XSS Shell v0.3.9 – Cross Site Scripting Backdoor Tool

XSS Shell is a powerful XSS backdoor which allows interactively getting control over a Cross-site Scripting (XSS) vulnerability in a web application. Demonstrates the real power and damage of Cross-site Scripting attacks. WHAT IS XSS SHELL ? XSS Shell is powerful a XSS backdoor and zombie manager. This concept first presented by XSS-Proxy (http://xss-proxy.sourceforge.net/). Normally […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Save Your Reputation Online with ReputationDefender

This is a pretty interesting idea and for once it addresses a real requirement. A lot of stories have hit the press about people getting fired or ‘dooced’ because of stuff online or not even getting jobs because of something found on MySpace. So up pops a company that is willing to protect your reputation […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Privacy | Add a Comment

SinFP 2.0.4 – OS Detection – Now Works On Windows

SinFP is a new approach to OS fingerprinting, which bypasses limitations that nmap has. Nmap approaches to fingerprinting as shown to be efficient for years. Nowadays, with the omni-presence of stateful filtering devices, PAT/NAT configurations and emerging packet normalization technologies, its approach to OS fingerprinting is becoming to be obsolete. SinFP uses the aforementioned limitations […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment

Hackers Break Into Water Processing Plant Network

When things like this happen it’s kinda of scary, like a while back when someone managed to get into a highly secure power station network through a stupid contractors laptop that was connected to the net via dialup and to the uber ‘secure’ power station LAN. An infected laptop PC gave hackers access to computer […]

Tags: , , , , , ,

Posted in: General Hacking | Add a Comment

Backframe (Formerly Backweb) JavaScript Attack Console

There has been a recent release of Backframe (Formerly Backweb) Attack Console. Backframe Attack Console was started as an experiment to create a full featured attack console for exploiting web browsers, web users and remote applications. Those who are familiar with XSS Proxy or even BEEF might already be familiar with the core principles of […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Programming, Web Hacking | Add a Comment

Massive Data Theft Operation Uncovered

UK Police have uncovered a fairly massive data theft operation with a total close to 8,500 victims. It’s quite worrying when things like this are uncovered as if 1 is uncovered or discovered…imagine how many aren’t found out about, just like exploits. British electronic-crime detectives are investigating a massive data theft operation that stole sensitive […]

Tags: , , , , , , ,

Posted in: General Hacking, Malware, Privacy | Add a Comment

NMAP 4.20 released

This is just a simple warning to all NMAP users out there. If you’re registered on the announcement mailing list you already now this, otherwise, heads up. NMAP 4.20 has been released with something that looks promising. 2nd generation OS detection. The changelog is available here. Enjoy!

Tags: , , ,

Posted in: Hacking Tools | Add a Comment

Linux Reverse Engineering Hacker Challenge

The first round results of the Linux Reverse Engineering Hacker Challenge are out! http://www.hackerchallenge.org It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first Hacker […]

Tags: , , , , , , ,

Posted in: Linux Hacking, Programming | Add a Comment

(IN)SECURE Magazine ISSUE 1.9 – December 2006

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. It can be distributed only in the form of the original non-modified PDF document. The 9th issue of (IN)SECURE magazine was recently released, in this issue you can find the following: Effectiveness of security by admonition: a case […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment