[ad] We wrote about Bruter v1.0 ALPHA version back in 2008, recently they announced the release of v1.0 Final! Bruter is a parallel network login brute-forcer on Win32. This tool is intended to demonstrate the importance of choosing strong passwords. The goal of Bruter is to support a variety of services that allow remote authentication. […]
Archives for May 2010
IBM Distributes Malware Laden USB Drives at AusCERT Security Conference
[ad] Another case of ‘accidental’ malware distribution, remember a while back when Vodafone Spain was Distributing Mariposa Malware, the latest is that IBM handed out malware laden USB drives at a security conference of all places. Well on the up-side at least everyone there would be security savvy so damage should be minimal. If it […]
FOCA – Network Infrastructure Mapping Tool
FOCA 2 has a new algorithm which tries to discover as much info related to network infrastructure as possible. In this alpha version FOCA will add to the figured out network-map, all servers than can be found using a recursive algorithm searching in Google, BING, Reverse IP in BING, Well-known servers and DNS records, using […]
76% Of Users Exposing Their Browsing Histories
[ad] This is actually a very old flaw as it’s part of the core HTTP standards, it’s exploiting the very way in which the Internet works. Basically most browsers expose browsing history if probed in the right way, the fact was that it was just too resource intensive to get any useful data. Someone has […]
Metasploit 3.4.0 Hacking Framework Released – Over 100 New Exploits Added
[ad] Metasploit provides useful information and tools for penetration testers, security researchers, and IDS signature developers. This project was created to provide information on exploit techniques and to create a functional knowledgebase for exploit developers and security professionals. The tools and information on this site are provided for legal security research and testing purposes only. […]