Tuesday, July 27th, 2010
Turns out that Facebook has a directory where you can get a list of all searchable FB users:https://www.facebook.com/directoryThese are now scraped and the torrent file is available for download for anybody who wants it.More info:http://www.skullsecurity.org/blog/?p=887
Posted in Internet, Privacy | No Comments
Monday, July 26th, 2010
Security experts at AirTight Networks have discovered a hole in the WPA2 Wi-Fi security protocol. The security hole was named as Hole 196 after the number of the relevant page in the IEEE 802.11 (2007) standard document:. Right at the bottom of this page, the IEEE introduces the keys used ...
Posted in Internet, Networking, Privacy, Security | No Comments
Wednesday, April 28th, 2010
IronKey has launched its Trusted Access for Banking USB stick at InfoSec 2010 in London. The IronKey TAB uses an isolated virtual machine launched from the stick and a intermediate server accessed through a VPN like connection to create a secure channel from the user to IronKey's servers, and from ...
Posted in Hardware, Internet, Privacy, Security | No Comments
Monday, March 8th, 2010
Energizer DUO is a USB battery charger. Included with the charger is a Windows application that allows the user to view the battery charging status. The installer for the Energizer DUO software places the file UsbCharger.dll in the application's directory and Arucer.dll in the Windows system32 directory. When the Energizer ...
Posted in General BS, Hardware, Internet, Privacy, Security | 2 Comments
Saturday, January 30th, 2010
This is just a quick example of how you can quickly and easily modify the HOSTS file on a compromised Windows system using the meterpreter script called hostsedit. As always, we start off with a basic exploit to gain a meterpreter session back from the victim's machine:
msf > use windows/smb/ms08_067_netapi
msf ...
Posted in Internet, Privacy, Security, Windows | 1 Comment