Taof 0.1 Network Protocol Fuzzer Released

Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols. Taof aids the researcher during the data retrieval process by providing a transparent proxy functionality that forwards and logs requests from […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment

Spamhaus & e360 Battle is Heating Up

The battle is heating up between the spammers e360 and the anti-spam warlords Spamhaus, some say the Internet may meltdown if Spamhaus stops its service.. Some estimates say 80% of spam is stopped by Spamhaus and e-mail could suddenly shoot to a server melting rate if their service is pulled. The legal battle between antispam […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Spammers & Scammers | Add a Comment

McDonalds Japan Spreads Malware on MP3 Player

This is pretty funny, but frankly typical of McDonalds..act before they think, it’s cheap, it’ll get more customers, whack it out! They gave out a bunch of flash drive mp3 players as a promotion, it turns out every single one was loaded with a fairly nasty piece of spyware! McDonalds Japan has launched a recall […]

Tags: , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

Wyd – Automated Password Profiling Tool

Wyd is a neat tool I found recently for Password Profiling. In current IT security environments, files and services are often password protected. In certain situation it is required to get access to files and/or data even when they are protected and the password is unknown. wyd.pl was born out of those two of situations: […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

Hackers Target Home Users for Cash

Hackers are switching targets now, companies are getting too hard to break into due to the availability of decently configured perimeter kit like firewalls and IDS. Plus the information they do get if they manage to break in is often worthless commercially and really not worth the effort. So instead, they target the end user, […]

Tags: , , , , , , , , , ,

Posted in: General News, Malware, Spammers & Scammers | Add a Comment

New Firefox vulnerability – DoS and [DELETED] – UPDATED

This has just been posted to Bugtraq. For now you can test if your version is vulnerable, here. (will cause Firefox to close) So far Firefox 1.5.0.7 and 2.0 (Linux) have been tested, and both vulnerable. Firefox 1.0.7 (Win32), not vulnerable. The code used on the test page and the one submitted to Bugtraq can […]

Tags: , , , ,

Posted in: Exploits/Vulnerabilities | Add a Comment

PMD – Java Source Code Scanner

Continuing with the series of tools I’ve been posting on source code auditing and application security, here is PMD a Java Source Code Scanner. PMD scans Java source code and looks for potential problems like: Possible bugs – empty try/catch/finally/switch statements Dead code – unused local variables, parameters and private methods Suboptimal code – wasteful […]

Tags: , , , , , , , , , , , , , , , , ,

Posted in: Programming, Security Software | Add a Comment

Anti-Spyware Groups Still Require Legislation

Cyber and computer laws are always a grey area, they tend to be very vague and don’t cover specific technologies. Spam is a good example, look at how long we’ve been getting spammed, and it’s been a SERIOUS problem for at least the last 5 years, spam legislation has only started coming in to effect […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Malware, Spammers & Scammers | Add a Comment

BobCat SQL Injection Tool based on Data Thief

BobCat is a tool to aid a security consultant in taking full advantage of SQL injection vulnerabilities. It is based on a tool named “Data Thief” that was published as PoC by appsecinc. BobCat can list the linked severs, database schema, and allow the retrieval of data from any table that the current application user […]

Tags: , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Web Hacking | Add a Comment

Security Companies Fight Against Microsoft Security Center

No surprise really? Microsoft and they monopoly strategies, anti-competitive behaviour, nothing new really is it? Microsoft and its security rivals are feuding over a key piece of Windows Vista real estate. The fight is over the display of technology that helps Vista owners manage the security tools on their PC. Symantec, McAfee, Check Point Software […]

Tags: , , , , , , , , , ,

Posted in: General News, Security Software | Add a Comment