Tag Archives | Network Hacking




Impressive Open Source Intrusion Prevention – HLBR

It’s good to see work on open source tools in the countermeasure department aswell as the attack and penetration arena. It’s a shame since Snort and Nessus have gone semi-commercial. I hope more people invest their time in good IDS, Firewall and IPS systems, I love things like IPCop and hope to see more products […]

Tags: , , , , , , , , , , , , , , , ,

Posted in: Countermeasures, Malware, Network Hacking | Add a Comment

Remote Network Penetration via NetBios Hack/Hacking

These are basic techniques but very useful when penetration testing any Windows based network, the techniques were discovered on WinNT but are still very valid on Windows2000 and in some cases Windows2003 due to backwards compatibility. This article is being written in a procedural manner. I have approached it much like an intruder would actually […]

Tags: , , , , , , , , ,

Posted in: Network Hacking, Old Skool Philes, Windows Hacking | Add a Comment

BASE 1.2.6 Released (Basic Analysis & Security Engine)

We are happy to announce that the 1.2.6 (christine) release of the Basic Analysis and Security Engine (BASE) is available. BASE is the Basic Analysis and Security Engine. It is based on the code from the Analysis Console for Intrusion Databases (ACID) project. This application provides a web front-end to query and analyze the alerts […]

Tags: , , , , , , ,

Posted in: Countermeasures, Hacking Tools, Network Hacking | Add a Comment

Hping 2 Fixed for Windows XP SP2 (Service Pack 2)

We are happy to announce that Hping 2 works with Windows XP again! Hping support on Windows was never that great. Darknet is indeed a great fan of Hping! Glad to see it has overcome the Raw sockets problems Windows XP SP2 brought about. hping is a command-line oriented TCP/IP packet assembler/analyzer. The interface is […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

Freeware MAC Address Changer – Technitium v3.1

I saw a Freeware MAC Address Changing tool today which I thought I’d share with you all, as I used to use SMAC, a nice tool, until the guy started charging for it! Hopefully this one won’t go the same way. Technitium MAC Address Changer, which allows you to change Machine Access Control (MAC) Address […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

‘Free’ USB Drives Defeat Company Security

This is an excellent case of Social Engineering, you could also consider it playing on human greed/ignorance/stupidity. Whatever you want to label it really ;) USB drives are a real security risk.. We recently got hired by a credit union to assess the security of its network. The client asked that we really push hard […]

Tags: , , , , , ,

Posted in: Malware, Social Engineering | Add a Comment

Yersinia 0.7 Released with 802.1x Support – Layer 2 Attack Framework

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. It’s a very useful for any network based penetration testing or vulnerability assessment. There isn’t many tools working on Layer 2 and this […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

The Ultimate Net Monitoring Tool – Semantic Traffic Analyzer

Packet sniffing goes hi-tech? What’s wrong with ethereal? The equipment that technician Mark Klein learned was installed in the National Security Agency’s “secret room” inside AT&T’s San Francisco switching office isn’t some sinister Big Brother box designed solely to help governments eavesdrop on citizens’ internet communications. Rather, it’s a powerful commercial network-analysis product with all […]

Tags: , , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment

The MIT IP Packet Spoofing Project – Can We Spoof IP Packets?

Now this is a VERY interesting project, as I’ve always said the majority of DoS attacks and DDoS attacks (90%+) could be stopped if all the ISP’s null routed packets which DO NOT originate from IP blocks they own, e.g. spoofed packets. Basically the project has been established to see if you can spoof IP […]

Tags: , , , , , , ,

Posted in: Network Hacking | Add a Comment

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·