Archive | February, 2007

Cafepress.com Under Heavy DDoS Attack


Towards the end of last year Cafepress.com came under heavy DDoS attack (Distributed Denial of Service) which took it down for some time.

The problem with DDoS attacks is there’s not much you can do to prevent it, if that guy has enough zombies resulting in enough bandwidth, you are going down.

DDoS attacks have gotten pretty ingenious in the last couple of years due to the online extortion games going on.

In a statement to store owners, Jill Ambrose of CafePress.com said the targeted attack had resulted in “significant service interruptions”.

“As of right now some customers have access that appears normal, some have intermittent access, and some have no access at all. We will continue to update the CafePress Community Forum (http://forums.cafepress.com/eve) as we have more to share, and we urge you to check there for the most recent information,” she said. “We do consider this an attack on CafePress, but we’re most disturbed at how this victimises our community of Shopkeepers.”

I wonder who they pissed off this time?

The motive and source of the attack remain unclear. CafePress.com said it was “working with the proper authorities” in trying to resolve and investigate the source of the attack. CafePress.com handles the website hosting, order fulfillment and payment processing on behalf of various store owners.

Distributed denial of service attacks are used by hackers to disrupt the operation of websites by flooding sites with spurious traffic from zombie computers in an attempt to make them inaccessible to the general public. Experts at net security firm Sophos speculate that the hackers may have deliberately targeted CafePress.com in the run-up to the holidays, a prime shopping period.

Well it seems like site is still slow now, I’m not sure if they are still being attacked or not.

As a side note, to see if anyone actually reads what I write…would anyone be interested in buying some l33t t-shirts if I set up a Darknet Cafepress store?

Source: The Register

Posted in: Networking Hacking Tools

Topic: Networking Hacking Tools


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.


Odysseus Win32 Proxy & Telemachus HTTP Transaction Analysis


Introducing a pair of tools that go well together and give you some good control for HTTP transaction analysis and looking at the security of web applications.

Odysseus is a tool designed for testing the security of web applications.

Odysseus is a proxy server, which acts as a man-in-the-middle during an HTTP session. A typical HTTP proxy will relay packets to and from a client browser and a web server. Odysseus will intercept an HTTP session’s data in either direction and give the user the ability to alter the data before transmission.

For example, during a normal HTTP SSL connection a typical proxy will relay the session between the server and the client and allow the two end nodes to negotiate SSL. In contrast, when in intercept mode, Odysseus will pretend to be the server and negotiate two SSL sessions, one with the client browser and another with the web server.

As data is transmitted between the two nodes, Odysseus decrypts the data and gives the user the ability to alter and/or log the data in clear text before transmission.

You can find more and download Odysseus here:

http://www.bindshell.net/tools/odysseus

Telemachus is a companion utility for Odysseus, allowing further analysis and manipulation of the HTTP transactions that have passed through Odysseus.

Telemachus can communicate with the currently active instance of Odysseus, or alternately load a previously saved Odysseus activity log file.

Although primarily designed to be used in conjunction with Odysseus, Telemachus can be used a stand-alone utility.

You can download Telemachus here:

http://www.bindshell.net/tools/telemachus

Posted in: Hacking Tools, Networking Hacking Tools, Web Hacking

Topic: Hacking Tools, Networking Hacking Tools, Web Hacking


Latest Posts:


Socialscan - Command-Line Tool To Check For Email And Social Media Username Usage Socialscan – Command-Line Tool To Check For Email And Social Media Username Usage
socialscan is an accurate command-line tool to check For email and social media username usage on online platforms, given an email address or username,
CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.