Browzar is Bullshit

Not sure if any of you heard of this new super secure ultra cool web browser called Browzar? There was a bit of a backlash as it turned out Browzar was just another custom wrapper for Internet Exploder. Security experts are crying foul over a new supposedly secure browser application. Browzar is promoted as an […]

Tags: , , , , , , ,

Posted in: General News, Security Software | Add a Comment

arp-sk – ARP Swiss Army Knife Tool

arp-sk is basically an ARP Traffic Generation Tool. It’s quite old but still very useful! There are 2 basics mode: – who-has: build a request ARP message. – reply: build a reply ARP message (default) Other advanced modes should come very soon – arping: send a who-has to every host on the LAN to see […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Security Boom Post 9/11

It makes sense really, the paranoia that quickly infected every corner of the ‘Western’ world had to be cashed in on by somebody, tada! The security industry of course. During the Cold War, Canada’s National Optics Institute developed a system to detect which type of enemy tank or fighter jet was approaching. After the Soviet […]

Tags: , , , , , , , , , , , ,

Posted in: Countermeasures, General Hacking | Add a Comment

BeEF – Browser Exploitation Framework

There’s been a lot of nice Web relevant testing and hacking tools coming out lately, I’ve gotten quite a collection to post about, so do try them out and let me know what you think. BeEF is the browser exploitation framework. Its purposes in life is to provide an easily integratable framework to demonstrate the […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Security Software, Web Hacking | Add a Comment

Google Eavesdropping Software

This is a little scary, intensely personal ads which to be frank are getting a little invasive as it is..It’s like the part in minority report where the billboards scan your eyes and talk to you using your name and history of purchases. It looks like it might be happening sooner than we think. The […]

Tags: , , , , , , , , ,

Posted in: General News, Privacy | Add a Comment

Security Compass Web Application Analysis Tool – SWAAT

Announcing a new web application source code analysis tool called the Securitycompass Web Application Analysis Tool or SWAAT. You may know it as a static analysis tool. Currently in its beta release, this .Net command-line tool searches through source code for potential vulnerabilities in the following languages: Java and JSP ASP.Net PHP Using xml-based signature […]

Tags: , , , , , , , , , , , , ,

Posted in: Hacking Tools, Security Software, Web Hacking | Add a Comment
Janus Project

Super Mega Wi-Fi Hacking Machine – Janus Project

Apart from the fact Janus is almost like Anus this is a very cool project. Seriously this is really geeky stuff, but super cool. If you think seeing a dozen wireless networks makes your computer the ultimate scanning box, think again. A small security firm has made a portable computer that is capable of scanning […]

Tags: , , , , , , , , , ,

Posted in: Network Hacking, Wireless Hacking | Add a Comment

Nerdcore Hits the Streets – Geek Music for the Masses

Something a little off-topic for once, nerdcore is getting big! Geek music is hitting the streets. Gangsta is dead. Grime is a bore. There’s a new beat on the street and it’s called Nerdcore. This geeky hip hop subgenre, also dubbed CS rap (that’s computer science, yo!), is finally booting up with the release of […]

Tags: , , , , , , , , , , ,

Posted in: General Hacking | Add a Comment

FIS [File Inclusion Scanner] v0.1 – PHP Vulnerability

A useful tool for anyone working with PHP applications. DESCRIPTION ———— FIS (File Inclusion Scanner) is a vulnerability scanner for PHP applications. Is scans PHP files mapping PHP/HTTP variables and then performs a security audit,in order to find out which of them are exploitable. USAGE —— php fis.php [local file] [remote file] [remote FIS ID […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Security Software, Web Hacking | Add a Comment

Most Damaging Computer Attacks Rely on Stolen Logins

A sterling case for two factor authentication if I ever saw one. The rule is use two of the 3 methods of authentication, if possible use all 3. What you have (A USB key or Token) What you are (Biometrics – Fingerprint or Iris scan) What you know (A password or passphrase) More than 8 […]

Tags: , , , , , , , , ,

Posted in: General Hacking | Add a Comment