it became public.

Scary eh?

Security firm eEye has created what’s described as the industry’s first site designed solely to track zero-day vulnerabilities, flaws where exploits are available prior to the release of security patches.

eEye’s zero-day tracking site provides detailed information on flaws and remediation strategies to users. The site will be maintained by security researchers at eEye Research, who have a track record of unearthing new security bugs, and is essentially an eEye gig rather than a cross-industry effort.

It’s a good idea even if it’s not an industry effort it’s solely an eEye effort, I’m glad someone has done it and eEye has a strong capable team, so it should be fairly relevant if it’s kept up to date.

However, eEye invites other interested parties to contribute suggestions on flaws that merit inclusion on its list. eEye said it created the site, which includes information on how long flaws have remained unfixed, in response to the growing number of zero-day exploits.

In other security tracking news, security notification firm Secunia has released a tool designed to determine insecure versions of popular software packages (such as browsers, IM clients, and media players) on consumer’s PC.

Secunia’s Software Inspector provides users with advice on what to do if they are running insecure software packages.

Both eEye zero-day tracking site and Secunia’s Software Inspector are available free of charge.

You can find the site here:

eEye Zero Day Tracker

Source: The Register


31 December 2006 | 658,944 views

wwwhack 1.9 – Download wwwhack19.zip Web Hacking Tool

WWWhack is a brute force utility that will try to crack web sites guarded by an web access password. This utility can use a word file or try all possible combinations, and by trial-and-error, will attempt to find a combination of username/password that is accepted by the web server.

This shows the weakness in securing sensitive areas of your web site by the web authentication method alone.


To use wwwhack 1.9 you need to set your system clock to the year 2000 or before as it expires in ‘2001’.

Once again this is an oldskool tool but a lot of people are still seeking it, for learning purposes I presume as there are better alternatives now like thc-hydra.

You can download wwwhack 1.9 here.

To avoid any network issues the zip file is passworded, the password is darknet123.

Your anti-virus software may find a Win32.Hacktool or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.

30 December 2006 | 12,791 views

IE & Firefox Both Effected by Fake Login Flaw

It seems the recent fake login flaw effects both Internet Exploder and Firefox.

Good to keep alert and with the new update mechanism it’s very simple to update your Firefox installation.

The latest versions of both Firefox and Internet Explorer are vulnerable to an unpatched flaw that allows hackers to snaffle users’ login credentials via automated phishing attacks.

The information disclosure bug affects the password manager in Firefox 2.0 and its equivalent in IE7. Firefox’s Password Manager, for example, fails to properly check URLs before filling in saved user credentials into web forms. As a result, hackers might be able to swipe users credentials via malicious forms in the same domain, providing users have already filled out forms on this domain.

Basically you just need to disable the feature that rememebrs the passwords, and it seems for once the vector is slightly more serious for Firefox users than for IE users.

Samples of attacks utilising the flaw have already been reported on MySpace. Firefox 2.0 users might be more at risk from the flaw because IE7 does not automatically fill in saved information. Security notification firm Secunia advises users to disable the “remember passwords for sites” option in their browsers pending the delivery of patches.

This so-called reverse cross-site request flaw was discovered by security researcher Robert Chapin, who explains the issue in greater depth in an advisory here.

Reverse cross site scripting? The names are getting more and more complicated.

Source: The Register

29 December 2006 | 85,548 views

GoldenEye (GoldEye) Password Cracker – Download goldeye.zip or goldeneye.zip

GoldenEye is a brute-force hacking program and was written for web-masters to test the security of their own sites. This is an oldskool file, a lot of people are still looking for this.

It should not be use by others to hack sites – this would be illegal! Under no circumstances should the author or any other persons involved in its development or distribution be held liable for the misuse of the program.

Once again these old files and tutorials are meant for the purpose of learning, test them in your own lab, see how they work, see what they do then try and write something similar yourself.


GoldenEye works with different types of wordlists:

GoldenEye executes its attempts simultaneously. The number of simultaneous attempts can be adjusted with the speed slider on the “access” tab. You can also adjust the speed limit. On the Options|Connections tab you’ll find a box to set the “top-speed”; select an apropiate value. Use lower values for slow internet connection!

If you get to much timed-out connections, lower the crack speed or increase the TTL (time to life). Timed-out connections will be automatically resumed if you check ‘Resume time-out connections automatically’ on the same tab.

Note: The program is tested with 70 simultaneous request. If you choose a higher value, do it on your own risk! If GoldenEye tells you something about buffer problems, lower the speed next time. I’ve encountered that other running programs may cause buffer problems.

GoldenEye logs the cracked sites. They are listed on the History|Access History tab. You can select and delete single entries or the whole list. Expired combinations will be automatically removed when you click the check for expired passwords button. Click on the ‘visit button’ or double click on the selected url to launch it in your browser.

Access tab

The url box: if you don’t remember the members url you can

  • search through the list
  • or you type in a part off the url or a defined site name (see History|URL History) and click on the small button at the right end of the url-box.

Options|Advanced tab:

  • Change proxy after x attempts: GoldenEye changes the proxy automatically after x attempts if this options is checked.You have to use several proxies to use this feature. Add proxies on the Options|connections tab.GoldenEye changes the proxy randomly or in the order which is given by the proxy-list.
  • Server Response: the standard values are ‘200’ for ok and ‘401’ for access denied (unauthorized). If the server you’re attacking gives other reply numbers you can change them. Note: You can’t use 404 or 500!
  • Cookie: If the attacked server needs a cookie, check this option and enter the cookie string.
  • Referer: If the attacked server needs the url of the refering site, enter it here.

Wordlist tools tab

  • Remove dupes: New: If you’re using single lists for userID and password GoldenEye removes the dupes simultaneous.
  • General wordlist options:
    • Define a mininum and maximum length for the userID and password (standard settings 1-32)
    • Convert the list: All passes will be converted ‘on-the-fly’.
    • Wordlist style: If you want to use single lists: check this option.
  • Wordlist manipulations: this tab appears after you’ve loaded a list and checked the ‘Extend list’ on “General wordlist”
    “Common manipulations” are predefined manipulations.
    On the “Advanced” tab you can choose your own prefixes, suffixes, etc. If you miss something, tell me!

Security check

  • Server security test: It tests the attacked server for other security holes.
  • Proxy test: tests the proxy-speed. The values are in milliseconds.

Your anti-virus software may find a Win32.Gen.Trojan or similar in this file, that’s normal for most hacking software. Darknet in no way implies that this software is safe and free of malware, use at your own risk.

You can download GoldenEye 1.0 here.

To avoid any network issues the zip file is passworded, the password is darknet123.

29 December 2006 | 3,503 views

Some Relaxing on the DMCA Regulations

There seems to be have been some slight relaxation on the DMCA regulations lately, which is a good thing for the majority of people!

There have been many grey cases and sadly most have fallen on the side of the big corporations, finally something on our side!

The U.S. Copyright Office specified new rules Wednesday allowing cellphone owners to hack software designed to prevent them from using their phones on competing carriers. Retrogaming enthusiasts will also be permitted to crack copy protection on abandoned titles, albeit for “archival” purposes only.

I think it’s perfectly reasonable, if I buy a peice of hardware or whatever I should completely own it and be able to use it for whatever I want, I shouldn’t be limited by the company that sold it to me.

And Abandonware is ok!

And thankfully a thumbs up for educators too.

The rules also allow teachers to copy “snippets” from DVDs for educational compilations, and confer the right to have third-party software read copy-protected electronic books –if you’re blind.

The Digital Millenium Copyright Act (DMCA) has been held to crimizalize circumvention of any kind of software protection, even in the pursuit of applications that would have previously been considered fair use. There is at least one ongoing legal action concerning recycled cell phones based on this law, according to Librarian of Congress James H. Billington. But not after today.

You can see the full list of 6 exemptions here.

Source: Wired Blog

28 December 2006 | 7,169 views

TXDNS 2.0.0 Released – DNS Digger for Brute Force

TXDNS 2.0.0 has been released.

TXDNS is a Win32 aggressive multithreaded DNS digger. Capable of placing, on the wire, thousands of DNS queries per minute. TXDNS main goal is to expose a domain namespace trough a number of techniques:

  • Typos
  • TLD rotation
  • Dictionary attack
  • Brute force

This new version features a distributed model which further boosts TXDNS’s parallelism and performance. This model allows a TXDNS client to send jobs to a TXDNS server over a clear or encrypted TCP channel.

For example, to put a TXDNS host on listening mode:

By default TXDNS listens on port 5353. On the client side you may postany query jobs by appending ‘-c xx.xx.xx.xx’ to the regular query syntax (where xx.xx.xx.xx is the host’s IP running TXDNS on listening mode), for example:

Using -cr instead of -c will force the TXDNS server to redirect all output to the client, so basically you get the results from the server’s job right on the client console. Note that file system streams are not redirected, which means that any file switches (-f or -h) will still have the remote host as root reference.

To encrypt all the traffic between the client and the server just append ‘–key ‘ to the regular syntax on both the client and server.

A new –countdown option has been added as a very basic synchronization mechanism, and by default, any jobs, no matter remote or local will now delay for 5s before firing. If you want to bypass this countdown delay you’ll have to add ‘–countdown 0’.

You can read more and download at:


27 December 2006 | 3,029 views

Firefox Patches 8 Security Vulnerabilities with

Grab the new Firefox now,! 8 Security Vulnerabilities have been fixed in this last release of the year 2006.

I’m glad to see Firefox upholding their quick turnaround and rapid fixing of issues that spring up during development and improvement of their product.

Mozilla has released the first update for the Firefox 2.0 browser to fix eight security vulnerabilities.

According to the company, release of Firefox fixes flaws in memory corruption as well as the way the browser executes RSS (really simple syndication), Javascript and CSS (cascading style sheets) code, among other vulnerabilities. Mozilla also patched similar flaws in its Firefox 1.5 browser.

Five of the eight flaws were rated as critical, according to Firefox. A critical rating means a Firefox user would be vulnerable to attack and remote software installation on their machines just from browsing the Web in the usual fashion. Two of the flaws were rated as high, while one received a low security-risk rating, Firefox said.

Mozilla’s advisory and information on the update can be found on the company’s Web site.

Danish security firm Secunia ApS also posted information about the patches on its Web site.

Source: Infoworld

26 December 2006 | 2,687 views

Awareness of Phishing is on the Up – But so are Monetary Losses

It seems like phishers are changing their tactics to those similar to spammers, rather than going for big targets and mass mails they are turning to more wealthy customers and fewer but larger bounties.

Imagine if they can nail a few big ones, they are set.

Online fraudsters are turning their attentions away from large banks and increasingly targeting wealthy consumers as phishing schemes continue to lure large numbers of people into unknowingly sharing their private information with criminals, reports Gartner.

Americans are losing fewer dollars to online phishing schemes as a whole, but Internet-savvy, affluent PC users are being hit up for more money than ever, according to the latest Gartner research.

Based on a survey of 5,000 consumers in the United States, Gartner said users are being assaulted with more phishing attacks than ever before and are falling for more of the gimmicks. Yet at the same time, customers are losing less money to the schemes, due to a growing awareness of the online fraud model, as banks and other businesses spoofed in the attacks have put more tools in place to help identify suspicious behavior.

So phishing is on the up…and so are monetary losses, people are generally losing less but more people are losing and wealthier people are being targeted so the average has gone up.

There really is an amazing amount of phishing going on

artner estimates that 109 million U.S. adults received phishing e-mails during the last 12 months, compared to only 57 million in 2004. An estimated 24.4 million Americans went on to click on phishing e-mails in 2006, up from approximately 11.9 million in 2005. The company said 3.5 million adults gave sensitive information to fraudsters in 2006, compared to only 1.9 million adults last year.

Based on the survey, the average loss per victim has grown from $257 to $1,244 per victim in 2006. Finding a refund for money lost to the schemes has also become harder: Consumers recovered approximately 80 percent of their cash in 2005, but are getting back an average of only 54 percent in 2006.

The moral of the story is…don’t fall for it, because it is your fault and it’ll be hard to get your money back.

Awareness generally is higher, but people are still getting conned left right and center.

As with any technology, it enables bad just as well as good.

Source: Eweek

25 December 2006 | 4,288 views

Merry Christmas to All

It’s been a good year for Darknet since the relaunch in February and I’d like to take this chance to thank you for your readership, with over 2300 RSS subscribers during the week the readership has grown into a solid base.

I’d like to thank you all for reading, commenting and linking to Darknet and supporting what we are doing, we hope to continue providing you with the latest, most important news, tutorials and articles about information security.

Geek Xmas

Merry Christmas to all of you and your families/loved ones.

Hack safe and I hope you got some great gadgets for xmas.

22 December 2006 | 22,252 views


Today while browsing I suddenly came across projectBypass, which is a very useful website which acts as a proxy, and assures us 100% anonymity:

Make ProjectByPass your homepage for 100% secure web surfing! Keep your online activity free from potential attackers.

…of course I have my doubts about this because…

ProjectByPass.com is a FREE Web Based CGI Proxy that allows users to have complete anonymity while browsing the internet. The ProjectByPass CGI Proxy can also be used to bypass school or business filters to play games or visit otherwise blocked websites. Remember, everything that is done with the CGI Proxy is logged to prevent from malicious activity. ProjectByPass.com did not publish any of the information seen within the CGI Proxy, we’re simply a portal to help get you there.

100% anonymity?…I posted it separately from the topic Browse Anonymously at Work or School – Bypass Firewall & Proxy because it has some useful extra options like: remove (cookies, scripts, ads) and hide referrer information.

It’s worth trying it out ;)