Some Guidelines on How to Secure your Ubuntu Installation

Since Ubuntu is getting so fantastically popular nowadays I thought this might be useful to some of you. I personally think Ubuntu is great, the features, ease of installation, stability and especially the work they have done on things like wireless drivers make it a breeze to get up and running. It is a pretty […]

Tags: , , , , , , , , , , ,

Posted in: General News, Linux Hacking | Add a Comment

piggy – Download MS-SQL Password Brute Forcing Tool

Piggy is yet another tool for performing online password guessing against Microsoft SQL servers. It supports scanning multiple servers using a dictionary file or a file with predefined accounts (username and password combinations). It’s a pretty simple tool and has a Win32 binary verson – it is a command line tool however.

You can […]

Tags: , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Password Cracking | Add a Comment

The greatest virus of all time

There is a virus on the net from a long time, the damage inflicted by it is unstoppable, or at least that was though, check it out yourself …just kidding, it does not exist but such a virus would be something great =)

Tags: ,

Posted in: Virology | Add a Comment

Learn to use Metasploit – Tutorials, Docs & Videos

Metasploit is a great tool, but it’s not the easiest to use and some people get completely lost when trying to get the most out of it. To help you guys out here is a bunch of links, videos, tutorials and documents to get you up to speed. You can start with this, a good […]

Tags: , , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment

FTester – Firewall Tester and IDS Testing tool

The Firewall Tester (FTester) is a tool designed for testing firewalls filtering policies and Intrusion Detection System (IDS) capabilities. The tool consists of two perl scripts, a packet injector (ftest) and the listening sniffer (ftestd). The first script injects custom packets, defined in ftest.conf, with a signature in the data part while the sniffer listens […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Intel Core 2 Duo Vulnerabilities Serious say Theo de Raadt

The scariest type of all, hardware vulnerabilities. Security guru and creator of OpenBSD Theo de Raadt recently announced he had found some fairly serious bugs in the hardware architecture of Intel Core 2 Duo processors. He goes as far as saying avoid buying a C2D processor until these problems are fixed. A prominent software developer […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking, UNIX Hacking | Add a Comment
Sandcat

Sandcat by Syhunt – Web Server & Application Vulnerability Scanner

Sandcat allows web administrators to perform aggressive and comprehensive scans of an organization’s web server to isolate vulnerabilities and identify security holes. The Sandcat scanner requires basic inputs such as host names, start URLs and port numbers to scan a complete web site and test all the web applications for security vulnerabilities. This is a […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

The Soft Underbelly? – Database Security

It not surprising SQL Injection and database hacking are getting more frequent as people ramp up perimeter security more often than not they forget about interior security, software application security and most of all database security. Of the 2007 total corporate IT budget, respondents said they have allocated 34 percent for database infrastructure and 20.6 […]

Tags: , , , , ,

Posted in: Database Hacking, General News | Add a Comment

FG-Injector – SQL Injection & Proxy Tool

FG-Injector Framework is a set of tools designed to help find SQL injection vulnerabilities in web applications, and help the analyst assess their severity. It includes a powerful proxy feature for intercepting and modifying HTTP requests, and an inference engine for automating SQL injection exploitation. Often web developers think that by disabling error messages in […]

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment