(in)Secure 1.10 Magazine – Infosec E-zine Released

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. It can be distributed only in the form of the original non-modified PDF document. ISSUE 1.10 (February 2007) – DOWNLOAD Microsoft Windows Vista: significant security improvement? Review: GFI Endpoint Security 3 Interview with Edward Gibson, Chief Security Advisor […]

Tags: , , , , ,

Posted in: General Hacking | Add a Comment

Metasploit Exploit Framework Version 3.0 Released

Finally it’s out of BETA, Metasploit Framework Version 3.0 has been released and it’s a lot more Windows friendly. The Metasploit Framework (“Metasploit”) is a development platform for creating security tools and exploits. Version 3.0 contains 177 exploits, 104 payloads, 17 encoders, and 3 nop modules. Additionally, 30 auxiliary modules are included that perform a […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment
Outpost Firewall

Agnitum Outpost Firewall PRO Review

Agnitum Outpost Firewall Pro is a software based firewall I respect a lot, and used to actually use…It used to be fairly light weight, secure and had some good features the other firewalls at the time didn’t have (system file integrity checking and so on). But nowadays with NAT routers, the need for desktop firewalls […]

Tags: , , , , , , , , ,

Posted in: Advertorial, Countermeasures, Security Software | Add a Comment

FireCAT – Firefox Catalog of Auditing Tools

After the web 2.0 hacking with firefox and its plugins article I wrote some months ago, recently I found a new way to transform firefox in the ultimate pen-testing tool… actually it has been lying in my inbox for days… …new Firefox Framework Map collection of the most useful security oriented extensions. We called the […]

Tags: , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

JBroFuzz 0.5 from OWASP – Stateless Network Protocol Fuzzer

OWASP JBroFuzz is a stateless network protocol fuzzer that emerged from the needs of penetration testing. Written in Java, it allows for the identification of certain classess of security vulnerabilities, by means of creating malformed data and having the network protocol in question consume the data. The purpose of this application is to provide a […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Hackers Attack Root Servers and Slow Internet Key Traffic

Well at least it shows the Internet is not very susceptible to such attacks due to its distributed nature, even if the root nameservers are down, the DNS system still functions. This was a pretty heavy attack though and the most significant in the past 5 years or so, someone testing their ego I guess. […]

Tags: , , , , , , , , ,

Posted in: General News, Network Hacking | Add a Comment

ObiWaN – Web Server Brute Forcing from Phenoelit

This Phenoelit tool called ObiWaN is written to carry out brute force security testing on Webservers. The idea behind this is webservers with simple challenge-response authentication mechanism mostly have no switches to set up intruder lockout or delay timings for wrong passwords. In fact this is the point to start from. Every user with a […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking, Web Hacking | Add a Comment

Check Point VPN-1 Power VSX NGX – Virtual Firewalls Get Clustered

Clustered Firewalls? What on earth next, beowulf IDS systems? Check Point has added cluster support and more granular controls to its virtual firewall software, memorably named Check Point VPN-1 Power VSX NGX. Virtual firewalls can now be distributed around a server cluster, with standby firewalls on alternative servers. System administrators can also shift processor power […]

Tags: , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
Backup Platinum

Backup Platinum – CD, FTP & LAN Backup Software Review

Backup Platinum is an Windows platform backup program to make another copy of your important stuff so if your PC burns/gets pwned/crashes etc you won’t lose everything. It supports backup by Hard or USB drives, CD-R/W or DVD±R/RW media, FTP server or Local Area Network (LAN). It’s easy enough to download and install, you can […]

Tags: , , , , ,

Posted in: Advertorial, General News, Security Software | Add a Comment

Technika – Automate Common Exploit Tasks

Technika was developed for the computer security professionals to automate common exploitative task from the browser. It acts like a standard OS shell scripting environment. You can script everything from the currently viewed page just like Greasemonkey (spawn processes, unrestricted XMLHttpRequest connections and sockets). You can autorun bookmarklets and perform safe operations on the currently […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Web Hacking | Add a Comment