Microsoft Patches At Least 34 Bugs Including Pwn2Own Vulnerability

What a massive mother-load of patches Microsoft has unleashed on this month patching more than 34 security vulnerabilities including the fairly high profile vulnerability exploited at the Pwn2Own contest earlier this year in April. Good news as long as all the average Internet users actually use Windows Update and install the latest patches, which somehow […]

Topic: Exploits/Vulnerabilities, Windows Hacking

Knock v1.3b – Subdomain Enumeration/Brute-Forcing Tool

Knock is a python script designed to enumerate sub-domains on a target domain through a wordlist. Usage

You can view a demo of the tool enumerating Facebook sub-domains on Youtube here: Facebook and Knock v.1.2 Knock works on Linux, Windows and MAC OSX with a python version 2.6.x (or minor). Requirements Python version 2.6.x […]

Topic: Hacking Tools, Networking Hacking

FTC Cracks Down On Spyware Seller CyberSpy Software

Well this case has taken a while but the FTC won in the end and reached a settlement two years after halting the company from selling it’s “100 per cent undetectable” commercial keylogging application. It’s interesting to see court cases that venture into the grey area of ethics, I think the main problem stemmed from […]

Topic: Legal Issues, Malware, Privacy

sectool – Security Audit Tool & IDS

sectool is a security tool that can be used both as a security audit as well as a part of an intrusion detection system. It consists of set of tests, library and textual/graphical frontend. Tests are sorted into groups and security levels. Administrators can run selected tests, groups or whole security levels. Security Levels Naive […]

Topic: Countermeasures, Security Software

WhatWeb – Next Gen Web Scanner – Identify CMS (Content Management System)

Identify content management systems (CMS), blogging platforms, stats/analytics packages, javascript libraries, servers and more. When you visit a website in your browser the transaction includes many unseen hints about how the webserver is set up and what software is delivering the webpage. Some of these hints are obvious, eg. “Powered by XYZ” and others are […]

Topic: Hacking Tools, Web Hacking