AccessDiver

AccessDiver – Web Site Security Testing Tool

AccessDiver is a security tester for WEB sites. It incorporates a set of powerful features which help you find and organize failures and weaknesses from your web site. AccessDiver can detect security failures on your web pages. It has multiple efficient tools which will verify the robustness of your accounts and directories accurately. So, you […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Google Fixes Serious Vulnerability in Gmail

Google started the new year by fixing a serious vulnerability in Gmail. This was quite an interesting case and once again (as everything relating to web apps seems to be nowdays) it was an XSS flaw that allowed malicious attackers to steal your contact list, leading to some pretty bad information leakage. Google has fixed […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment

Happy 1 Year Anniversary to the Relaunch of Darknet

Yes it’s been exactly one year since Darknet was relaunched in it’s new form supported by WordPress and a variety of posts about tools, tutorials and the latest news from the information security and specifically ethical hacking areas. The first post of the new site: Welcome to Darknet – The REBIRTH It’s been an interesting […]

Tags: , , , , , , , , ,

Posted in: Site News | Add a Comment

Secunia Releases Software Inspector

Feature Overview – The Secunia Software Inspector: Detects insecure versions of applications installed Verifies that all Microsoft patches are applied Assists you in updating your system and applications Runs through your browser. No installation or download is required. How Does it Work: The Secunia Software Inspector relies on carefully crafted “Secunia File Signatures” to recognise […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Security Software, Windows Hacking | Add a Comment

Spam on the Increase – Image Spam Accounting for More

As always, spam filters get better and smarter, but so do spammers..and frankly spammers have more to gain by beating the spam filters so they always work harder and think in more innovative ways. As they get their spam resembling real emails more and more, the spam filters become less accurate. On top of that […]

Tags: , , , , , , , , , ,

Posted in: General News, Phishing, Spammers & Scammers | Add a Comment
Caecus

Caecus – Web Brute Forcing Tool with OCR Support

Caecus is a unique tool which can bruteforce some OCR form based protections. As far as we know at Darknet, this is the only publicly available OCR brute forcing tool. These scripts generates a digital image as an extra layer of security called OCR. Some versions of this script also use session id’s to keep […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Cafepress.com Under Heavy DDoS Attack

Towards the end of last year Cafepress.com came under heavy DDoS attack (Distributed Denial of Service) which took it down for some time. The problem with DDoS attacks is there’s not much you can do to prevent it, if that guy has enough zombies resulting in enough bandwidth, you are going down. DDoS attacks have […]

Tags: , , , , , , , ,

Posted in: General News, Network Hacking | Add a Comment

Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis

Introducing a pair of tools that go well together and give you some good control for HTTP transaction analysis and looking at the security of web applications. Odysseus is a tool designed for testing the security of web applications. Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Web Hacking | Add a Comment

Visa Security Flaws Prior to Consumer Release

Now Vista is actually out we haven’t heard much about it, before it’s commercial release however there was a lot of flaws released and discussion about the (in)security of the OS. The architecture does seem a lot better.. But still it’s from Microsoft, how long until we get a remote root exploit giving the highest […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment
Burp Proxy

Burp Proxy & Burp Suite – Attacking Web Applications

I love the Burp Suite, I really do. It’s pretty much my favourite local proxy program and my favourite suite of tools for security testing web applications (especially the session investigation and manipulation parts). Another great thing is it’s cross platform, so you don’t have to learn different tools for Windows and Linux. Basically Burp […]

Posted in: Hacking Tools, Security Software, Web Hacking | Add a Comment