Linux kernel.org Hacker Arrested After Traffic Stop

Linux kernel.org Hacker Arrested After Traffic Stop

So it seems the alleged kernel.org hacker has finally been caught, kinda by accident after being stopped for a traffic violation. It was quite a high profile hack, especially in the open source community as anyone downloading kernel files during that period could have theoretically been compromised. It’s unlikely the kernel code was actually tampered […]

Tags: , , , , , , , ,

Posted in: Linux Hacking, Malware | Add a Comment
DBPwAudit - Database Password Auditing Tool

DBPwAudit – Database Password Auditing Tool

DBPwAudit is a Java database password auditing tool that allows you to perform online audits of password quality for several database engines. The application design allows for easy adding of additional database drivers by simply copying new JDBC drivers to the jdbc directory. Configuration is performed in two files, the aliases.conf file is used to […]

Tags: , , , , , , , ,

Posted in: Database Hacking, Hacking Tools, Password Cracking | Add a Comment
Dropbox Hacked - 68 Million User Accounts Compromised

Dropbox Hacked – 68 Million User Accounts Compromised

So was Dropbox Hacked? There was some rumours going around last week after it sent out a password reset e-mail warning to all users. It seems like it’s limited to users who were active in 2012 and the only ones who would be in trouble are as usual, those who haven’t changed their password since […]

Tags: , , , , , ,

Posted in: Exploits/Vulnerabilities, Privacy | Add a Comment
Emerging Threats ETOpen - Anti-malware IDS IPS Ruleset

Emerging Threats ETOpen – Anti-malware IDS/IPS Ruleset

The ETOpen Ruleset is an excellent anti-malware IDS/IPS ruleset that enables users with cost constraints to significantly enhance their existing network-based malware detection. The ETOpen Ruleset is not a full coverage ruleset, and may not be sufficient for many regulated environments and should not be used as a standalone ruleset. The ET Open ruleset is […]

Tags: , , , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
Bearded - Security Automation Platform

Bearded – Security Automation Platform

Bearded is an open source Security Automation platform. The platform allows Development, QA, and Security team members to perform automated web security scans with a set of tools, and re-execute those scans as needed. All tools can be executed in the cloud in docker containers. Bearded has a default web interface which integrates all core […]

Tags: , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment
In the world of web application security systems, there exists a myriad of systems to protect public-facing services in any number of ways.

An Introduction To Web Application Security Systems

In the world of web application security systems, there exists a myriad of systems to protect public-facing services in any number of ways. They come packed with all the elements necessary to play an action-packed round of buzzword bingo, but they often overlap in some ways that may make them sometimes seem similar. After the second […]

Tags: , , , , , , , ,

Posted in: Advertorial, Countermeasures, Security Software | Add a Comment
IGHASHGPU - GPU Based Hash Cracking - SHA1, MD5 & MD4

IGHASHGPU – GPU Based Hash Cracking – SHA1, MD5 & MD4

IGHASHGPU is an efficient and comprehensive command line GPU based hash cracking program that enables you to retrieve SHA1, MD5 and MD4 hashes by utilising ATI and nVidia GPUs. It even works with salted hashes making it useful for MS-SQL, Oracle 11g, NTLM passwords and others than use salts. IGHASHGPU is meant to function with […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Password Cracking | Add a Comment
PowerOPS - PowerShell Runspace Portable Post Exploitation Tool

PowerOPS – PowerShell Runspace Portable Post Exploitation Tool

PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell “easier”. PowerOPS is an application written in C# that does not rely on powershell.exe but runs PowerShell commands and functions within a powershell runspace environment (.NET). It intends to include multiple offensive PowerShell modules to make the process of Post Exploitation easier. […]

Tags: , , , , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools, Windows Hacking | Add a Comment
Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities

Shadow Brokers NSA Hack Leaks 0-day Vulnerabilities

Right now there’s a ton of people talking about the NSA Hack, the severity, the repercussions and the value of what has been leaked. It seems the 0-day exploits in the cache of stolen aren’t super recent ones, as it appears they are from 2013. But even so, some of them haven’t been patched as […]

Tags: , , , ,

Posted in: Exploits/Vulnerabilities, Hacking Tools | Add a Comment
UFONet - Open Redirect DDoS Tool

UFONet – Open Redirect DDoS Tool

UFONet is an open redirect DDoS tool designed to launch attacks against a target, using insecure redirects in third party web applications, like a botnet. Obviously, only for testing purposes. The tool abuses OSI Layer 7-HTTP to create/manage ‘zombies’ and to conduct different attacks using; GET/POST, multi-threading, proxies, origin spoofing methods, cache evasion techniques, etc. […]

Tags: , , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment