... neuere Einträge
Monday, 24. October 2011
Agnitio
Am Monday, 24. Oct 2011 im Topic 'Tools'
A tool to help developers and security professionals conduct manual security code reviews in a consistent and repeatable way. Agnitio aims to replace the adhoc nature of manual security code review documentation, create an audit trail and reporting
Download
http://sourceforge.net/projects/agnitiotool/files/v2.1/Agnitio%20x86/Agnitio%20x86.zip/download?_test=goal
Download
http://sourceforge.net/projects/agnitiotool/files/v2.1/Agnitio%20x86/Agnitio%20x86.zip/download?_test=goal
Anonymous Take Down 40 Child Porn Websites
Am Monday, 24. Oct 2011 im Topic 'News'
Anonymous has taken down more than 40 darknet-based child porn websites over the last week. Details of some of the hacks have been released via pastebin #OpDarknet, including personal details 1500 users of a site named 'Lolita City,' and DDoS tools that target Hidden Wiki and Freedom Hosting — alleged to be two of the biggest darknet sites hosting child porn.
Source
http://pastebin.com/T1LHnzEW
Source
http://pastebin.com/T1LHnzEW
jara 1.6 - sql injection
Am Monday, 24. Oct 2011 im Topic 'Vulnerabilities'
download
http://sourceforge.net/projects/jara/files/v1.6/jarav16.zip
exploit
http://localhost/jara/view.php?id=[SQL Injection]
by
muuratsalo
http://sourceforge.net/projects/jara/files/v1.6/jarav16.zip
exploit
http://localhost/jara/view.php?id=[SQL Injection]
by
muuratsalo
ClubHACK Magazine October 2011
Am Monday, 24. Oct 2011 im Topic 'Books change the World'
Contents of ClubHACK Magazine:
Tech Gyan: Low Profile Botnets
The term Botnet‘ was sited frequently in headline news last year. It continues to dominate the ever changing threat landscape of cyberspace. Whether it is Conficker, Aurora, NightDragon or the latest ShadyRAT attacks, Botnets continue to haunt cyberspace.
Legal Gyan: Law relating to Child Pornography in India
Law relating to Child Pornography in India Child pornography means portrayal of children in all forms of media incl. images, films and, in some cases, writings depicting sexually explicit activities involving a child. Due to the free availability of information on the Internet, a major risk that a child may be exposed to is inappropriate material, sexual, hateful, or violent in nature, or encourages activities that are dangerous or illegal.
Tool Gyan: Demystifying the Android Malware
McAfee‘s first quarter threat report stated that, with six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history. McAfee stated that Android devices are becoming malware havens with Android being the second most popular environment for mobile malware behind Symbian in the first quarter.
Mom’s Guide: MALDROID
You bought that new Android phone because you thought open source was the best for you or because everyone is buying it. You thought that since it‘s a mobile OS there might not be anything in there which might cause you harm. You thought you were SAFE– Right? Wrong. You are about as right as the kid who believes in Santa Claus. According to recent research conducted by McAfee, Android is the most targeted mobile OS. The number of malware for Android has increased by 76%. But iOS has remained untouched.
Matriux Vibhag: WEBSECURIFY
Website security is a major concern of developers and businesses today, because of growing attack vectors and easiness of exploitation, businesses spend thousands of dollars to find and patch vulnerabilities in their website. Websecurify can help you find OWASP top 10 vulnerabilities before hackers (read as crackers) do. Websecurify is a free and open source web application scanner from the good folks of GNUcitizen.org. Its very easy to use and its simple interface makes it stand out of the crowd.
Download PDF
http://chmag.in/issue/oct2011.pdf
Tech Gyan: Low Profile Botnets
The term Botnet‘ was sited frequently in headline news last year. It continues to dominate the ever changing threat landscape of cyberspace. Whether it is Conficker, Aurora, NightDragon or the latest ShadyRAT attacks, Botnets continue to haunt cyberspace.
Legal Gyan: Law relating to Child Pornography in India
Law relating to Child Pornography in India Child pornography means portrayal of children in all forms of media incl. images, films and, in some cases, writings depicting sexually explicit activities involving a child. Due to the free availability of information on the Internet, a major risk that a child may be exposed to is inappropriate material, sexual, hateful, or violent in nature, or encourages activities that are dangerous or illegal.
Tool Gyan: Demystifying the Android Malware
McAfee‘s first quarter threat report stated that, with six million unique samples of recorded malware, Q1 2011 was the most active first quarter in malware history. McAfee stated that Android devices are becoming malware havens with Android being the second most popular environment for mobile malware behind Symbian in the first quarter.
Mom’s Guide: MALDROID
You bought that new Android phone because you thought open source was the best for you or because everyone is buying it. You thought that since it‘s a mobile OS there might not be anything in there which might cause you harm. You thought you were SAFE– Right? Wrong. You are about as right as the kid who believes in Santa Claus. According to recent research conducted by McAfee, Android is the most targeted mobile OS. The number of malware for Android has increased by 76%. But iOS has remained untouched.
Matriux Vibhag: WEBSECURIFY
Website security is a major concern of developers and businesses today, because of growing attack vectors and easiness of exploitation, businesses spend thousands of dollars to find and patch vulnerabilities in their website. Websecurify can help you find OWASP top 10 vulnerabilities before hackers (read as crackers) do. Websecurify is a free and open source web application scanner from the good folks of GNUcitizen.org. Its very easy to use and its simple interface makes it stand out of the crowd.
Download PDF
http://chmag.in/issue/oct2011.pdf
Bleeding Life 2 Exploit Pack - Linux
Am Monday, 24. Oct 2011 im Topic 'Pentest'
Black Hat Academy releases Bleeding Life 2 exploit pack. This is an exploit pack that affects Windows-based web browsers via Adobe and Java. You can read all about it, and download it for yourself. Statistics are kept based on exploit, browser, and OS version.
Download
http://www.blackhatacademy.org/security101/index.php?title=Bleeding_Life#Download
Download
http://www.blackhatacademy.org/security101/index.php?title=Bleeding_Life#Download
... ältere Einträge