Tuesday, September 29th, 2009
A fully functional exploit for the security vulnerability in the SMB2 protocol implementation has been published. It can be used to discover and attack vulnerable Windows machines remotely. By integrating the exploit into the Metasploit exploit toolkit, attackers have access to a wide range of attack options, ranging from issuing ...
Posted in Internet, Networking, Security, Windows | No Comments
Monday, September 28th, 2009
In computer security, a lot of effort is spent on the authentication problem. Whether it's passwords, secure tokens, secret questions, image mnemonics, or something else, engineers are continually coming up with more complicated—and hopefully more secure—ways for you to prove you are who you say you are over the Internet.
This ...
Posted in Hardware, Internet, Linux, Security, Windows | No Comments
Monday, September 28th, 2009
This free information security training is brought to you in a community effort to promote awareness and raise funds for underprivileged children in East Africa. Through a heart-warming effort by several security professionals, we are proud to present the most complete and in-depth open course about the Metasploit Framework.
http://www.offensive-security.com/metasploit-unleashed/
Posted in Coding, Internet, Linux, Privacy, Security, Software, Windows | No Comments
Sunday, September 27th, 2009
With its last update, Microsoft has added StartCom to the pre-installed root certificates in its operating system. As a result, Microsoft products (such as Internet Explorer) now accept certificates issued by StartCom without prompting the user or requiring any special configurations for the certificates. Third-party programs that use the operating ...
Posted in Internet, Privacy, Security, Windows | No Comments
Friday, September 25th, 2009
Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...
Posted in Internet, Security, Software, Windows | No Comments