Thursday, April 23rd, 2009
At the Hack In The Box (HITB) Security Conference in Dubai on Thursday, security researchers demonstrated how software they developed can already take advantage of a design problem with the upcoming Windows 7 operating system, allowing them to hack into the system. VBootkit 2.0, created by researchers Vipin Kumar and ...
Posted in Privacy, Security, Windows | No Comments
Wednesday, April 15th, 2009
Kernel rootkits are tough enough to detect, but now a researcher has demonstrated an even sneakier method of hacking Linux.
The attack attack exploits an oft-forgotten function in Linux versions 2.4 and above in order to quietly insert a rootkit into the operating system kernel as a way to hide malware ...
Posted in Coding, Linux, Privacy, Security | No Comments
Saturday, April 4th, 2009
Microsoft's PowerPoint application is being used in a new attack that exploits an unpatched vulnerability in the popular Office app. The software giant yesterday issued a security alert confirming "limited and targeted attacks" were under way using malicious PowerPoint files that exploit the flaw.
The exploits carry a Trojan, according to ...
Posted in Internet, Security, Software, Windows | No Comments
Wednesday, April 1st, 2009
Autohack your targets with least possible interaction.
Features :
- Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits.
- No need to debug, script or compile the source codes.
- Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to ...
Posted in Coding, Internet, Linux, Networking, Perl, PHP, Privacy, Security, Software, Windows | No Comments
Monday, March 30th, 2009
Experts have discovered a security hole in the computer code that powers the Conficker worm, an aggressive contagion that has spread to more than 12 million Microsoft Windows systems worldwide. The security community is treading lightly with this news, because while the discovery could make it easier to isolate infected ...
Posted in Coding, Internet, Security, Windows | 2 Comments