Massive Data Theft Operation Uncovered

UK Police have uncovered a fairly massive data theft operation with a total close to 8,500 victims. It’s quite worrying when things like this are uncovered as if 1 is uncovered or discovered…imagine how many aren’t found out about, just like exploits. British electronic-crime detectives are investigating a massive data theft operation that stole sensitive […]

Tags: , , , , , , ,

Posted in: General Hacking, Malware, Privacy | Add a Comment

NMAP 4.20 released

This is just a simple warning to all NMAP users out there. If you’re registered on the announcement mailing list you already now this, otherwise, heads up. NMAP 4.20 has been released with something that looks promising. 2nd generation OS detection. The changelog is available here. Enjoy!

Tags: , , ,

Posted in: Hacking Tools | Add a Comment

Linux Reverse Engineering Hacker Challenge

The first round results of the Linux Reverse Engineering Hacker Challenge are out! It was expected that an intermediate hacker with Linux experience should be able to defeat the protection(s) in less than 10 hours. Participants may earn up to $4100 USD. A total of 93 individuals registered to participate in the first Hacker […]

Tags: , , , , , , ,

Posted in: Linux Hacking, Programming | Add a Comment

(IN)SECURE Magazine ISSUE 1.9 – December 2006

(IN)SECURE Magazine is a freely available digital security magazine discussing some of the hottest information security topics. It can be distributed only in the form of the original non-modified PDF document. The 9th issue of (IN)SECURE magazine was recently released, in this issue you can find the following: Effectiveness of security by admonition: a case […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

Metasploit 3.0 Beta 3 Released

The Metasploit Framework is an advanced open-source exploit development platform. The 3.0 tree represents a complete rewrite of the 2.0 codebase and provides a scalable and extensible framework for security tool development. The 3.0 Beta 3 release includes support for exploit automation, 802.11 wireless packet injection, and kernel-mode payloads. Windows users are now presented with […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Programming | Add a Comment

Internet Explorer 7 (IE7) Vulnerability Hits the Streets

This was a while back, but with Microsoft’s security record it’s pretty much inevitable.. Even before release (as with Vista) flaws were found. Introduction A vulnerability has been discovered in Internet Explorer, which can be exploited by malicious people to disclose potentially sensitive information. Please use the test below, to see an example of how […]

Tags: , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Windows Hacking | Add a Comment

Writing Worms for Fun or Profit

0x00: Preface Media, kindly supported by AV “experts”, drawn apocalyptical vison of desctruction caused by stupid M$ Outlook / VisualBasic worm, called “ILOVEYOU”. Absurdal estimations – $10M lost for “defending the disease”, especially when you take a look at increasing with the speed of light value of AV companies market shares, made many people sick. […]

Tags: , , , , , , , , , ,

Posted in: Malware, Old Skool Philes, Programming | Add a Comment

the Art of Virology 01h

In this part we will discuss the basic framework of a computer virus… The basics of a virus consists of two elementary procedures (others will tell you three). These are: a search routine a infection routine [anti-detection routines] The search routine This routine will have to be a more delicate one [but not hard to […]

Tags: , , , ,

Posted in: Virology | Add a Comment

Metasploit 2.7 Released – Automated Hacking

The Metasploit Framework is an advanced open-source exploit development platform. The 2.7 release includes three user interfaces, 157 exploits and 76 payloads.The Framework will run on any modern operating system that has a working Perl interpreter. The Windows installer includes a slimmed-down version of the Cygwin environment. Windows users are encouraged to update as soon […]

Tags: , , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment