Metagoofil 1.4 Released – Metadata and Information Gathering Tool

Monday, May 12th, 2008

Metagoofil is an information gathering tool designed for extracting metadata of public documents (pdf,doc,xls,ppt,odp,ods) available on the target/victim website. It will generate a html page with the results of the metadata extracted, plus a list of potential usernames very useful for preparing a bruteforce attack on open services like ftp, pop3,web ...

New type of rootkit hidden in hardware

Monday, May 12th, 2008

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's chip, undetected by today's anti-virus products. Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...

Mass File Injection Attack

Sunday, May 11th, 2008

We received a report from Mike this afternoon about a couple of URLs containing a malicious JavaScript that pulls down a file associated with Zlob.  If you do a google search for these two URLs, you get about 400,000 sites that have a call to this Javascript file included in ...

Hackers Find a New Place to Hide Rootkits

Saturday, May 10th, 2008

Security researchers have developed a new type of malicious rootkit software that hides itself in an obscure part of a computer's microprocessor, hidden from current antivirus products. Called a System Management Mode (SMM) rootkit, the software runs in a protected part of a computer's memory that can be locked and rendered ...

Top Six Database Attacks

Thursday, May 8th, 2008

It takes the average attacker less than 10 seconds to hack in and out of a database -- hardly enough time for the database administrator even notice the intruder. So it’s no surprise that many database attacks go unnoticed by organizations until long after the data has been compromised. And surprisingly, ...