LLDP – Link Layer Discovery Protocol Fuzzer

The first Link Layer Discovery Protocol Fuzzer is now available, test cases are also ready to be used along with the tool. The fuzzing architecure makes it easy to extend the tool with new test cases and more LLDP compliant devices arise. LLDP is a Layer 2 protocol which allows network devices to advertise their […]

Tags: , , , , , , ,

Posted in: Hacking Tools, Network Hacking | Add a Comment
GFI Goodies

July Commenter of the Month Competition Winner 2007!

So, I guess you guys are wondering who has won the July contest? It was a pretty close call. As you know we started the Darknet Commenter of the Month Competition on June 1st and it ran for the whole of June, we have just finished the second month of the competition in July and […]

Tags: , , , , , , , , , , ,

Posted in: Site News | Add a Comment

Security Freak Video Lectures – Hacking, Programming, Networking & More

A while back a reader e-mailed us about a new site they have called Security Freak, the site is about informatin security education and is mostly using video lectures to illustrate and convey the lessons. Security-Freak.net is an attempt to lower the entry barrier for starting computer security research. The author has noticed that during […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Programming | Add a Comment

Wfuzz – A Tool for Bruteforcing/Fuzzing Web Applications

Wfuzz is a tool designed for bruteforcing Web Applications, it can be used for finding resources not linked (directories, servlets, scripts, etc), bruteforce GET and POST parameters for checking different kind of injections (SQL, XSS, LDAP,etc), bruteforce Forms parameters (User/Password), Fuzzing,etc. The tool is based on dictionaries and ranges, you choose where you want to […]

Tags: , , , , , , , , ,

Posted in: Hacking Tools, Web Hacking | Add a Comment

Hackers Steal U.S. Government Corporate Data from PCs – AGAIN

Seems like a social engineering type attack again relying on human ignorance and stupidity. Based around some kind of malware reporting back to a central repository. Remember kids if a deal is too good to be true…it isn’t. Hackers stole information from the U.S. Department of Transportation and several U.S. companies by seducing employees with […]

Tags: , , , , , , ,

Posted in: General Hacking | Add a Comment

Babel Enterprise – Cross Platform System Auditing Tool

Babel Enterprise is a systems auditing tool. Babel performs a security level check of the machine, or hardening. The check consists of a number of auditing tests that obtain a snap of the security status of each machine. The result is a security index of the system that is given after each execution. It a […]

Tags: , , , , , , , ,

Posted in: Countermeasures, Security Software | Add a Comment

TimeWarner DNS Hijacking IRC Servers to Stop DDoS Attacks

An interesting happening this week, some ISP’s have been jacking the DNS entries for certain IRC networks to crack down on zombie/bot infections. Is it ethical? Should they be doing this to their users? I first got wind of this from a post on Full Disclosure mailing list from an IRC network administrator. You can […]

Tags: , , , , , , , , , ,

Posted in: Malware, Network Hacking | Add a Comment

Dr. Morena – Firewall Configuration Testing Tool

Dr.Morena is a tool to confirm the rule configuration of a Firewall. The configuration of a Firewall is done by combining more than one rule. Sometimes a rule configuration may reside in a place other than the basic rule configuration place. In such a case, it is difficult to confirm whether it is an intended […]

Tags: , , , , , , ,

Posted in: Network Hacking, Security Software | Add a Comment

Some Guidelines on How to Secure your Ubuntu Installation

Since Ubuntu is getting so fantastically popular nowadays I thought this might be useful to some of you. I personally think Ubuntu is great, the features, ease of installation, stability and especially the work they have done on things like wireless drivers make it a breeze to get up and running. It is a pretty […]

Tags: , , , , , , , , , , ,

Posted in: General News, Linux Hacking | Add a Comment