Archive | May, 2006

Without OneCare in the World.


Today sees the launch of “OneCare”, Microsofts “secrity solution”. Combining firewall, anti-virus and anti-spyware in to one handy package…. but would you trust it?

I guess many people will, and over time we will find out if its a well spent $49.99 or not, but for me? I don’t think so. Microsoft do many things, but I think if you ask any one they will say the same thin: Microsoft don’t really do security.

Microsoft have had a firewall in XP for some time now, and the malicious software removal tool has been on windows update as well. I turn off the firewall, and the remover dosn’t really seem to do any thing. Now maybe I am being unfair, but do you dare, to use OneCare?

The last part of OneCare is the AV, now MS must know a thing or two about virus’, and who knows the OS better then them, but still, at the end of the day Microsoft has been the main victim of Virus attacks for years, why now are they trying to combat the problem?

It seems to me that basicly, no matter how good or bad OneCare actualy is, Microsoft have an uphill fight against there already poor security record. I don’t think I would trust them to keep my important data safe, or my network free from nasties. I just wont, and I suspect a lot of other people will feel the same.

In the corparte sector, where most software is paid for, other names are well estabilished and, well, who wants to say to there boss “I thought we where protected, I installed Microsoft…..” the laugthing would echo down the halls. So, for the home with many free, and perfectly good AV out there (http://www.avast.com/) why would home users pay?

All I can think of is that this is just a Microsoft way to expand a little, not to mention I bet it dosn’t install unless you have a “valid” windows key, the new way to force you to give more money to MS, like they need it?

Posted in: Countermeasures, Security Software

Topic: Countermeasures, Security Software


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Barclays Rolls Out Free Anti-Virus Protection for Customers


The shocking statistic first, “56% of consumers do not have active anti-virus on their PCs”, ok not that shocking but still a bit worrying. Allthough asking if your average user doesn’t protect themselves on the internet conjures up images of the pope squatting in the woods.

The basic F-Secure anti-virus product protects against viruses and spyware. When installed it scans a machine and alerts users if it finds malicious programs installed.

A spokesman for Barclays denied that the deal was a way to limit its liabilities if customers were defrauded.

“We have a guarantee that if anyone is defrauded through no fault of their own we guarantee their money is safe,” he said.

“We’re trying to stop fraud happening in the first place which is beneficial to them and us,” he added.

Barclays is the latest bank to try to stop customers falling victim to viruses or other computer-borne scams.

So Barclays bank have leapt into action and decided its time to act on it, 4 years after their online service was activated. Their giving all their online customers free AV protection, provided by F-Secure. Barclays have bought 1.6million licenses (I wonder what per unit price they got on that?) and the software will include 2 years free updates. What happens after that? Probably 56% of their customers will be unprotected again.

Source: BBC News

Posted in: Malware, Phishing

Topic: Malware, Phishing


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Fake Microsoft Patch – BeastPWS-C


If you receive a e-Mail alert of a new patch for your Windows XP OS, think again before opening the link present on the message.

The spammed emails, which purport to come from patch@microsoft.com, claim that a vulnerability has been found ‘in the Microsoft WinLogon Service’ and could ‘allow a hacker to gain access to an unpatched computer’.

The link on the e-Mail will redirect to a non-Microsoft site where you will download a trojan named BeastPWS-C, “which is capable of spying on the infected user and stealing passwords.”

When first installed the Trojan horse displays a bogus message, which reads: ‘Microsoft WinLogon Service successfully patched’. In actual fact, the malware is secretly logging keystrokes and sending them to an email address belonging to the hacker.

Well, I wouldn’t mind receiving this ‘Microsoft’ e-Mail and mail-bomb that looser’s e-Mail address (yeah, the good old mail-bomb attack still works).

For future reference, people need to remember that Microsoft doesn’t send hotfixes using attachments and not to deploy this patch on their WSUS servers.

Source: NHS

Posted in: Malware, Windows Hacking

Topic: Malware, Windows Hacking


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Viruses & Malware Monitored on a Dynamic World Map


F-Secure has an interesting new dynamic world map displaying the various threats and viral hotspots around the world. Viruses and antivirus software is always a big issue, especially for corporates.

Shows how things are heating up when it comes to viruses, malware, trojans and so on.

They make some nice antivirus software too.

F-Secure Worldmap

Check it out:

F-Secure Worldmap

Pretty neat eh.

It’s big business nowdays, especially combined with some intrusion detection or intrusion prevention systems.

Some of the worm type viruses have cost billions of dollars globally, and at the end it’s all down to a bit of social engineering, an e-mail from someone you know with “I Love You” is all it takes.

E-mail filtering is important, but it can’t stop human stupidity…

Posted in: Malware

Topic: Malware


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Cambodia Bans 3G So The People Can’t Get P*rn


It’s sad when a country has to resort to this to control it’s people, freedom to watch p*rn for Cambodians!

Heeding a request from his wife, Prime Minister Hun Sen on Friday banned the latest generation of mobile phone services in Cambodia to curb the dissemination of p*rnography.

Bun Rany, along with the wives of several other senior government officials, recently urged Hun Sen to prohibit the use of third-generation, or 3G, phones in the impoverished country because they can be used to spread obscene images.

Such phones – which few can afford in Cambodia – are capable of displaying high-quality video and images over wireless broadband connections.

I really don’t see what the big issue with p*rnography is, don’t Cambodians have sex? I mean there is a VERY high rate of mental health issues there, after the khmer rouge regime…but still? Isn’t this a little harsh?

On Friday, Hun Sen said he agrees with his wife and that while Cambodia is still unable to cope with p*rnography on the Internet, “how can we go for video phones?

“Hold it. Do not yet start the mobile phone services through which the callers can see each others’ images,” he said in a speech during a visit to a Buddhist pagoda in the capital, Phnom Penh.

“Maybe we can wait for another 10 years or so until we have done enough to strengthen the morality of our society,” he said.

Alcatel, a French telecommunications firm, announced in February that it would provide 3G mobile services to CamGSM, a Cambodian mobile phone network.

Strengthen the morality? Hello?

It seems like he somewhat looks down upon his populous.

The 3G mobile phone “is way too advanced for us. Hearing each other’s voices and exchanging text messages should be enough. If we go further than this, it could be more difficult for us to control” p*rnography, he said.

It was unclear if legislation is necessary for the ban to take effect. Hun Sen’s orders are often carried out without challenge by Cambodia’s government and lawmakers.

Cambodia is predominantly Buddhist and socially conservative. People normally do not talk openly about sex.

Source: Associated Press

Digg This Article

Posted in: Legal Issues, Wireless Hacking

Topic: Legal Issues, Wireless Hacking


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.


Amnesty International Irrepresible Internet Campaign


Irrepressible Adj. 1) Impossible to repress or control.

Chat rooms monitored. Blogs deleted. Websites blocked. Search engines restricted. People imprisoned for simply posting and sharing information.

The Internet is a new frontier in the struggle for human rights. Governments “with the help of some of the biggest IT companies in the world” are cracking down on freedom of expression.

Amnesty International, with the support of The Observer, is launching a campaign to show that online or offline the human voice and human rights are impossible to repress.

The web is a great tool for sharing ideas and freedom of expression. However, efforts to try and control the Internet are growing. Internet repression is reported in countries like China, Vietnam, Tunisia, Iran, Saudi Arabia and Syria. People are persecuted and imprisoned simply for criticising their government, calling for democracy and greater press freedom or exposing human rights abuses, online.

The Great Firewall of China of course being a major one..

Read More

You can undermine the censorship by adding censored content to your site

http://irrepressible.info/addcontent

You can also sign the pledge here

http://irrepressible.info/pledge

In November 2006, governments and companies from all over the world will attend a UN conference to discuss the future of the Internet. You can help us send a clear message to them that people everywhere believe the Internet should be a force for political freedom, not repression.

Fight the power!

Posted in: Legal Issues, Privacy

Topic: Legal Issues, Privacy


Latest Posts:


SecLists - Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells SecLists – Usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place.
DeepSound - Audio Steganography Tool DeepSound – Audio Steganography Tool
DeepSound is an audio steganography tool and audio converter that hides secret data into audio files, the application also enables you to extract from files.
2019 High Severity Vulnerabilities What are the MOST Critical Web Vulnerabilities in 2019?
So what is wild on the web this year? Need to know about the most critical web vulnerabilities in 2019 to protect your organization?
GoBuster - Directory/File & DNS Busting Tool in Go GoBuster – Directory/File & DNS Busting Tool in Go
GoBuster is a tool used to brute-force URIs (directories and files) in web sites and DNS subdomains (inc. wildcards) - a directory/file & DNS busting tool.
BDFProxy - Patch Binaries via MITM - BackdoorFactory + mitmProxy BDFProxy – Patch Binaries via MiTM – BackdoorFactory + mitmproxy
BDFProxy allows you to patch binaries via MiTM with The Backdoor Factory combined with mitmproxy enabling on the fly patching of binary downloads
Domained - Multi Tool Subdomain Enumeration Domained – Multi Tool Subdomain Enumeration
Domained is a multi tool subdomain enumeration tool that uses several subdomain enumeration tools and wordlists to create a unique list of subdomains.