Hacking Still Can’t Outdo Stupidity for Data Leaks

Can you believe this the provincial government in British Columbia has managed to auction off a set of data tapes containing people’s social insurance numbers, dates of birth and medical records among other information. The provincial government has auctioned off computer tapes containing thousands of highly sensitive records, including information about people’s medical conditions, their […]

Tags: , , , , , , , ,

Posted in: General News, Privacy | Add a Comment
Download brutus-aet2.zip

Brutus Password Cracker – Download brutus-aet2.zip AET2

If you don’t know, Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Password Cracking, Windows Hacking | Add a Comment

Charity Computers May Fuel Malware Wars

Sometimes doing good can help bad things propagate, sometimes it’s good to consider the big picture and the repercussions of your charitable actions. This is a case where such logic rings true. Programs to send PCs to third world countries might inadvertently fuel the development of malware for hire scams, an anti-virus guru warns. Eugene […]

Tags: , , , , , , , , ,

Posted in: Malware, Spammers & Scammers | Add a Comment

The Top 10 PHP Security Vulnerabilities from OWASP

This is a useful article that has basically taken the OWASP Top 10 Vulnerabilities and remapped them to PHP with actual examples. The Open Web Application Security Project released a helpful document that lists what they think are the top ten security vulnerabilities in web applications. These vulnerabilities can, of course, exist in PHP applications. […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Web Hacking | Add a Comment

Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript

“pleez, pleez, PLEEZ teach me how to hack a Hotmail Account!!!” -unidentified IRC user From here on in you walk alone. Neither little_v OR Black Sun Research Facility AND its members will be responsible for what you do with the information presented here. Do not use this information to impress your “l33t0_b0rit0” friends. Do not […]

Tags: , , , , , , , , , ,

Posted in: General Hacking, Old Skool Philes, Web Hacking | Add a Comment

Teen Data Exposed on Myspace

Ah another flaw in Myspace, this time it’s quite dangerous exposing the details of teenagers. A security hole in the popular MySpace social networking site allowed users to view entries marked “private”, a crucial protection for users aged under 16, according to weekend reports. Though the site is said to have fixed the problem, it […]

Tags: , , , , , , ,

Posted in: General Hacking, Web Hacking | Add a Comment

Remote Network Penetration via NetBios Hack/Hacking

These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003 due to backwards compatibility. This article is being written in a procedural manner. I have approached it much like an intruder would actually […]

Tags: , , , , , , , , ,

Posted in: Network Hacking, Old Skool Philes, Windows Hacking | Add a Comment

AT&T Hack Exposes 19,000 Identities

Ah another huge hacking resulting in a large loss of confidential information, companies really need to start getting more pro-active about aggresively testing their corporate networks and web based applications. Information including CREDIT CARD numbers sadly. AT&T on Tuesday said hackers broke into one of its computer systems and accessed personal data on thousands of […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment

How to get Ops and takeover a channel on IRC Hack Hacking

I’ve been spending a lot of time online lately reading all kinds of stupid text files on how to “Takeover Ops Boi!!!”, “eLeEt WaYs To gEt OpS!!!”, “HOW TO GET OPS ON SERVER SPLITS”, etc. We all know none of these things work, at least not for me. They’re either written by morons, or they […]

Tags: , , , , , , ,

Posted in: General Hacking, Old Skool Philes, Social Engineering | Add a Comment

AttackAPI 0.5 – JavaScript Security Tools

AttackAPI provides simple and intuitive web programmable interface for composing attack vectors. The project was primary inspired by the JythonShell applet. At its very early stage AttackAPI was a single extensible web enabled python console with a few modules. The 0.5 release of AttackAPI is purely JavaScript based. This is not a shift in the […]

Tags: , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment