Complemento v0.6 – LetDown TCP Flooder, ReverseRaider Subdomain Scanner & Httsquash HTTP Server Scanner Tool

We first wrote about Complemento 0.4b a little while ago when it first hit the public domain just last month (December 2008). Now there have been 2 major updated versions, the latest being 0.6. What is Complemento? Complemento is a collection of tools that the author originally created for his own personal toolchain for solving […]

Topic: Hacking Tools, Networking Hacking, Web Hacking

Kyrgyzstan Taken Offline by Huge Denial of Service Attack

Isn’t it amazing in this day and age an entire country can be knocked offline by Denial of Service attacks! You’d have though it wouldn’t happen any more. I do remember the days when it was fairly easy to take one of the smaller ISPs out in UK, so I guess the infrastructure of some […]

Topic: Hacking News, Networking Hacking
Scanner Scoring

Independent Web Vulnerability Scanner Comparison – Acunetix WVS, IBM Rational AppScan & HP WebInspect

I saw a relevant paper published today by an individual that claims the comparison was ordered by a penetration testing company (a company which remains unnamed). The vendors were not contacted during or after the evaluation. Testing Procedure The author tested 13 web applications (some of them containing a lot of vulnerabilities), 3 demo applications […]

Topic: Countermeasures, Exploits/Vulnerabilities, Security Software, Web Hacking

Gary McKinnon Wins Right to Appeal Against Extradition

We’ve been following the case of the ‘NASA Hacker’ Gary McKinnon since it started in April 2006 when we reported the British Hacker Gary McKinnon Fears Guantanamo. So you can see the case has been going on for quite some time, the most recent news we published about it was UK Hacker Gary McKinnon Loses […]

Topic: Hacking News, Legal Issues

List of Famous Hackers in Computer History Both White Hat and Black Hat

This is a very complete list, probably the most complete one I’ve seen and it includes pictures – pictures of people who rarely have their pictures taken or allow them out on the Internet. The list is according to the proper original definition of a Hacker, as taken from the New Hacker’s Dictionary: A person […]

Topic: Hacking News