AttackAPI 0.5 – JavaScript Security Tools

AttackAPI provides simple and intuitive web programmable interface for composing attack vectors. The project was primary inspired by the JythonShell applet. At its very early stage AttackAPI was a single extensible web enabled python console with a few modules. The 0.5 release of AttackAPI is purely JavaScript based. This is not a shift in the […]

Tags: , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Link & Comment Spamming – A possible solution.

Recently one of the sites I am developing for my self was link spammed. Some unpleasant individual decided that it would be fun to post 160 ‘comments’ spread over all the blog posts. All the comments contained was URL’s. Even more stupid they used BB tags, but as I wrote the site it doesn’t use […]

Tags: , , , , , , , ,

Posted in: General Hacking, Spammers & Scammers, Web Hacking | Add a Comment

Sophos Offers Free Rootkit Detection Tool/Software

Ah, here at Darknet we have always been a fan of Sophos and the way they operate, a very efficient company and good to see good technical products still coming out of the UK! Another good move by them, they have decided to offer a free rootkit detection tool called Sophos Anti-Rootkit..Yah I know, not […]

Tags: , , , , , , , , , , ,

Posted in: Countermeasures, Malware, Windows Hacking | Add a Comment

Anonymous Connections Over the Internet – Using Socks Chains Proxy Proxies

Introduction This tutorial is an attempt to help you re-route all internet winsock applications in ms windows trough a socks chain, thus making your connections much more anonymous. Theory The more different hops you make your data jump, the more difficult it will be to trace it back. take this route for example: you –> […]

Tags: , , , , , , ,

Posted in: Network Hacking, Old Skool Philes, Privacy | Add a Comment

libtiff Vulnerability gives hope for a new GTA-less PSP exploit

QJ.net forums have been abuzz lately with the talk of a possible new exploit centered around a libtiff vulnerability. NOPx86 stating that he’d managed to crash the PSP using this method. As those of you who follow these things know, a crash doesn’t always mean an open door to an exploit. But after a cumulative […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Hardware Hacking | Add a Comment

Bot Herders Go After MS06-40 Exploit

Malware herders are speeding up, the first wave is already here for MS06-40. It’s basically a variant of some old malware suited to the new vulnerability. Same old story then, same packer, technique, new exploit. Same as the days of autorooters. It’s basically the Mocbot trojan that was used in the Zotob worm attack in […]

Tags: , , , , , , , , , ,

Posted in: Exploits/Vulnerabilities, Malware | Add a Comment

OpenOffice.org Security ‘Insufficient’

It seems people are turning some attention towards the security of Open Office finally, I for one say this is a good thing as it means it’s making inroads, it’s becoming popular, it’s getting to be a contender. If people are seriously considering the security implications of using Open Office it means they are actually […]

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, General News | Add a Comment

Microsoft Takes an Effort at Cutting Down Blogspam – Splogs

Splogs are becoming a huge problem, half the stuff you search for nowadays returns a splog, mostly auto syndicated content. I find a lot of my own entries on there, surrounded by Adsense ads. New age scrapers I guess. Technorati returns a lot of results from splogs too, but at least they have made some […]

Tags: , , , , , , , , , , ,

Posted in: General News, Spammers & Scammers | Add a Comment

TCPReplay suite 3.0.beta10. Released

Another good tool updated! TCPReplay suite 3.0.beta10 has been released. For those that don’t know Tcpreplay is a suite of BSD licensed tools written by Aaron Turner for *NIX operating systems which gives you the ability to use previously captured traffic in libpcap format to test a variety of network devices. It allows you to […]

Tags: , , , , , , , , ,

Posted in: Countermeasures, Network Hacking | Add a Comment

OWASP – Fortify Bug Taxonomy

Ah at last a good solid collaborative effort to identify and categorise software vulnerabilities with a solid taxonomy and good organisation! It seems very well written too in terms that anyone familiar with software development or programming can understand. Fortify Software, which identifies and remediates software vulnerabilities, has contributed its collection of 115 types of […]

Tags: , , , , , , ,

Posted in: Countermeasures, Exploits/Vulnerabilities, Web Hacking | Add a Comment