Slavasoft FSUM and Hashcalc md5 & File Integrity for Windows

FSUM is a fast and handy command line utility for file integrity verification. It offers a choice of 13 of the most popular hash and checksum functions for file message digest and checksum calculation. You can easily use FSUM with a batch wrapper to do automated file integrity monitoring, and use something like blat to […]

Tags: , , , , , , ,

Posted in: Countermeasures, Forensics, Security Software | Add a Comment

Legal to Unlock Cell Phones Since November 2006

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider. Before that it was illegal to unlock your phone but finally in November 2006 it came out in court […]

Tags: , , , , , ,

Posted in: Hardware Hacking, Legal Issues, Telecomms Hacking | Add a Comment

DNS Brute Force eXtract – WS-DNS-BFX

There is another option for DNS Brute Forcing which uses threads, so may be faster than TXDNS 2.0 which we posted about recently. What does it do? This program was written to extract valid hosts of a domain that deny zone transfers. The program supports: IPv4 => IP Address of 32 bits. IPv6 => IP […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Chaos Communication Camp (CCC) 2007 – Germany

The Chaos Communication Camp is an international, five-day open-air event for hackers and associated life-forms. The Camp features three conference tracks with interesting lectures, workshops and other stuff. Chaos Communication Camp 2007 will take place at a brand new location at the Airport Museum Finowfurt, directly at Finow airport. So if you like, you can […]

Tags: , , , , , ,

Posted in: Events/Cons | Add a Comment

PHProxy 0.5 Beta Released – Web HTTP Proxy to Bypass Firewalls

What is PHProxy? PHProxy is a Web HTTP proxy programmed in PHP to bypass firewalls and other proxy restrictions through a Web interface very similar to the popular CGIProxy. School/country/company blocked your favorite Website? Look no further! The server that this script runs on simply acts as a medium that retrives resources for you. The […]

Tags: , , , , , , , ,

Posted in: Security Software, Web Hacking | Add a Comment

Smart Trojan Targets eBay Users

It seems like people that make malware are getting more specific nowadays, the are no longer writing random self-propagating worms or trojans just for the sake of knowledge or notoriety. Far more common nowadays is malware for specific purposes to capture login or banking details for certain sites or organisations. This time it’s a custom […]

Tags: , , , , , , , ,

Posted in: Malware, Web Hacking, Windows Hacking | Add a Comment

SSA 1.5.1 – Security System Analyzer an OVAL Based Scanner

Open Vulnerability and Assessment Language (OVAL) is an international, information security, community standard to promote open and publicly available security content, and to standardize the transfer of this information across the entire spectrum of security tools and services. OVAL includes a language used to encode system details, and an assortment of content repositories held throughout […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Security Software, Windows Hacking | Add a Comment

The Black & White Ball UK – Whitehat vs Blackhat

Black hat hackers vs White hat professionals – This is the Black & White Ball The Black & White Ball will be held at the stylish Ministry of Sound venue in London, the date is to be confirmed (but it will be in September). In security parlance, the terms Black Hat and White Hat refer […]

Tags: , , , , , , , ,

Posted in: Events/Cons | Add a Comment

(in)Secure 1.10 Magazine – Infosec E-zine Released

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. It can be distributed only in the form of the original non-modified PDF document. ISSUE 1.10 (February 2007) – DOWNLOAD Microsoft Windows Vista: significant security improvement? Review: GFI Endpoint Security 3 Interview with Edward Gibson, Chief Security Advisor […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

Metasploit Exploit Framework Version 3.0 Released

Finally it’s out of BETA, Metasploit Framework Version 3.0 has been released and it’s a lot more Windows friendly. The Metasploit Framework (“Metasploit”) is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment