Router/Switch Default Password List Updated

The famous Phenoelit Default Password List has been updated, it’s been quite some time since an update. http://www.phenoelit.org/dpl/dpl.html This is a must have resource on your pen-drive and backed up offline somewhere for those important times when you need to know the login for a router/switch :)

Tags: , , , , , , , , ,

Posted in: General Hacking, Network Hacking | Add a Comment

Technitium MAC Address Changer v4 (TMACv4) Released

Technitium MAC Address Changer v4 (TMACv4 C4) has been officially released. Technitium MAC Address Changer allows you to change Machine Access Control (MAC) Address of your Network Interface Card (NIC) irrespective to your NIC manufacturer or its driver. It has a very simple user interface and provides ample of information regarding each NIC in the […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Phishing Fraud Cases Growing in the UK

Now this is a massive growth, 8000% percent..woah! Thankfully losses are still ‘modest’ whatever that means, I guess although the attacks grow in number, awareness an education also increases (in places like UK anyway) so the risk is fairly well mitigated. UK incidents of phishing scams have grown 8,000 per cent over the last two […]

Tags: , , , , , , , , , ,

Posted in: Phishing, Spammers & Scammers | Add a Comment

SIP Proxy – VoIP Security Testing Tool

SIP Proxy is an Open Source VoIP security test tool which has been developed by the students Philipp Haupt and Matthias Halimann during their diploma thesis and second student research project at the University of Applied Sciences Rapperswil. With SIP Proxy you will have the opportunity to eavesdrop and manipulate SIP traffic. Furthermore, predefined security […]

Tags: , , , , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Logic Bomb Backfires on Hacker Employee

Ah the logic bomb, a source of humour for many due to it’s frequent showing up in ‘hacking’ movies, and it’s complete mis-use. ZOMG THE LOGIC BOMB IT’S GONNA PWN US ALL! A former UBS PaineWebber employee was sentenced to eight years in prison on Wednesday for planting a computer “logic bomb” on company networks […]

Tags: , , , , , , , ,

Posted in: Legal Issues, Malware | Add a Comment

Class President Hacks School Grades

Ah the old mythical tale of hacking your school to change your grades to straight A’s, well I know people do it, I’ve seen it in the past…but now someone has actually gotten caught for it. And what’s more..he’s the senior class president! Cooper City High School’s senior class president was arrested Tuesday and charged […]

Tags: , , , , ,

Posted in: General Hacking, Legal Issues | Add a Comment

Wep0ff – Wireless WEP Key Cracker Tool

Wep0ff is new tool to crack WEP-key without access to AP by mount fake access point attack against WEP-based wireless clients. It uses combination of fragmentation and evil twin attacks to generate traffic which can be used for KoreK-style WEP-key recovery. This tool can be used to mount fake access point attack against WEP-based wireless […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Wireless Hacking | Add a Comment

PHP Security Specialist (Stefan Esser) Resigns

This is sad news as PHP hasn’t particularly had a good security record in the past. He has voiced his frustrations with the internal workings of the PHP team and the development process, he has been working hard to make PHP inherently more secure…But from the look of things it seems like he was having […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, General News, Web Hacking | Add a Comment

Data Recovery – A Decent Article

Data recovery is an important subject and it’s definitely a good thing to have a positive understanding of data recovery and how it could effort you personally or your business. So someone told me about this Data recovery article which is a decent original reference to data recovery which contains some good original information, links […]

Tags: , , , , ,

Posted in: Forensics, General Hacking | Add a Comment

WordPress 2.0.7 Follows Hot on the Tail of WordPress 2.0.6

Recently a bug in certain versions of PHP came to the attention of the WordPress developers, this bug could cause a security vulnerability in your any blogs running version 2.0.6 or below blog. It was fairly easy to work around, so they decided to release 2.0.7, just 10 days after the release of 2.0.6, to […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment