Tag Archive | "computer-security"


27 August 2006 | 15,640 views

Sophos Offers Free Rootkit Detection Tool/Software

Ah, here at Darknet we have always been a fan of Sophos and the way they operate, a very efficient company and good to see good technical products still coming out of the UK! Another good move by them, they have decided to offer a free rootkit detection tool called Sophos Anti-Rootkit..Yah I know, not [...]

Continue Reading


07 August 2006 | 11,547 views

Wapiti – Web Application Scanner / Black-box testing

Wapiti allows you to audit the security of your web applications. It performs “black-box” scans, i.e. it does not study the source code of the application but will scans the webpages of the deployed webapp, looking for scripts and forms where it can inject data. Once it gets this list, Wapiti acts like a fuzzer, [...]

Continue Reading


02 August 2006 | 14,331 views

Firefox Extension Spyware – FormSpy

The antivirus specialists at McAfee have warned of a Trojan that disguises itself as a Firefox extension. The trojan installs itself as a Firefox extension, presenting itself as a legitimate existing extension called numberedlinks. It then begins intercepting passwords and credit card numbers entered into the browser, which it then sends to an external server. [...]

Continue Reading


24 July 2006 | 7,487 views

IBM Accused of Hacking

This is actually a very important case depending on which way it goes. It could become a landmark case in regards to liability for machines on your network, or actually any traffic originating from your IP range. A boutique Washington, D.C.-based law firm is accusing IBM of hacking into its e-mail system and is seeking [...]

Continue Reading


12 July 2006 | 3,917 views

Consultant Breached FBI’s Computers

Using standard script kiddy tools a consultant managed to compromise some of the FBI’s computers containing confidential information. Quite a hack eh? A government consultant, using computer programs easily found on the Internet, managed to crack the FBI’s classified computer system and gain the passwords of 38,000 employees, including that of FBI Director Robert S. [...]

Continue Reading


11 July 2006 | 15,820 views

HoneyBot – A Windows Based Honeypot

HoneyBOT HoneyBOT is a Windows based medium interaction honeypot solution. What is a Honeypot? A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the [...]

Continue Reading


10 July 2006 | 4,682 views

A Day in the Life of a Spyware Company – DirectRevenue

Spyware companies are apparently netting HUGE profits, it doesn’t surprise me though with the amount of people that actually install the crap on their machines.. Let’s say we don’t like companies like Direct Revenue very much though. Consumers have strong opinions about Direct Revenue’s software. “If I ever meet anyone from your company, I will [...]

Continue Reading


08 July 2006 | 13,936 views

WebScarab – Web Application Analysis – New Version

WebScarab is a framework for analysing applications that communicate using the HTTP and HTTPS protocols. It is written in Java, and is thus portable to many platforms. WebScarab has several modes of operation, implemented by a number of plugins. In its most common usage, WebScarab operates as an intercepting proxy, allowing the operator to review [...]

Continue Reading


05 July 2006 | 3,432 views

Veterans Administration Chief Says Laptop Recovered

Ah, so finally they got it back, from a street corner of all places. Let’s hope they shall be a little more careful in the future yah? The missing laptop and hard drive that contained veterans’ personal information has been found, Veterans Administration Chief Jim Nicholson announced Thursday. The announcement came at the beginning of [...]

Continue Reading


04 July 2006 | 38,910 views

Absinthe Blind SQL Injection Tool/Software

Absinthe is a gui-based tool that automates the process of downloading the schema & contents of a database that is vulnerable to Blind SQL Injection. Absinthe does not aid in the discovery of SQL Injection holes. This tool will only speed up the process of data recovery. Features: Automated SQL Injection Supports MS SQL Server, [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·