• 25,450
  • +1,014
  • 2,796

‘War Texting’ ...

Researcher will demonstrate at Black Hat USA next week how ‘horrifyingly’ easy it is to disarm a car alarm system and control other GSM and cell-connected devices It took researcher Don Bailey a mere two hours to successfully hack into a popular car alarm system and start the car remotely by sending it a message. Bailey, a security consultant with iSec...

Hackers call for PayPal bo...

Two high profile hacker groups have called on their followers to boycott PayPal over its continued refusal to handle donations to Wikileaks. Anonymous and Lulz Security issued a joint statement asking supporters to withdraw funds and close their accounts. PayPal froze Wikileaks’ assets after it released stolen US diplomatic cables. The company declined to...

Stuxnet Clones May Target ...

Officials with the US Department of Homeland Security warned that hackers could attack the country’s power generation plants, water treatment facilities, and other critical infrastructure with clones of the Stuxnet computer worm, which was used to disrupt Iran‘s nuclear-enrichment operations. Stuxnet was first detected last July as a self-replicating...

Anonymous, Lulzsec, Mannin...

THE COMPUTER SECURITY INDUSTRY’S Pwnie Awards ceremony is a week away and the nominations are out. The notorious Lulzsec hacking outfit, the Anonymous hacktivist collective, the Stuxnet industrial sabotage worm and the alleged WikiLeaks source Bradley Manning are all up for the ‘Epic 0wnage’ Pwnie award at Black Hat. Anonymous was nominated for...

Client Side Attack Using A...

Type : TutorialLevel : Medium, HardTesting Platform : Win XP SP3, Windows 7Vulnerable Application Testing : Adobe Reader 9.1There are some people says that the weakest security to breach was the human itself. I didn't say it was WRONG, because in fact yes it was the weakest, but I also cannot say TRUE, because sometimes the human didn't know...

5 Steps to Screen Capture ...

Type : Tips and TrickLevel : EasyPlatform : Windows (Any)When you already successfully compromising a vulnerable computer, sometimes you need to know what they are doing in their screen. By using meterpreter payload, you can do capturing user screen and it will be saved in your local machine. To doing this tips, you need to perform an attack first using...

Cellular Network Hijacking...

Weekend Following the success of hijacked network Free Libyana, we took the opportunity to talk to some engineers about the complexity of lifting someone else infrastructure, and discovered there isn’t much. In April this year, Ousama Abushagur hacked into the infrastructure built by the Libyana network in Libya. He cut the connections to the head office in Tripoli...

5 Step To Capture Windows ...

Type : Tips and TrickLevel : Beginner, Medium, AdvancedMy previous tutorial was talking and explaining about how to capture user keyboard stroke using meterpreter keylogger, you can find the article here : 5 Step Using Metasploit Keylogger (Keylogging). Now I will explain how to capture user login information also using meterpreter keylogger. I didn’t put...

5 Step Using Metasploit Me...

Type : TutorialLevel : Beginner, Medium, AdvancedThe first time I learn about keylogging was using a software called (I'm forget precise name) it's "spy *something*". That time I was really amazed because that tools really can capture all of strokes from keyboard and even can send me an email the result of user keyboard input.What is...

Over 100 arrested as US an...

Police in the US and Romania have made more than 100 arrests aimed at stopping a criminal gang from defrauding internet users. According to the US Justice Department a combined operation was carried out with 117 searches in the US and Europe that have resulted in more than 100 arrests. The criminal group are accused of holding fake auctions and then channelling funds...

Hacking Mozilla Firefox 3....

Today while surfing I read some news about nsTreeRange Mozilla Firefox version 3.5 to 3.6.1.6 Vulnerability. Actually this vulnerbility ranking is not excellent or good, but it’s normal vulnerability. This vulnerability was known at 2011-07-10 by sinn3r. In this tutorial I’m using Windows 7 for my victim Operating system with Mozilla Firefox v 3.5.17. If...

Using PsEXEC with Metasplo...

Type: TutorialLevel: Medium, AdvancedThe main problem of people nowadays with password it's hard to remember, that's why they usually put the same password for every account and even for every device they have. For example if you're in school, university, or office when they have a lot of computer, it's impossible to give different password...

Lying Facebook app offers ...

Facebook scammers have latched onto the buzz around Google+, as the theme for a new scam that has already claimed thousands of fans victims. A fake app, called “Google Plus Direct Access“, prompts users to visit a page on the social networking site they need to “like” in order to progress: a process that hands over personal information to the...

Page 16 of 29« First...10...1415161718...Last »