Archive | March, 2006

Why Windows Vista ‘might’ Actually be Good

Keep on Guard!

The main thing is the massive kernel overhaul, it’s actually adding some decent functionality and refining the architecture to become more like Linux!

While the kernel in Vista is still primarily the same one as in Windows 2000 and XP, there have been some significant changes to tighten up security. Fewer parts of the OS as a whole run in Kernel mode – most drivers run in User mode, for instance. Things that run in Kernel mode are prevented from installing without verified security certificates, and even then they require administrator-level user permission. In Vista, it should be much more difficult for unauthorized programs (like Viruses and Trojans) to affect the core of the OS and secretly harm your system

Yay, finally, an actual secure version of Windows? It’s about time right. But well what stops malware bundling itself with a pirated valid cerficate, there must be some offline procedure for people without full-time net connections.

We’ll have to see what this protection really offers, and how we can get around it :)

Also some heap performance improvements with controls to deal with heap fragmentation for large memory calls.

Some pretty advanced application ‘buffering’ too, not sure if I like this one (hopefully it can be turned off).

A key improvement to the root file system and memory management of Vista is a technology called SuperFetch. SuperFetch learns which applications and bits and pieces of the OS you use most and preloads them into memory, so you don’t have to wait for a bunch of hard drive paging before your apps or documents load. Microsoft has developed a pretty sophisticated prioritization scheme that can even differentiate which applications you are most likely to use at different times (on the weekend vs. during the week, or late at night vs. in the middle of the afternoon).

And well..networking? Does this finally mean THEY WROTE THEIR OWN TCP/IP STACK!?

Networking support has been extended throughout the lifetime of Windows 2000 and Windows XP, but it was getting harder and harder for Microsoft to keep improving the old code. So for Vista, they started over from ground zero and rewrote the networking stack from scratch. IPV6 was hacked onto Windows XP in a pretty basic way, but it is built directly into the Vista networking stack in a much more robust fashion.

Seems to have some fairly cool built in apps too and the new UI is very snazzy, perhaps a little too much eye-candy though, I don’t want to have to buy a Cray just to power the OS..

The browser will be running at a much reduced user level too (finally!) and it seems they are implementing proper user segregation by default (first time evar!).

I mean I never understood why they had ACL’s since WindowsNT but never setup or enforced segregation by why can guest write to /windows/system and so on..

I’ll be looking out for it anyway, will you?

Source: Extremetech

Posted in: General News, Windows Hacking

Tags: , , , ,

Posted in: General News, Windows Hacking | Add a Comment
Recent in General News:
- Security Vendor Trustwave Bought By Singtel For $810M
- Teen Accused Of Hacking School To Change Grades
- Google’s Chrome Apps – Are They Worth The Risk?

Related Posts:

Most Read in General News:
- Hacking Still Can’t Outdo Stupidity for Data Leaks - 125,534 views
- eEye Launches 0-Day Exploit Tracker - 86,214 views
- Seattle Computer Security Expert Turns Tables On The Police - 45,324 views

pwdump6 version 1.2 BETA Released

Outsmart Malicious Hackers

Version 1.2 (Beta) of the pwdump6 software has been released.

There are three major changes from the previous version:

  • Uses “random” named pipes (GUIDs) to allow concurrent copies of the client to run. This is predominately for the next version of fgdump, which will be multithreaded.
  • Will turn off password histories if the requisite APIs are not available (there are instances in which this is the case) – pwdump will no longer simply refuse to grab the hashes that it can.
  • Data is now encrypted over the named pipe using the Blowfish algorithm. More information on this is available on the website.

pwdump is a very useful tool for grabbing the password hashes directly from Windows (you do need Administrator access, so in some situations you need to escalate your priveleges first).

It is still useful though, as normally with Admin access on a Windows box you can’t get the SAM file as it’s locked by the OS, the only way normally is to boot using a Security LiveCD and save it to a USB drive or e-mail it to yourself.

You can grab the latest version of pwdump here.

Once you have the password hashes from the SAM file you can then crack them with your favourite password cracker (LCP, Cain & Abel etc), or even RainbowCrack and Rainbow Tables.

There is another version of pwdump called fgdump on the page which I might check out in the future.

Digg This Article

Posted in: Hacking Tools, Password Cracking, Windows Hacking

Tags: , , , , ,

Posted in: Hacking Tools, Password Cracking, Windows Hacking | Add a Comment
Recent in Hacking Tools:
- Pybelt – The Hackers Tool Belt
- Github Dorks – Github Security Scanning Tool
- scanless – A Public Port Scan Scraper

Related Posts:

Most Read in Hacking Tools:
- Top 15 Security/Hacking Tools & Utilities - 2,020,961 views
- Brutus Password Cracker – Download AET2 - 1,593,506 views
- wwwhack 1.9 – Download Web Hacking Tool - 704,676 views

FrSIRT Starts Charging for OTHER Peoples Work (Exploits)

Keep on Guard!

Is it ethical or even legal to charge for other peoples work?

As far as I know France seems have some pretty strong (and weird) copyright laws.

And yes, they are blaming French Laws prohibiting full disclosure.

In conformity with applicable French laws prohibiting Full-disclosure, the FrSIRT will no longer distribute exploits and PoCs on its public web site. Public exploits section has thus been definitively closed.

Nothing to do with making money I’m sure.

Classic bait and switch eh, collect all the info from the public domain, get everyone pointing to your service, then start charging for it.

FrSIRT is an independent organisation providing real-time threat monitoring and alerting services. FrSIRT works 24x7x365 to monitor, review, and analyze new vulnerabilities, threats and exploits to offer a unique vulnerability notification service allowing system, network, and security professionals to keep track of the latest security threats.

Available since 2003, FrSIRT Vulnerability Notification Service (FrSIRT VNSâ„¢) is a web-based security alerting service, providing real-time information to customers about information security threats and IT product vulnerabilities that affect the entire corporate information technology domain. FrSIRT VNSâ„¢ alerts are delivered through a continually updated Web portal, XML feeds and email subscriptions.

Ah how we LOVE branding. You can see the scam prices here.

I’ll be removing links on all my sites to FrSIRT and will start recommending Security Forest instead.

I mean I had a feeling it might happen when they rebranded from K-Otik (The hackers friend with a h4x0r name) to FrSIRT, a more professional bunch with a corporate looking site.

But essentially they are still just collecting exploits from mailing lists and hosting them on a website, big deal eh?

Oh well let them, if people pay to get what they can get elsewhere, or from Google cache, more fool them.

Any other good resources to recommend?

Digg This Article

Posted in: Exploits/Vulnerabilities, General News, Legal Issues

Tags: , , , , ,

Posted in: Exploits/Vulnerabilities, General News, Legal Issues | Add a Comment
Recent in Exploits/Vulnerabilities:
- WannaCry Ransomware Foiled By Domain Killswitch
- Intel Finally Patches Critical AMT Bug (Kinda)
- Shadow Brokers Release Dangerous NSA Hacking Tools

Related Posts:

Most Read in Exploits/Vulnerabilities:
- Learn to use Metasploit – Tutorials, Docs & Videos - 238,058 views
- AJAX: Is your application secure enough? - 120,644 views
- eEye Launches 0-Day Exploit Tracker - 86,214 views

Whos is tonyenkiducx? Who the hell are you?

Outsmart Malicious Hackers

Im a tinkerer. I can’t say I’m expert in anything more than ASP and MSSQL, but I make a point of playing and learning anything new and wanky. I’ve tweaked dBase, fiddled with Python, installed Apache, destroyed MS2003 server, plugged in SUN boxes, screamed at VisualStudio, urinated on Fedora, set fire too Game Maker, avoided Ajax, winked at Web2.0, beat the crap out of Oracle, been mentally scarred by DreamWeaver and made mad passionate love to

Bottom line, if it exists, I’ve probably played with it. My main expertise lies in Microsoft web and database technologies, namely ASP, anything .net, mssql(From 6.5 up to 2005) and associated web technologies. I spend 80% of my time on an intranet, the other 20% on our outward facing sites, and the other 20% my boss imagines I have, working on private projects. In my spare time I play some mmorpgs, spend time with my wife, work on some websites(Except my own), and I’m currently building a huge crossbows and catapults set for fun and the possible destruction of my flat.

Posted in: Authors

Tags: , , , , , , , , , , , , , ,

Posted in: Authors | Add a Comment
Recent in Authors:
- Whos is tonyenkiducx? Who the hell are you?
- Who is Haydies? Me my self and quite possibly some one else.
- Who is Darknet?

Related Posts:

Most Read in Authors:
- Who is Haydies? Me my self and quite possibly some one else. - 179,721 views
- Who is Darknet? - 15,819 views
- Who is Navaho Gunleg? - 7,225 views

An Introduction to AJAX

Outsmart Malicious Hackers

No it’s not AJAX Amsterdam… it’s something more interesting (or boring to some of you)… so let’s get it started….

I. Introduction
AJAX stands for Asynchronous JavaScript And XML… It is a new technology which comes to help any web developer who really is interesed in dynamic webpages…
Click here for a overview of the AJAX Technology…

II. The Code
Well, well, well… Actualy AJAX is based on Micro$ofts ActiveX Object XmlHttpRequest (I can’t belive they can do good stuff to), so in IE (sucks) it has to be initialized like an ActiveX Object; but in other browsers it’s already a standard object (I don’t know if Opera had implemented it already)… Now let’s see the code:

function init_object() {
var A;

var msxmlhttp = new Array(‘Msxml2.XMLHTTP.5.0’,

for (var i = 0; i > msxmlhttp.length; i++) {
try {
A = new ActiveXObject(msxmlhttp[i]);
} catch (e) {
A = null;

if(!A && typeof XMLHttpRequest != “undefined”) {
A = new XMLHttpRequest();
if (!A) alert(“Could not initialize the object.\nMaybe your browser doesn’t support ajax…”);
return A;

var ajax_obj = init_object();

function ajax_in_action(target, source) {“GET”, source, true);

ajax_obj.onReadyStateChange = function() {
if (ajax_obj.readyState == 4) {
if (ajax_obj.status == 200) {
document.getElementById(target).innerHTML = ajax_obj.responseText;
else {
alert(“Error ” +ajax_obj.status+” : ” +ajax_obj.statusText);

Code inspired from SAJAX… about it i’ll speak a bit later…

III. Why use it?
Well there are several reason why you should use AJAX… for example to make a dynamic banner changer, real-time morphing website… or just use it like WordPress (on which darknet is based)… you don’t know how it uses AJAX… try clicking on an articles show comments.

IV. Extending AJAX
If you want to implement AJAX directly in PHP, ASP, Perl, Ruby etc. check out, site that contains the Simple AJAX Toolkit….

V. E4X
One more thing… the response from the server can be received as an XML file 2… or maybe directly receive an XML file, if requested so… After which it can be parsed with the E4X technology…

VI. F1
Need more help… access one of the following links:

X. Epilogue
I know that AJAX has been rediscovered for about a year (read it for the first time in july 2005), but for many it can be somethimes hard to find the information needed… anyway keep scripting…

Posted in: Web Hacking

Tags: , , , , , ,

Posted in: Web Hacking | Add a Comment
Recent in Web Hacking:
- Microsoft Azure Web Application Firewall (WAF) Launched
- Kadimus – LFI Scanner & Exploitation Tool
- LastPass Leaking Passwords Via Chrome Extension

Related Posts:

Most Read in Web Hacking:
- wwwhack 1.9 – Download Web Hacking Tool - 704,676 views
- Web Based E-mail (Hotmail Yahoo Gmail) Hack/Hacking with JavaScript - 313,086 views
- Download videos? - 156,775 views

Security Cloak – Mask Against TCP/IP Fingerprinting for Windows

Outsmart Malicious Hackers

I’ve seen quite a lot of discussion lately on how to ‘defend against nmap’ or how to change the properties of your TCP/IP Stack so your Windows OS appears to be something else (As in you can guess the OS from the TTL value passed back in a TCP/IP packet).

One way you can do this is with Security Cloak.

Security Cloak is designed to protect against TCP/IP stack fingerprinting and computer identification/information leakage via timestamp and window options by modifying relevant registry keys. The settings used are based on the results of SYN packet analyization by p0f. While the OS reported by other OS detection scanners were not identical to those of p0f, testing against Nmap, xprobe2, queso and cheops showed that they were unable to identify the correct operating system/version after Security Cloak settings had been applied.

Note that in order to properly emulate some Operating Systems, the MTU must be changed. While most of these require the MTU to be 1500 (the default for most network connections),depending on your network connection, this could degrade/interfere with your connectivity, so be sure to check your current MTU before applying these changes. It is reccomended that you save all the original key values before using this program in the event that your computer responds negatively to the changes.

You can find the authors page here:

And a direct download here: Security Cloak

Posted in: Countermeasures, Network Hacking, Windows Hacking

Tags: , , , , , , , ,

Posted in: Countermeasures, Network Hacking, Windows Hacking | Add a Comment
Recent in Countermeasures:
- PwnBin – Python Pastebin Search Tool
- Microsoft Azure Web Application Firewall (WAF) Launched
- mongoaudit – MongoDB Auditing & Pen-testing Tool

Related Posts:

Most Read in Countermeasures:
- AJAX: Is your application secure enough? - 120,644 views
- Password Hasher Firefox Extension - 118,164 views
- NDR or Backscatter Spam – How Non Delivery Reports Become a Nuisance - 57,807 views


Outsmart Malicious Hackers

Each day I check out the technology section of the bbc site, ok, its not the most in-depth, or techy site in the world, but it covers interesting stuff.

One interesting article talks about getting a mac to run windows. That in it self is quite cool, but to my mind its the wrong way.

Who wants to put windows on a mac? what’s the point? You can buy PC hardware for less then the mac, and they run windows with out a problem. Well…. kinda.

So, what would be better? Getting OSX to run on a PC. Do that and what you have is some completion to windows with an existing user base, financial backing and at least most of the applications business want.

Business still counts for more of the computer market. Linux has never really broken in to the desk top market, main I think because people “into” linux don’t do gui. Fundamentally linux geeks tend to not believe its worth the effort, so the gui always seems to be less the perfect.

OSX, now that is a desk top platform, to my understanding its based on linux, and a lot of linux apps can be built to run on it. But, like I said, its a mac so it already has a lot of the applications people want and need.

I could be wrong but to me I think this is only the start. I don’t like mac’s. I don’t want a mac, but I see OSX and it look sexy. Maybe if I didn’t need a mac to try it out I’d give it a go, but buying hardware just to run an OS I might not like? I think not.

Posted in: Apple, Windows Hacking

Tags: , , , ,

Posted in: Apple, Windows Hacking | Add a Comment
Recent in Apple:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- FBI Backed Off Apple In iPhone Cracking Case
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

Related Posts:

Most Read in Apple:
- KisMAC – Free WiFi Stumbler/Scanner for Mac OS X - 83,245 views
- Apple Struggling With Security & Malware - 24,156 views
- Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) - 16,162 views

Measuring up the Security Risks for Mac – Are Apple Prepared?

Outsmart Malicious Hackers

The fact is Windows is getting ripped apart with viruses, spamware, spyware, zombie clients, trojans worms and whatever else you can think of.

Mac and Linux aren’t (at the moment), there are already Bluetooth viruses, so why not Linux and Mac..

Some may say it’s because they are inherently more secure, the architecture and user privelege seperationg means it’s hard for any kind of malware to infect the system…plus they don’t come with crap like Internet Exploder that’s tied into the operating system.

There have been a couple of worms for Linux, mostly praying on Apache, and then the OpenSSL bug that allowed you to get access (combined with the kernel flaw in 2.4 you could easily get root access).

eWeek asks, What will Apple do when the malware comes? Which inevitably it will..

The release in the last few days of malware for the Mac and Linux underscore some old issues about how it is possible to have malware on those platforms. I have some new thoughts though. I’ve begun to wonder what Apple would do if a real problem developed.

To be very clear, a real problem has not yet developed, and Inqtana.A and Leap.A are not a real problem, except to the extent that they may be bellwethers. They are more interesting for what they suggest than what they actually do.

As with Windows, a lot of it is a consumer issue, and down to education.

With Mac, the user does run as a non-priveleged user by default, but when installing any software they can just pop in the Admin password and it’ll install.

It’s all about social engineering, making the user believe they want it, it’s something ‘cool’ or useful.

When good social engineering attacks are developed for the Mac, the same thing will happen. It’s not hard to imagine Web sites and e-mails offering programs for the Mac that do more than they claim to do.

Just in terms of adware, there may be some benefit to being able to deliver known Mac users to advertisers, but for the most part the “value” of infecting the user is the same: to spread itself, and perhaps to create a Mac botnet.

Few have tried to write Malware for OSX yet, but I guess it will happen, the question is are Apple prepared?

Posted in: Apple, Linux Hacking

Tags: , , , , , ,

Posted in: Apple, Linux Hacking | Add a Comment
Recent in Apple:
- Apple Will Not Patch Windows QuickTime Vulnerabilities
- FBI Backed Off Apple In iPhone Cracking Case
- Mac OS X Ransomware KeRanger Is Linux Encoder Trojan

Related Posts:

Most Read in Apple:
- KisMAC – Free WiFi Stumbler/Scanner for Mac OS X - 83,245 views
- Apple Struggling With Security & Malware - 24,156 views
- Java Based Cross Platform Malware Trojan (Mac/Linux/Windows) - 16,162 views

Elevator/Lift Hacking !!!!!

Outsmart Malicious Hackers

This is old news to those who already knows about it (Found out about it last year and tested it till now). But i just had to try it before actually posting it up.

Do you get tired of being in an elevator and someone else gets on every other floor in between the floors that you’re going to? Well you’re in luck, today i’m going to tell you how to skip all other floors and go straight to the floor you want to get off.

Elevator Hacking

I’ve been trying this hack for sometime now (since last year) and i can say that it works 100% so far. I used it in my home country as well as when i’m away on holiday to see and try if it works. I just came back from singapore last week and i tried this hack on the elevators there and it worked. It was a 30th floor building and i didn’t stop anywhere in between from ground floor to the 15th floor and i did this for the whole duration i was there. A good way to test this is to make sure you’re in the elevator alone and use the hack to go to a certain floor and see if it skips when someone somewhere tries to stop the elevator on your way to your floor.

Before i reveal this hack to all you peeps, i just want to say that, we at will not be held responsible for the chaos that will arise from this post that will result in people waiting for elevators everywhere. p(x_x)q

“The designers of some elevators include a hidden feature that is very handy if you’re in a hurry or it’s a busy time in the building. While some elevators require a key, others can be put into “Express” mode by pressing the “door close” and “floor” buttons at the same time. This sweeps the car to the floor of your choice and avoids stops at any other floor. This seems to work on MOST elevators that i have tried. Most elevators have the option for this to work but on some of them the option is turned off by whoever runs them. This is a rather fun hack, so the next time you are on an elevator, give it a try, you have nothing to lose.”

It works easiest on:

  • Otis elevators
  • Dover elevators
  • Most Desert Elevators

Have a go at it and have fun !!! Let me know if you tried it on other brands of elevator that is not mentioned here. I’ll update the list.

Posted in: General Hacking, Hardware Hacking

Tags: , , , , , , , ,

Posted in: General Hacking, Hardware Hacking | Add a Comment
Recent in General Hacking:
- Why Are Hackers Winning The Security Game?
- The Dyn DNS DDoS That Killed Half The Internet
- Fully Integrated Defense Operation (FIDO) – Automated Incident Response

Related Posts:

Most Read in General Hacking:
- 10 Best Security Live CD Distros (Pen-Test, Forensics & Recovery) - 1,177,868 views
- Hack Tools/Exploits - 642,882 views
- Password Cracking with Rainbowcrack and Rainbow Tables - 443,677 views

Who is Haydies? Me my self and quite possibly some one else.

Keep on Guard!

Shaolin introduced him self, and said he had asked every one to do like wise. News to me mate :-P or did that slip my mind? Can’t see how it could but one never knows…

So, any way, who the hell am I? I have known Shaolin for years, he might have some idea how many, I am on that old darknet site he mentioned, but do me and favour, and don’t look there, please? I look terrible and I’m ashamed :-P

Like Shaolin I to started with the whole computer thing when I was little. The order is a little haszy, but I am fairly sure I had the TI 994A before the little old specy. Though my use of them was a little differant. True, I did for a while spend many hours typeing code to find out later it didn’t work…. but before long I was coding my own stuff. In basic on the TI, and z80 assembler on the specy, pascal and modual 2 to on the Amstrad CPC, 6800 assembler and C on the ST….

TI, Spectrum, Comador, Atari ST, 386 and beyond, I have always live with a computer, though shockingly never games. My first consol was a ps2 and that is only 4 years old.

After many years of bedroom activites I definatly should be ashamed of (all with a keyboard – and check this? no net connection) I emerged in the bright old world, a whole host of dead technology and languages no one has used since the romans under my belt, and windows gaining popularity.

Fast forward, past VB, pal, and various noddy little things and I’m in to Delphi, oh my, was I in to Delphi. For 7 years I lived, breathed and probably bathed in the windows API and OOP. Gone was Delphi’s native event handlers, to slow, give me the raw message cue…. mutli threaded servers, no problem, n-tier CORBA clients… you name it, I did it.

Then I got bored.

But thats ok, no one wants desk top or server applications any more. So, a bit late to the party I had a go at ASP, and damn that stuffs ugly. PHP how ever, now thats the nuts, and thus I entered web development.

Some one once said I’d never be a web developer, but my first ever professional site went live to 2.5 million unique IPs in the first 48 hours, truely one of my proudest hours.

I’ve been doing PHP ever since, MySQL for most part but if its SQL, its all the same. Date in and data out, its all fairly much simple. Introduce some AJAX just to spice it up a bit, and we’re all having fun.

Where I am going from here, nobody knows, but I code, there for I am so what ever happens, what ever changes… I am a programmer :-)

Posted in: Authors

Tags: , , , , , , , ,

Posted in: Authors | Add a Comment
Recent in Authors:
- Whos is tonyenkiducx? Who the hell are you?
- Who is Haydies? Me my self and quite possibly some one else.
- Who is Darknet?

Related Posts:

Most Read in Authors:
- Who is Haydies? Me my self and quite possibly some one else. - 179,721 views
- Who is Darknet? - 15,819 views
- Who is Navaho Gunleg? - 7,225 views