Tag Archive | "network-security"


21 June 2006 | 18,656 views

Google’s Orkut Hit by Data Stealing Worm – Mw.Orc

So just a few days about there was a new MSN Worm – BlackAngel.B, before that the Yahoo! e-mail worm, long before that of course the MySpace worm and a few others not notable enough to mention. And of course plenty of nasty Trojans. A new Internet worm capable of stealing bank details and other [...]

Continue Reading


21 June 2006 | 9,427 views

Yersinia 0.7 Released with 802.1x Support – Layer 2 Attack Framework

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. It’s a very useful for any network based penetration testing or vulnerability assessment. There isn’t many tools working on Layer 2 and this [...]

Continue Reading


20 June 2006 | 4,894 views

3Com’s TippingPoint Finds New IE Vulnerabilities

What? New vulnerabilities in Internet Explorer? You can hack Internet Exploder Explorer? Never! 3Com Corp’s TippingPoint division has discovered and disclosed two critical new vulnerabilities in Microsoft’s Internet Explorer through 3Com’s Zero Day Initiative (ZDI). The vulnerabilities could have allowed an attacker to gain control of a PC if the user was logged in with [...]

Continue Reading


17 June 2006 | 3,762 views

British Workers Love to Snoop Salary Info, Personal Notes & Colleagues Data

Well I would say this was true for office workers everywhere, not particularly just Brits. But well the British are an inquisitive nation, so this doesn’t surprise me at all. Nearly a quarter (22 per cent) of UK employees admit to having illegally accessed sensitive data such as salary details from their firms employer’s IT [...]

Continue Reading


15 June 2006 | 20,468 views

SQL Power Injector v1.1 Released

SQL Power Injector is a graphical application created in .Net 1.1 that helps the penetrating tester to inject SQL commands on a web page. For now it is SQL Server, Oracle and MySQL compliant, but it is possible to use it with any existing DBMS when using the inline injection (Normal Mode). Moreover this application [...]

Continue Reading


13 June 2006 | 12,454 views

Oedipus – Open Source Web Application Security Analysis

Oedipus is an open source web application security analysis and testing suite written in Ruby by Penetration Testers for Penetration Testers. It is capable of parsing different types of log files off-line and identifying security vulnerabilities. Using the analyzed information, Oedipus can dynamically test web sites for application and web server vulnerabilities. Oedipus can be [...]

Continue Reading


11 June 2006 | 3,352 views

Custom Trojans – Isn’t it Old News?

Well it is for me, and I guess anyone who consider themselves a career hacker, or at least has a serious interest.. As a few good trojans are open source (Back Orifice?), you can just mess around with them for a while until you reach the point they are no longer detected by any of [...]

Continue Reading


01 June 2006 | 5,304 views

SyScan’06 – The Asian Hackers’ Conference

The Symposium on Security for Asia Network aims to be a very different security conference from the rest of the security conferences that the information security community in Asia has come to be so familiar and frustrated with. SyScan’06 intends to be a non-product, non-vendor biased security conference. It is the aspiration of SyScan’06 to [...]

Continue Reading


26 May 2006 | 4,970 views

The Enemy Within The Firewall

I’ve seen similar figures from other organisations and countries, so the stats don’t surprise me. My peers and I have always called this Armadillo security, hard on the outside, soft on the inside. Firewall, IDS, etc…all protecting the exterior of the network, only edge devices, nothing inside, not much policies, not much privilege segregation, anyone [...]

Continue Reading


23 May 2006 | 3,421 views

Ohio University Compromised for Over a Year!

A year? A whole year? A few days I can take, but surely if an Admin doesn’t know what’s going with his machines for a year….compromised for a year, there is something wrong. An unprecedented string of electronic intrusions has prompted Ohio University to place at least one technician on paid administrative leave and begin [...]

Continue Reading


Popular Tags

computer-security · darknet · exploits · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · Information-Security · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·