Wednesday, 29. February 2012
SecurityXploit - Android App

Get the Security Xploit Android app from SlideME.

Permalink

 


Saturday, 25. February 2012
Metasploit 4.2.0 - What's New
Since last release in October, Metasploit added 54 new exploits, 66 new auxiliary modules, 43 new post-exploitation modules, and 18 new payloads.

Release Note
https://community.rapid7.com/docs/DOC-1701

Download
http://www.rapid7.com/downloads/metasploit.jsp

Permalink

 


Thursday, 23. February 2012
SecToolMarket
SecToolMarket currently supports the following features:

1- A clear and simple presentation of the 2011 benchmark of 60 web application scanners, with a "click to get anywhere" interface.
2- Product specific, Test specific and Vendor specific unified information.
3- Comparison tables for product information, general features, authentication features, input vector support (new!), coverage (new!), audit features and complimentary audit features (data reflects the results published in the *08/2011* benchmark).
4- Detailed comparison of SQL Injection and Reflected Cross Site Scripting detection accuracy (data reflects the results published in the *08/2011* benchmark).
5- Glossaries for many of the terms & features implemented in the various products.
6- Statistics for many of the benchmark's results (how many scanners support a certain feature, implement a certain vulnerability check, etc).
7- Built-in filters for comparing unified lists of products, commercial products or open source products.
8- Additional content that wasn't published in the 2011 benchmark.
9- Notifications on SVN activities and upcoming features.
10- A framework for presenting updated & new results more frequently.

Notice that the information that is currently presented in the website reflects information from august 2011, and that the two new benchmark categories (input vector support and coverage) still require modifications and updates, but according to the author, this information will be updated more often, and will enable us to track the research progress.

Info
http://www.sectoolmarket.com/

Permalink

 


Friday, 17. February 2012
Blackhat Training on The Social-Engineer Toolkit
For more information or to register, head over to here: http://blackhat.com/html/bh-us-12/training/courses/bh-us-12-training_social_engineer_toolkit.html. You’ll also get a free Teensy device that we’ll be programming during the class! If you are a penetration tester, or wanting to get into it.. This is your course. Learn how to write your own modules, customize your own attacks, build your attack off your company and have a high level of success.

Info
http://www.secmaniac.com/blog/2012/02/15/blackhat-training-on-the-social-engineer-toolkit/

Permalink

 


Friday, 3. February 2012
Code 2600
CODE 2600 will be screened at the Camera 12 Theatre, located at 201 South Second Street, San Jose, CA 95113.

Permalink

 


Thursday, 19. January 2012
xsusenet - Free Usenet access
Lifetime 1Mbit Free Usenet access

Click to visit promo page and register.
http://www.xsusenet.com/en/
Check you mail box.

Free Usenet Newsleecher Final
http://www.newsleecher.com//?id=download&dlinB=nl_b

Permalink

 


Wednesday, 18. January 2012
SecurityXploit Mostreads 2011
Count Date Title Author

1 378 30.06.11 SQL Injection Scanners List xploit
2 299 20.07.11 winAUTOPWN v2.7 xploit
3 287 07.07.11 The Web Application Hacker's Handbook 2nd: Discovering and Exploiting Security Flaws xploit
4 204 28.08.11 Killapache - DDOS tool - Perl xploit
5 191 24.08.11 Upload a php shell xploit
6 182 03.08.11 Facebook password recovery xploit
7 181 15.09.11 Backtrack 5 Wireless Penetration Testing xploit
8 181 30.06.11 Dictionaries & Wordlists xploit
9 164 23.08.11 BING.COM - XSS xploit
10 162 06.07.11 Wifi Cracker 1.5 - Linux xploit

Permalink

 


Thursday, 12. January 2012
DNSChanger Trojan - Check System
DNSChanger is a family of Trojan which, as its name can tell, alters the DNS settings of infected computers (to force the computer to use a rogue DNS server) in order to redirect the user to malicious web sites or services. As a reminder, the DNS protocol allows systems to obtain the IP address of a server from its name: this process is called DNS resolution, and it happens for instance each time a user enters an URL in its favourite web browser.

Check System
http://www.dns-ok.de/

Permalink

 


Magix PC Check and Tuning 2011 - Free
Magix PC Check and Tuning is complete system utility suite that provides all the tools necessary to maintain and speed up your computer. Unlike other ordinary system utilities, the application is very simple to use. One click function buttons such as the “Check PC” button automatically performs a complete system analysis, which includes analysis of system start, garbage data, internet traces, swap file, windows registry, hard drive fragmentation, registry fragmentation, unwanted services and more. After the analysis is complete, the application displays the issues that need to be fixed. Users can fix all the issues at once by clicking on the “Fix all problems” button.

Click here
http://www.magix.com/pcct-2011/
to visit
http://www.pentestit.com/tag/promotional-offer/
promotional offer for Magix PC Check and Tuning.
Enter the required details to create a Magix account for Existing users – select “I have already registered with Magix” and login to your account.
Login to your email and check an email from register@magix.net with your free serial number and download link Magix PC Check and Tuning

Permalink

 


Monday, 2. January 2012
Easy Router PIN
There is a newly discovered vulnerability in the WiFi Protected Setup standard that reduces the number of attempts it would take an attacker to brute-force the PIN for a wireless router's setup process. The flaw results in too much information about the PIN being returned to an attacker and makes the PIN quite weak, affecting the security of millions of WiFi routers and access points. Security researcher Stefan Viehbock discovered the vulnerability (PDF)

Download PDF
http://sviehb.files.wordpress.com/2011/12/viehboeck_wps.pdf

Permalink