{"id":4047,"date":"2016-01-07T23:40:06","date_gmt":"2016-01-07T15:40:06","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=4047"},"modified":"2018-01-14T23:19:22","modified_gmt":"2018-01-14T15:19:22","slug":"a-look-back-at-2015-tools-news-highlights","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2016\/01\/a-look-back-at-2015-tools-news-highlights\/","title":{"rendered":"A Look Back At 2015 \u2013 Tools & News Highlights"},"content":{"rendered":"

So here we are in 2016, yet still writing 2015 in our chequebooks (yah lolpls like anyone uses cheques any more). Following on from last year and our 2014 summary<\/a>, here is our 2015 highlights post with interesting happenings over the past 12 months \u2013 including tools and news stories.<\/p>\n

\"A<\/p>\n

2015 News Stories<\/h3>\n

The theme for 2015 seemed to be LARGE SCALE OWNAGE, everything and everyone was getting hacked left right and center. Right at the start of the year we already had the GHOST vulnerability<\/a> and a Flash zero day in the wild<\/a> – which left us happy to say goodbye to Flash on Facebook<\/a> towards the end of the year (After their record breaking patch which contained 78 CVE-classified Vulnerabilities<\/a>).<\/p>\n

One of the big dramas of the year was Hacking Team getting Hacked<\/a> – oh the irony. Other notable stuff would be the vulnerabilities in Jeep cars<\/a>, the WhatsApp Web vCard Vulnerability<\/a>, and the Hilary Clinton e-mail leak<\/a>. <\/p>\n

It was also the year of mega DDoS attacks with Telegram suffering a HUGE 200GBps pounding mid-year<\/a>, then the prolonged, sustained and rather sophisticated DDoS on the crypto-mail service ProtonMail<\/a> and to finish the year (and the one that affected me) the multi-day mega DDoS Seige on Linode<\/a> over xmas and new years (thanks for wrecking many people’s holidays).<\/p>\n

Other interesting stuff would be the Dell backdoor root cert fiasco<\/a>, the TalkTalk hack<\/a> which they tried to initially downplay and cover up, Logjam<\/a> (which was a very interesting attack vector based on the the forward secrecy implementation).<\/p>\n

2015 Best Hacking Tools<\/h3>\n

There\u2019s been some pretty neat stuff released this year, the below are tools that’s I’ve personally found interesting but haven’t been super high traffic:<\/p>\n