LLTD – Link Layer Topology Discovery Protocol

Gomor released a LLTD (Link Layer Topology Discovery Protocol) implementation written in Perl (using Net::Frame framework). You may use this two modules to write fuzzers, or anything. You can find the modules here: Net Frame LLTD

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Programming | Add a Comment

Google’s Blogger Platform Used to Aid Phishing Attacks

I’ve known for a while you can buy software for spamming and MFA (Made for Adsense) site generation for a few hundred USD which utilises Google’s Blogger platform (blogspot.com sites). You will have seen all the splogs as they are called (spam blogs) hosted on Blogger, a lot of them scrape Darknet articles and repost […]

Tags: , , , , , , , ,

Posted in: Phishing, Spammers & Scammers | Add a Comment

IE 7 Flaw Could Help Phishers – Error Message Processing

Ah another way for phishers and people wanting to steal login credentials to con IE7 users. Yet another reason to use Firefox or Opera? Not saying these browsers are perfect…but look at the amount of problems Internet Exploder Explorer has had. The flaw lies in the way IE7 processes a locally stored HTML error message […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Phishing, Windows Hacking | Add a Comment
Damn Vulnerable Linux

Damn Vulnerable Linux – DVL – IT-Security Attack and Defense

Damn Vulnerable Linux (DVL) is a Linux-based (modified Damn Small Linux) tool for IT-Security & IT-Anti-Security and Attack & Defense. It was initiated for training tasks during university lessons by the IITAC (International Institute for Training, Assessment, and Certification) and S²e – Secure Software Engineering in cooperation with the French Reverse Engineering Team. Damn Vulnerable […]

Tags: , , , , , ,

Posted in: Hacking Tools, Linux Hacking | Add a Comment

Microsoft Loves you to Pirate Their Software

I’ve heard this ‘rumour’ plenty of times, I always suspected it was true and Adobe have said similar things about their software. If you are going to pirate, Microsoft wants you to pirate their software as when you go legit you are already locked in to their proprietary system. All the more grounds for OSS […]

Tags: , , , , ,

Posted in: General News | Add a Comment
BackTrack

BackTrack v2.0 – Hackers LiveCD Finally Released

BackTrack is the result of the merging of the two innovative penetration testing live linux distributions Auditor security collection and Whax. By combining the best features from both distributions and putting continous development energy, the most complete and finest security testing live distro was born: BackTrack BackTrack v.2.0 is finally released, it’s been a long […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Linux Hacking | Add a Comment

Slavasoft FSUM and Hashcalc md5 & File Integrity for Windows

FSUM is a fast and handy command line utility for file integrity verification. It offers a choice of 13 of the most popular hash and checksum functions for file message digest and checksum calculation. You can easily use FSUM with a batch wrapper to do automated file integrity monitoring, and use something like blat to […]

Tags: , , , , , , ,

Posted in: Countermeasures, Forensics, Security Software | Add a Comment

Legal to Unlock Cell Phones Since November 2006

As with the UK, many phones in the US are sold under contract and are given at very discounted rates or even free in some cases if you sign a contract for year withe service provider. Before that it was illegal to unlock your phone but finally in November 2006 it came out in court […]

Tags: , , , , , ,

Posted in: Hardware Hacking, Legal Issues, Telecomms Hacking | Add a Comment

DNS Brute Force eXtract – WS-DNS-BFX

There is another option for DNS Brute Forcing which uses threads, so may be faster than TXDNS 2.0 which we posted about recently. What does it do? This program was written to extract valid hosts of a domain that deny zone transfers. The program supports: IPv4 => IP Address of 32 bits. IPv6 => IP […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Chaos Communication Camp (CCC) 2007 – Germany

The Chaos Communication Camp is an international, five-day open-air event for hackers and associated life-forms. The Camp features three conference tracks with interesting lectures, workshops and other stuff. Chaos Communication Camp 2007 will take place at a brand new location at the Airport Museum Finowfurt, directly at Finow airport. So if you like, you can […]

Tags: , , , , , ,

Posted in: Events/Cons | Add a Comment