Should Social Engineering be a part of Penetration Testing?

This is actually a very interesting debate. Just to introduce if you don’t know.. What is Penetration Testing A penetration test is a method of evaluating the security of a computer system or network by simulating an attack by a malicious cracker. The process involves an active analysis of the system for any weaknesses, technical […]

Topic: Social Engineering

Prostitutes want GTA (Grand Theft Auto) Banned

A little bit crazy eh? Sex workers cry foul, say game “accrues points to players for the depiction of rape and murder of prostitutes.” The Grand Theft Auto franchise is getting attacked from all angles. Joining the ranks of politicians, policemen, and attorneys in their crusade to see the game lifted from shelves are the […]

Topic: Hacking News

Who is Navaho Gunleg?

Following the recent post by backbone, I decided to post a short introduction as well. Background I am from The Netherlands, Europe — a country most people probably have heard about. Either because of the legendary HackTic-foundation that later started the ISP XS4ALL and otherwise undoubtably because of our liberal stance towards soft-drugs and prostitution. […]

Topic: Authors

US considers banning DRM rootkits – Sony BMG

Now after the huge Sony BMG Rootkit fiasco, this has become quite a hot topic, how far can vendors go to enforce their ‘Digital Rights Management’ (or Digital Restrictions Management as we like to call it), can they install a rootkit on your machine and hook into your OS? Can they take over your PC […]

Topic: Malware, Privacy
Rainbow Table Generator - rtgen

RainbowCrack & How To Use Rainbow Crack With Rainbow Tables

This article is about RainbowCrack & How to use Rainbow Crack with Rainbow Tables, this includes how to generate rainbow tables, where to download them and what tools to use. RainbowCrack & How To Use Rainbow Crack? RainbowCrack is a general propose implementation of Philippe Oechslin’s faster time-memory trade-off technique. In 1980 Martin Hellman described […]

Topic: Password Cracking

Malware Honeypot Projects Merge – mwcollect and nepenthes

Looking to streamline the collection of malware samples, two of the biggest honeypot projects mwcollect and nepenthes have merged operations. The two projects, which passively trap viruses, spyware and other forms of malicious software by emulating known vulnerabilities, will combine operations to develop a single malware collection tool, according to an announcement my mwcollect head […]

Topic: Malware