Phrack 64 Released – It’s been a long time..

Finally a new Phrack! Phrack 64 has been released a while back at the end of May, and it’s been quite a wait. At the beginning in 1985, Phrack started as an anarchy magazine. You can learn from the first issues how to create your own bomb or how to seriously take advantage of the […]

Tags: , , , , , , ,

Posted in: General News | Add a Comment

Fuzzled – PERL Fuzzing Framework

There has been an explosion of fuzzing tools lately, quite a few we have mentioned here on Darknet. Someone else noticed this, and wondered where is the Perl framework to complete the family? With that in mind he spent the last few months working on something that should fill the gap – Fuzzled. Fuzzled is […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Programming | Add a Comment

Darknet Videos

I was thinking that the darknet authors should create videos when they write about different tools… It should be fun to see presentations… and also would bring darknet more hits… I made a video for my previous article, and uploaded it to youtube: stealth techniques – syn …for better quality download it: here Is any […]

Tags: , , , , ,

Posted in: General News | Add a Comment

stealth techniques – syn

Or half-open scanning technique is the first of three to come series about stealth scanning… The other two are Xmas/Fin/Null and idle/zombie scan techniques… Intro This is a series of three to come articles about stealth scanning, everything that I am going to present is hping oriented so if you want to learn this techniques […]

Tags: , , , , , , , , , , , , , , ,

Posted in: General Hacking, Hacking Tools, Linux Hacking, Network Hacking, Windows Hacking | Add a Comment
PRIAMOS Project

Priamos Project – SQL Injector and Scanner

PRIAMOS is a powerful SQL Injector & Scanner You can search for SQL Injection vulnerabilities and inject vulnerable string to get all Database names, Tables and Column data with the injector module. You should only use PRIAMOS to test the security vulnerabilities of your own web applications (obviously). The first release of PRIAMOS contain only […]

Tags: , , , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment

Zalewski (lcamtuf) Strikes Again – More Vulnerabilites in IE and Firefox

Our Polish friend and expert security researcher, Michal Zalewski (lcamtuf), known for his endless stream of vulnerabilities in all manners of software, has struck again. This time with some pretty serious flaws in both Internet Exploder Explorer and Firefox. This time it’s 4, 2 in IE and 2 in Firefox. The first which effects fully […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

SQLBrute – SQL Injection Brute Force Tool

SQLBrute is a tool for brute forcing data out of databases using blind SQL injection vulnerabilities. It supports time based and error based exploit types on Microsoft SQL Server, and error based exploit on Oracle. It is written in Python, uses multi-threading, and doesn’t require non-standard libraries (there is some code in there for pycurl, […]

Tags: , , , , , ,

Posted in: Database Hacking, Hacking Tools | Add a Comment

Michigan Man Fined $400 for Using Coffee Shop’s Wi-Fi Network

Well this is a harsh turn of events, a while back an ‘ethics expert’ said Wifi Jacking is OK, now this poor guy has got pretty harshly screwed for using an open wireless connection from a nearby coffeeshop. A Michigan man has been fined $400 and given 40 hours of community service for accessing an […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Wireless Hacking | Add a Comment