Handy Recovery

Handy Recovery for Recovering Deleted Data on Windows

Handy Recovery is pretty neat software, there is occasions when I’m using Windows and I need to recover something or I’ve deleted something by mistake (I have a habit of using SHIFT+DEL so it’s not even in the recycle bin. I usually use Active Undelete and was pretty happy with it, I got a chance […]

Tags: , , , , , , , , ,

Posted in: Forensics, Security Software, Windows Hacking | Add a Comment

SHA-1 Cracked – Old News, But People Still Talk

A paper about cracking SHA-1 originally surfaced in 2005, from a fairly reputable scientific source in China, it was widely publicised nor talked about much. But then recently, just last month China managed to make a wave out of it, almost 2 years after the initial ‘report’. It was even Slashdotted on January 20th 2007, […]

Tags: , , , , , , , , , , , ,

Posted in: Cryptography, General Hacking | Add a Comment

A Collection of Web Backdoors & Shells – cmdasp cmdjsp jsp-reverse php-backdoor

Michael Daw has collected some WEB backdoors to exploit vulnerable file upload facilities and others. It’s a pretty useful library for a variety of situations, especially for those doing web application security audits and web app security. Understanding how these backdoors work can also help security administrators implement firewalling and security policies to mitigate obvious […]

Tags: , , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment
Solaris 10

Sun Solaris 10 – Free Offer – Media DVD

It’s good to have a variety of Operating Systems in your hacking lab at home, it helps you get familiar with them..as to break things, you have to know how they work first. So get to know Solaris, they have some pretty neat security related software inside their OS and generally are pretty good when […]

Tags: , , , , , , ,

Posted in: General News, UNIX Hacking | Add a Comment

ADTool – Active Directory Domain Listing Tool

ADtool is a neat tool to help you list all the machines that are part of an Active Directory driven domain or network. It is intended to help pentesters and admins in their day to day work, there are some other tools that can accomplish the work for listing domain servers, but unfortunately all other […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Windows Hacking | Add a Comment

Defense Workers Warned About Spy Coins for Espionage

This is a pretty cool new development, something straight out of a Tom Clancy thriller or a spy/hacker movie. Introducing Spy Coins! People are actually being warned about picking up stray coins as they might have surveillance devices inside. Can the coins jingling in your pocket trace your movements? The Defense Department is warning its […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, General Hacking, Privacy | Add a Comment

LFT – Layer Four Traceroute and WhoB

LFT LFT, short for Layer Four Traceroute, is a sort of ‘traceroute’ that often works much faster (than the commonly-used Van Jacobson method) and goes through many configurations of packet-filters (firewalls). More importantly, LFT implements numerous other features including AS number lookups through several reliable sources, loose source routing, netblock name lookups, et al. What […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Serious XSS Flaw in Google Desktop Allows Data Theft

Google has fixed a security flaw in its desktop search software that created a means for hackers to rifle through personal files on users’ PCs. A failure in Google Desktop to “properly encode output containing malicious or unexpected characters” created a means for hackers to cross from the web environment to the desktop application environment. […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, General Hacking | Add a Comment

Why Blurring or Mosaicing Important Information is a BAD Idea

I saw a pretty interesting article a few days attempting to reverse engineer the mosaic tool used often online to obscure sensitive or confidential information. The article shows that the mosaic isn’t actually very random, and in a way you can brute force reverse engineer the mosaic to reveal the contents before they were obscured. […]

Tags: , , , , , ,

Posted in: General Hacking, Privacy | Add a Comment
Fierce

Fierce Domain Scanner Released – Domain Reconnaissance Tool

Fierce domain scan was born out of personal frustration after performing a web application security audit. It is traditionally very difficult to discover large swaths of a corporate network that is non-contiguous. It’s terribly easy to run a scanner against an IP range, but if the IP ranges are nowhere near one another you can […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment