Using Nessus to call Nikto

Friday, September 5th, 2008

Earlier this year, Michel Arboi wrote a blog post explaining how to use Nessus to call Nikto and incorporate the results into Nessus output. Most newcomers to Nessus have enabled the nikto.nasl wrapper only to find it produced no output. Some Nessus users have found various ways to ensure Nikto ...

Twitter targeted by malware attacks

Friday, September 5th, 2008

Twitter's time has finally come.The microblogging service, once the playground of the Web 2.0 digerati, is now mainstream enough to be targeted by online criminals.Kaspersky Lab has uncovered a fake Twitter profile created solely for the purpose of infecting people's computers.The profile, with an alias that means "pretty rabbit" in ...

Google Chrome vulnerable to carpet-bombing flaw

Tuesday, September 2nd, 2008

Google’s shiny new Web browser is vulnerable to a carpet-bombing vulnerability that could expose Windows users to malicious hacker attacks. Just hours after the release of Google Chrome, researcher Aviv Raff discovered that he could combine two vulnerabilities — a flaw in Apple Safari (WebKit) and a Java bug discussed at ...

Google announces Google Chrome web browser

Tuesday, September 2nd, 2008

Google has confirmed that it is launching Google Chrome, a new web browser. Rumours of a Google browser project had been around since 2004, but a posting on the Blogoscoped site has turned those rumours into something much more tangible. It reported on the arrival of a 38 page comic ...

ISR-evilgrade – Inject Updates to Exploit Software

Friday, August 29th, 2008

ISR-evilgrade is a modular framework that allow us to take advantage of poor upgrade implementations by injecting fake updates and exploiting the system or software. How does it work? It works with modules, each module implements the structure needed to emulate a false update of specific applications/systems. Evilgrade needs the manipulation of ...