Uncategorized

Flaw Found in Common Network Security Technology

  Network firewall “middlebox” technology could unwittingly help hackers hijack an Internet connection. Middleboxes monitor the “sequence numbers” of data packets being sent to mobile devices. Middleboxes could help hackers use the process of elimination to home in on a number in the right range, then gain access to passwords.  A popular technology used to […]

Flaw Found in Common Network Security Technology Read More »

Burp Suite 1: Introduction

Burp Suite is an integrated platform for attacking web applications. It contains all of the Burp tools with numerous interfaces between them designed to facilitate and speed up the process of attacking an application. All tools share the same robust framework for handling HTTP requests, persistence, authentication, upstream proxies, logging, alerting and extensibility. Burp Suite

Burp Suite 1: Introduction Read More »

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts

By Sanjeev Ramachandran If you think Google always tops in securing your data and personal information on web, that need not be always true. Now web security analysts feel that the password recovery options given in Gmail can be an easy way for hackers to get access to hundreds of Gmail accounts. Presently, one of the

Gmail Password Retrieval Vulnerability May Lead to Mass Hacking Attempts Read More »

Uncover your Google search records with Google Takeout

This little known tool, which turns one this June, lets you download a copy of your Google presence.By: Chris Null If you listen to the growing chorus of online chatter about the company, Google’s now-infamous “Don’t be evil” slogan is becoming increasingly inaccurate by the day. The company’s most recent move–a sweeping change that consolidated

Uncover your Google search records with Google Takeout Read More »

Instant decryption of MS Office 2010 documents now possible

Passware announced Passware Kit Forensic 11.7, which includes live memory analysis and subsequent decryption of MS Word or Excel 2007-2010 files. In addition, the new version instantly decrypts PGP Whole Disk Encrypted volumes and recovers passwords for Apple disk images.“Until now, there had been no solution available commercially to crack MS Office 2007-2010 encryption in predictable

Instant decryption of MS Office 2010 documents now possible Read More »

Top 20 Network Penetration Testing Tools

List of Top 20 Network Penetration Testing tools : 1.    Nessus2.    Zenmap3.    Angry IP Scanner4.    IP Scanner5.    GFI lanGuard6.    SoftPerfect Network Scanner7.    SolarWinds Network Tool8.    Global Network Inventory Scanner9.    Superscan10.    Advanced IP Scanner11.    Retina12.    Advanced LAN Scanner13.    Emco Remote Installer  SE14.    Ghost Port Scan15.    Lizard System Network Scanner16.    Yaps17.    MiTec Network Scanner18.    LanSpy19.    Knocker20.    Local

Top 20 Network Penetration Testing Tools Read More »

Anatomy of a security hole – the break that broke sudo

by Paul Ducklin A recently-patched bug in the widely-used sudocommand makes for interesting reading. The patch reminds us of some important points in security-related programming. The UNIX sudo command is usually translated to mean “do as superuser” – in other words, it lets you run administrative commands one at a time, without logging in as the superuser (root, in UNIX parlance).

Anatomy of a security hole – the break that broke sudo Read More »