Tuesday, August 5th, 2008
PuttyHijack is a POC tool that injects a dll into the Putty process to hijack an existing, or soon to be created, connection.
This can be useful during penetration tests when a windows box that has been compromised is used to SSH/Telnet into other servers.
The injected DLL installs some hooks and ...
Posted in Internet, Security, Software | No Comments
Monday, August 4th, 2008
This week it’s Twitter’s turn to host an attack - one that is targeting both Twitter users and the Internet community at large. In this case it's a malicious Twitter profile twitter.com/[skip]/ with a name that is Portuguese for ‘pretty rabbit’ which has a photo advertising a video with girls ...
Posted in General BS, Internet, Networking, Privacy, Security | No Comments
Monday, August 4th, 2008
At the Black Hat computer security conference in Las Vegas next week, researchers will demonstrate software they've developed that could steal online credentials from users of popular Web sites such as Facebook, eBay, and Google.The attack relies on a new type of hybrid file that looks like different things to ...
Posted in Internet, Privacy, Security | No Comments
Monday, August 4th, 2008
JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, August 1st, 2008
Attackers can exploit a bug in Twitter to force victims to follow the hacker's account, a security researcher said Thursday.According to Aviv Raff, the Twitter vulnerably could expose users to malware-hosting Web sites. "It can force people to follow you, which means all your twits will be showed in their ...
Posted in Internet, Privacy, Security | No Comments