Tuesday, August 5th, 2008
PuttyHijack is a POC tool that injects a dll into the Putty process to hijack an existing, or soon to be created, connection.
This can be useful during penetration tests when a windows box that has been compromised is used to SSH/Telnet into other servers.
The injected DLL installs some hooks and ...
Posted in Internet, Security, Software | No Comments
Monday, August 4th, 2008
This week it’s Twitter’s turn to host an attack - one that is targeting both Twitter users and the Internet community at large. In this case it's a malicious Twitter profile twitter.com/[skip]/ with a name that is Portuguese for ‘pretty rabbit’ which has a photo advertising a video with girls ...
Posted in General BS, Internet, Networking, Privacy, Security | No Comments
Monday, August 4th, 2008
At the Black Hat computer security conference in Las Vegas next week, researchers will demonstrate software they've developed that could steal online credentials from users of popular Web sites such as Facebook, eBay, and Google.The attack relies on a new type of hybrid file that looks like different things to ...
Posted in Internet, Privacy, Security | No Comments
Monday, August 4th, 2008
JUST as the body's immune system sometimes mistakenly attacks its own cells, so the security software intended to protect network users can be fooled into attacking them. This could make attacks by hackers even harder to detect and prevent.Security software typically prevents unauthorised access by encrypting most of the data ...
Posted in Hardware, Internet, Networking, Privacy, Security | No Comments
Friday, August 1st, 2008
A security expert who helped pioneer some of the research behind the recent cold-boot attack discovery by researchers at Princeton University will reveal next week at Black Hat USA the technical details of methods he developed for protecting an encrypted laptop from the hack.The software-based techniques defend against so-called cold ...
Posted in Hardware, Privacy, Security | No Comments