Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis

Introducing a pair of tools that go well together and give you some good control for HTTP transaction analysis and looking at the security of web applications. Odysseus is a tool designed for testing the security of web applications. Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

Visa Security Flaws Prior to Consumer Release

Now Vista is actually out we haven’t heard much about it, before it’s commercial release however there was a lot of flaws released and discussion about the (in)security of the OS. The architecture does seem a lot better.. But still it’s from Microsoft, how long until we get a remote root exploit giving the highest […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
Burp Proxy

Burp Proxy & Burp Suite – Attacking Web Applications

I love the Burp Suite, I really do. It’s pretty much my favourite local proxy program and my favourite suite of tools for security testing web applications (especially the session investigation and manipulation parts). Another great thing is it’s cross platform, so you don’t have to learn different tools for Windows and Linux. Basically Burp […]

Posted in: Hacking Tools, Security Software, Web Hacking | Add a Comment

Hacking your $60 Router into a $600 Router

This is a bit of hacking in the original sense of the word, taking a $60 router and giving it the capabilities of something costing in the hundreds or thousands (enterprise level). Of all the great DIY projects at this year’s Maker Faire, the one project that really caught my eye involved converting a regular […]

Tags: , , , , , , , , , , ,

Posted in: Hardware Hacking, Linux Hacking, Network Hacking | Add a Comment

Introducing WHCC – Web Hack Control Center

Web Hack Control Center is a GUI based web server vulnerability scanner or assessment tool. This application gives you the means to identify which security vulnerabilities exist on your web servers by scanning them for the most popular server exploits. WHCC contains a database of thousands of exploits for a variety of web servers. This […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
DPL

Router/Switch Default Password List Updated

The famous Phenoelit Default Password List has been updated, it’s been quite some time since an update. http://www.phenoelit.org/dpl/dpl.html This is a must have resource on your pen-drive and backed up offline somewhere for those important times when you need to know the login for a router/switch :)

Tags: , , , , , , , , ,

Posted in: General Hacking, Network Hacking | Add a Comment

Technitium MAC Address Changer v4 (TMACv4) Released

Technitium MAC Address Changer v4 (TMACv4 C4) has been officially released. Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Phishing Fraud Cases Growing in the UK

Now this is a massive growth, 8000% percent..woah! Thankfully losses are still ‘modest’ whatever that means, I guess although the attacks grow in number, awareness an education also increases (in places like UK anyway) so the risk is fairly well mitigated. UK incidents of phishing scams have grown 8,000 per cent over the last two […]

Tags: , , , , , , , , , ,

Posted in: Phishing, Spammers & Scammers | Add a Comment

SIP Proxy – VoIP Security Testing Tool

SIP Proxy is an Open Source VoIP security test tool which has been developed by the students Philipp Haupt and Matthias Halimann during their diploma thesis and second student research project at the University of Applied Sciences Rapperswil. With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Logic Bomb Backfires on Hacker Employee

Ah the logic bomb, a source of humour for many due to it’s frequent showing up in ‘hacking’ movies, and it’s complete mis-use. ZOMG THE LOGIC BOMB IT’S GONNA PWN US ALL! A former UBS PaineWebber employee was sentenced to eight years in prison on Wednesday for planting a computer “logic bomb” on company networks […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment