Thursday, July 23rd, 2009
Adobe is warning of a critical security vulnerability in its current Flash Player for Windows, Macintosh and Linux. Adobe Reader and Acrobat 9.x for all platforms are also affected. The vulnerability is already being actively exploited two ways, via crafted PDF documents and manipulated web sites (drive-by downloads). It's reported ...
Posted in Coding, Internet, Security, Software | No Comments
Monday, June 22nd, 2009
I was contacted privately about this, so I thought I would post a step-by-step guide on how to capture keystrokes from a target machine using Metasploit.
Instead of posting a ton of screenshots, I will provide the commands in text below, step-by-step:
msf > use exploit/windows/smb/ms08_067_netapi (only an example - use whatever ...
Posted in Privacy, Security | 4 Comments
Thursday, June 18th, 2009
Researchers have built a tool that automatically finds and exploits SQL injection and cross-site scripting vulnerabilities in Web applications.
The so-called Ardilla tool uses a technique developed by the researchers -- MIT's Adam Kiezun, the University of Washington's Michael Ernst, Stanford's Philip Guo, and Syracuse University's Karthick Jayaraman -- that creates ...
Posted in Coding, Internet, PHP, Security, Software | No Comments
Sunday, June 7th, 2009
The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks.
Fixes:
Fixed memory & register leaks in NASL
nessus-fetch ...
Posted in Internet, Linux, Networking, Privacy, Security, Software, Windows | No Comments
Sunday, June 7th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Privacy, Security, Windows | No Comments