Saturday, January 30th, 2010
Here's a quick example of grabbing a screenshot of a compromised system using meterpreter's espia module. Start with a basic exploit to gain a meterpreter session. You'll need to make sure you migrate to a process that has access to Active Desktop or else you will get nothing but blank ...
Posted in Internet, Networking, Privacy, Security | 1 Comment
Saturday, January 30th, 2010
I just wanted to show a quick example of using Incognito to impersonate user tokens on a compromised system. You can think of tokens as a web "cookie" which is just an object that holds your security information for the entire login process so that you don't have to re-authenticate ...
Posted in Internet, Networking, Privacy, Security, Windows | 2 Comments
Thursday, January 28th, 2010
This is a tool for security researchers. It allows you to search for either an IP address or a DNS name and display all associated domain names known to Bing.
Download:
http://bingprobe.codeplex.com/
Posted in Internet, Networking, Privacy, Software | No Comments
Sunday, January 17th, 2010
BackTrack 4 Final has now been released and aside from the many bug fixes, this version includes a new kernel, a larger and expanded toolset repository and custom tools that you can only find on BackTrack.
Download:
http://www.backtrack-linux.org/downloads/
Posted in Internet, Linux, Networking, Privacy, Security, Software | No Comments
Wednesday, January 13th, 2010
Last night Google started rolling out the change that enables the "Always use https" feature of Gmail by default. This is a great change to finally see because any little bit helps.
Source:
http://gmailblog.blogspot.com/2010/01/default-https-access-for-gmail.html
Posted in Internet, Privacy, Security | 2 Comments