stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment

Priamos Project – SQL Injector and Scanner

PRIAMOS is a powerful SQL Injector & Scanner You can search for SQL Injection vulnerabilities and inject vulnerable string to get all Database names, Tables and Column data with the injector module. You should only use PRIAMOS to test the security vulnerabilities of your own web applications (obviously). The first release of PRIAMOS contain only […]

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment

Zalewski (lcamtuf) Strikes Again – More Vulnerabilites in IE and Firefox

Our Polish friend and expert security researcher, Michal Zalewski (lcamtuf), known for his endless stream of vulnerabilities in all manners of software, has struck again. This time with some pretty serious flaws in both Internet Exploder Explorer and Firefox. This time it’s 4, 2 in IE and 2 in Firefox. The first which effects fully […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

SQLBrute – SQL Injection Brute Force Tool

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn’t require non-standard libraries (there is some code in there for pycurl, […]

Tags: , , , , , ,

Posted in: Database Hacking, Hacking Tools | Add a Comment

Michigan Man Fined $400 for Using Coffee Shop’s Wi-Fi Network

Well this is a harsh turn of events, a while back an ‘ethics expert’ said Wifi Jacking is OK, now this poor guy has got pretty harshly screwed for using an open wireless connection from a nearby coffeeshop. A Michigan man has been fined $400 and given 40 hours of community service for accessing an […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Wireless Hacking | Add a Comment

Sguil – Intuitive GUI for Network Security Monitoring with Snort

Sguil (pronounced sgweel) is probably best described as an aggregation system for network security monitoring tools. It ties your IDS alerts into a database of TCP/IP sessions, full content packet logs and other information. When you’ve identified an alert that needs more investigation, the sguil client provides you with seamless access to the data you […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Linux Hacking, Network Hacking, Security Software | Add a Comment

Google Acquires Web Security Startup GreenBorder

More Google News this week after Google Launches Online Security & Malware Blog, now they have acquired a web security startup called GreenBorder. Google Inc. said on Tuesday it has bought Internet security startup GreenBorder Technologies Inc., which creates secure connections to protect e-mail and Web users from malicious or unwanted computer code. Terms of […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Malware | Add a Comment

OWASP – SQLiX Project – SQL Injection Scanner

SQLiX, coded in Perl, is a SQL Injection scanner, able to crawl, detect SQL injection vectors, identify the back-end database and grab function call/UDF results (even execute system commands for MS-SQL). The concepts in use are different than the one used in other SQL injection scanners. SQLiX is able to find normal and blind SQL […]

Tags: , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment