MySpace Paedo Caught by PERL Script

Now for once, this is a really neat use of technology, someone using their brains and a suitable tech to solve a problem that is very apparent. PERL may be frowned upon by some as being old or outdated, but seriously for parsing data, pattern matching and trawling, it’s still excellent and you can get […]

Tags: , , , , , , ,

Posted in: Programming, Web Hacking | Add a Comment

Medusa Fast Parallel Password Cracker 1.3 Released

Medusa is intended to be a speedy, massively parallel, modular, login brute-forcer. The goal is to support as many services which allow remote authentication as possible. The author considers following items as some of the key features of this application: Thread-based parallel testing. Brute-force testing can be performed against multiple hosts, users or passwords concurrently. […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Password Cracking | Add a Comment

the Art of Virology 00h

This is the first part (of many others to come) consisting of basic a introduction to different viruses, some terminology and other aspects required before starting to understand or write viruses. Definition A virus is (taken from Windows XP’s Help And Support Center): A program that attempts to spread from computer to computer and either […]

Tags: , , , , , , , , , , , , , , ,

Posted in: Virology | Add a Comment

Taof 0.1 Network Protocol Fuzzer Released

Taof is a GUI cross-platform Python generic network protocol fuzzer. It has been designed for minimizing set-up time during fuzzing sessions and it is especially useful for fast testing of proprietary or undocumented protocols. Taof aids the researcher during the data retrieval process by providing a transparent proxy functionality that forwards and logs requests from […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Network Hacking, Security Software | Add a Comment

Spamhaus & e360 Battle is Heating Up

The battle is heating up between the spammers e360 and the anti-spam warlords Spamhaus, some say the Internet may meltdown if Spamhaus stops its service.. Some estimates say 80% of spam is stopped by Spamhaus and e-mail could suddenly shoot to a server melting rate if their service is pulled. The legal battle between antispam […]

Tags: , , , , , , , , ,

Posted in: Legal Issues, Spammers & Scammers | Add a Comment

McDonalds Japan Spreads Malware on MP3 Player

This is pretty funny, but frankly typical of McDonalds..act before they think, it’s cheap, it’ll get more customers, whack it out! They gave out a bunch of flash drive mp3 players as a promotion, it turns out every single one was loaded with a fairly nasty piece of spyware! McDonalds Japan has launched a recall […]

Tags: , , , , , , ,

Posted in: Malware, Privacy | Add a Comment

Wyd – Automated Password Profiling Tool

Wyd is a neat tool I found recently for Password Profiling. In current IT security environments, files and services are often password protected. In certain situation it is required to get access to files and/or data even when they are protected and the password is unknown. was born out of those two of situations: […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment

Hackers Target Home Users for Cash

Hackers are switching targets now, companies are getting too hard to break into due to the availability of decently configured perimeter kit like firewalls and IDS. Plus the information they do get if they manage to break in is often worthless commercially and really not worth the effort. So instead, they target the end user, […]

Tags: , , , , , , , , , ,

Posted in: General News, Malware, Spammers & Scammers | Add a Comment

New Firefox vulnerability – DoS and [DELETED] – UPDATED

This has just been posted to Bugtraq. For now you can test if your version is vulnerable, here. (will cause Firefox to close) So far Firefox and 2.0 (Linux) have been tested, and both vulnerable. Firefox 1.0.7 (Win32), not vulnerable. The code used on the test page and the one submitted to Bugtraq can […]

Tags: , , , ,

Posted in: Exploits/Vulnerabilities | Add a Comment

PMD – Java Source Code Scanner

Continuing with the series of tools I’ve been posting on source code auditing and application security, here is PMD a Java Source Code Scanner. PMD scans Java source code and looks for potential problems like: Possible bugs – empty try/catch/finally/switch statements Dead code – unused local variables, parameters and private methods Suboptimal code – wasteful […]

Tags: , , , , , , , , , , , , , , , , ,

Posted in: Programming, Security Software | Add a Comment