Tag Archive | "network-security"


25 June 2006 | 17,947 views

UFO ‘Hacker’ Gary McKinnon Reveals What He Found

An interesting interview had been posted on Wired with Gary McKinnon about what he actually found whilst penetrating the US government networks. After allegedly hacking into NASA websites — where he says he found images of what looked like extraterrestrial spaceships — the 40-year-old Briton faces extradition to the United States from his North London […]

Continue Reading

23 June 2006 | 13,260 views

Researchers hack Wi-Fi driver to breach laptop

Ah another way to exploit wifi, what a surprise! Security researchers have found a way to seize control of a laptop computer by manipulating buggy code in the system’s wireless device driver. The hack will be demonstrated at the upcoming Black Hat USA 2006 conference during a presentation by David Maynor, a research engineer with […]

Continue Reading

22 June 2006 | 8,531 views

Botnets and Phishing Numbers Increasing Despite Crackdown

Botnets and organises cybercrime is getting more prevalent, it seems it’s increasing exponentially despire crackdowns by the US governments and other organisations. The criminals are getting more advanced, phishing scams are getting more realistic, technically trojans are getting more effective and the groups are getting really organised. Cybercrooks are organizing better and moving to more […]

Continue Reading

21 June 2006 | 18,662 views

Google’s Orkut Hit by Data Stealing Worm – Mw.Orc

So just a few days about there was a new MSN Worm – BlackAngel.B, before that the Yahoo! e-mail worm, long before that of course the MySpace worm and a few others not notable enough to mention. And of course plenty of nasty Trojans. A new Internet worm capable of stealing bank details and other […]

Continue Reading

21 June 2006 | 9,504 views

Yersinia 0.7 Released with 802.1x Support – Layer 2 Attack Framework

Yersinia is a network tool designed to take advantage of some weakeness in different network protocols. It pretends to be a solid framework for analyzing and testing the deployed networks and systems. It’s a very useful for any network based penetration testing or vulnerability assessment. There isn’t many tools working on Layer 2 and this […]

Continue Reading

20 June 2006 | 4,901 views

3Com’s TippingPoint Finds New IE Vulnerabilities

What? New vulnerabilities in Internet Explorer? You can hack Internet Exploder Explorer? Never! 3Com Corp’s TippingPoint division has discovered and disclosed two critical new vulnerabilities in Microsoft’s Internet Explorer through 3Com’s Zero Day Initiative (ZDI). The vulnerabilities could have allowed an attacker to gain control of a PC if the user was logged in with […]

Continue Reading

17 June 2006 | 3,767 views

British Workers Love to Snoop Salary Info, Personal Notes & Colleagues Data

Well I would say this was true for office workers everywhere, not particularly just Brits. But well the British are an inquisitive nation, so this doesn’t surprise me at all. Nearly a quarter (22 per cent) of UK employees admit to having illegally accessed sensitive data such as salary details from their firms employer’s IT […]

Continue Reading

15 June 2006 | 20,491 views

SQL Power Injector v1.1 Released

SQL Power Injector is a graphical application created in .Net 1.1 that helps the penetrating tester to inject SQL commands on a web page. For now it is SQL Server, Oracle and MySQL compliant, but it is possible to use it with any existing DBMS when using the inline injection (Normal Mode). Moreover this application […]

Continue Reading

13 June 2006 | 12,788 views

Oedipus – Open Source Web Application Security Analysis

Oedipus is an open source web application security analysis and testing suite written in Ruby by Penetration Testers for Penetration Testers. It is capable of parsing different types of log files off-line and identifying security vulnerabilities. Using the analyzed information, Oedipus can dynamically test web sites for application and web server vulnerabilities. Oedipus can be […]

Continue Reading

11 June 2006 | 3,360 views

Custom Trojans – Isn’t it Old News?

Well it is for me, and I guess anyone who consider themselves a career hacker, or at least has a serious interest.. As a few good trojans are open source (Back Orifice?), you can just mess around with them for a while until you reach the point they are no longer detected by any of […]

Continue Reading

Popular Tags

computer-security · darknet · exploits · fuzzing · google · hacking · hacking-networks · hacking-websites · hacking-windows · hacking tool · Hacking Tools · information gathering · malware · microsoft · network-security · Network Hacking · Password Cracking · penetration-testing · Phishing · Privacy · Python · scammers · Security · Security Software · spam · spammers · sql-injection · trojan · trojans · virus · viruses · vulnerabilities · web-application-security · web-security · Web Hacking · windows · windows-security · Windows Hacking · worms · XSS ·