VMWare Rootkits, The Next Big Threat?

Lab rats at Microsoft Research and the University of Michigan have teamed up to create prototypes for virtual machine-based rootkits that significantly push the envelope for hiding malware and that can maintain control of a target operating system. The proof-of-concept rootkit, called SubVirt, exploits known security flaws and drops a VMM (virtual machine monitor) underneath […]

Topic: Malware

JTR (Password Cracking) – John the Ripper 1.7 Released – FINALLY

The new “features” this time are primarily performance improvements possible due to the use of better algorithms (bringing more inherent parallelism of trying multiple candidate passwords down to processor instruction level), better optimized code, and new hardware capabilities (such as AltiVec available on PowerPC G4 and G5 processors). In particular, John the Ripper 1.7 is […]

Topic: Hacking Tools, Password Cracking

UK Could be Going TOO Far With Digital Laws

Types of activities that will become illegal under the proposed laws include making or supplying “hacking tools”- computer programmes or code that can help crack passwords or bypass security systems – and will be punishable by up to two years in prison. Isn’t this legitimate action for any security enthusiast, hobbiest or professional involved in […]

Topic: Hacking News

Post-Mortem Data Destruction

1. Introduction This article describes and partly implements a method to delete or re-locate, potentially sensitive and / or incriminating information from your UNIX flavoured machine, after the sad event of your death. An older version of this article has been published before, yet it has since disappeared from the Internet and the Google cache; […]

Topic: Countermeasures, Privacy, UNIX Hacking

SSL VPNs and OpenVPN – Part IV

4. Brief How-to …. Creating Multiple clients to Single site tunnels. Example of using PKI to create a client-to-site VPN: For a road warrior or roaming/multiple user scenario, static keys based VPNs don’t scale well. You will need to implement a PKI if you have Hub and Spoke architecture of VPN. From the OpenVPN.net website: […]

Topic: Linux Hacking, Networking Hacking, Security Software

Windows Rootkits

Windows Rootkits are a big rarity in this modern web hacking tehnology… I won’t speak exactly about rootkits, because it’s impropriate to call them that way… why? Well rootkits are programs that aid you in getting access to root level users… So in the case we are using Windows rootkits we should call them admkits […]

Topic: Malware, Windows Hacking