Friday, September 29, 2006

ENVT- Linux Shellcode Injector

ENVT- Linux Shellcode Injector
This simple tool will inject a linux shellcode into the environment and find its location in memory. There are 8 shellcodes for various platforms like x86, sparc, mips and ppc.
Link http://www.gmx.net.qa/envt.c
Added by Dancho Danchev
Homepage http://www.gmx.net.qa/
26.09.2006

Hack In The Box Conference 2006 Materials

Hack In The Box Conference 2006 Materials
The presentations from this year's HITB.
Link http://conference.hackinthebox.org/hitbsecconf2006kl/materials/
Added by Dancho Danchev
Homepage http://photos.hitb.org
26.09.2006

The Hacker’s Toolbox : A Survey of Network Security Tools

The Hacker’s Toolbox : A Survey of Network Security Tools
This document introduces some essential tools of the trade of network security. The intended audience is advanced students who have some background in programming, operating systems, and networking, and who have had exposure to the ideas behind network security, but who are lacking in the practical experience that implementing network security practices provide. My aim is not to provide in-depth usage information for these tools, but rather to acquaint the reader with a sample representing the flavor of a wide variety of security tools.
Link http://people.ucsc.edu/~zaven/resume/ToolboxPaper.pdf
Added by Dancho Danchev
Homepage http://people.ucsc.edu/~zaven/
26.09.2006

Free Online Textbooks, Lecture Notes, Tutorials, and Videos on Mathematics

Free Online Textbooks, Lecture Notes, Tutorials, and Videos on Mathematics
General Mathematics - Abstract Algebra - Analysis - Numerical Analysis - Calculus - Differential Equations - Geometry - Graph Theory - Linear Algebra & Matrices - Number Theory - Operations Research - Physics - Statistics - Videos - Miscellaneous
Link http://homepages.nyu.edu/~jmg336/html/mathematics.html
Added by Dancho Danchev
26.09.2006

Wednesday, September 20, 2006

Hpw to Hack into a Windows XP Computer Without Changing Password

Hpw to Hack into a Windows XP Computer Without Changing Password
Yesterday I talked about how to "Recover Windows Login password within minutes". Another method to login to a password protected Windows even if you do not have the password is by making Windows accepting any passwords. There is a far better way to get into Windows XP. It is easy and it does not reset the password. Hack into a computer running Windows XP without changing the password and find out all and any passwords on the machine (including admin accounts). You do not need access to any accounts to do this. Of course, do not do this on anyone elses computer without proper authorisation.
Link http://www.raymond.cc/blog/archives/2006/09/02/how-to-hack-into-a-windows-xp-computer-without-changing-password/
Added by Dancho Danchev
20.09.2006

Backdooring PDF Files

Backdooring PDF Files
This article will give two practical examples of how Adobe Professional and Adobe Reader can be backdoored. There are 7 or more points where an attacker can launch malicious code. Both of the attacks discussed below are attached to the “Page Open” event.
Link http://michaeldaw.org/md-hacks/backdooring-pdf-files
Added by Dancho Danchev
20.09.2006

Saturday, September 16, 2006

Google Hacking for MP3s

Google Hacking for MP3s
Why would we want to use Google to find MP3s instead of using P2P apps? -P2P/BT is being monitored -- Using Google we can download a lot more safely
Link http://g2p.org/
Added by Dancho Danchev
Related links http://ghh.sourceforge.net/
Homepage http://johnny.ihackstuff.com/
12.09.2006

USB Switchblade

USB Switchblade
The goal of the "USB Switchblade" is to silently recover information from a target Windows 2000 or higher computer, including password hashes, LSA secrets, IP information, etc... Several methods for silent activation exist including the original MaxDamage technique of using a special autorun loader on the virtual CD-ROM partition of a U3 compatible USB key, and the original Amish technique of using social engineering to trick a user into running the autorun when choosing "Open folder to display files" upon insertion.
Link http://www.hak5.org/forums/viewtopic.php?p=31505
Added by Dancho Danchev
Homepage http://www.hak5.org/wiki/index.php?title=USB_Switchblade
12.09.2006

Interesting Google Hacks

Interesting Google Hacks
Poetry in Translation, Google Talk, Visual Poetry, Word Color, Google News Map, Google Date, Google Random Image, Land Geist, Google Share, Google History, Google Battle, Google Best Time to Visit, Google Pos, Google Protocol.
Link http://douweosinga.com/projects/googlehacks
Added by Dancho Danchev
12.09.2006

Saturday, September 09, 2006

Port Scanning with JavaScript

This is a proof of concept page for port scanning arbitrary IP addresses from JavaScript. Given a range of IP addresses, the scanner will detect if there is a host running at that IP. It will then look for a web server running on port 80 and try to fingerprint what kind of web server it is. Only fingerprinting of Microsoft IIS and Apache are currently supported. If the scanner cannot fingerprint the server will report it as "Unknown webserver."This page will not automatically scan your network, will not attack any hosts it discovers, and will not report any information about your network back to SPI Dynamics.


http://www.spidynamics.com/spilabs/js-port-scan/

Friday, September 08, 2006

SysAnalyzer - an Automated Malcode Run Time Analysis Application

SysAnalyzer - an Automated Malcode Run Time Analysis Application
SysAnalyzer is an automated malcode run time analysis application that monitors various aspects of system and process states. SysAnalyzer was designed to enable analysts to quickly build a comprehensive report as to the actions a binary takes on a system.
Link http://labs.idefense.com/labs-software.php?show=15
Added by Dancho Danchev
Homepage http://labs.idefense.com/
08.09.2006

23 Applications to Detect, Remove and Prevent Rootkits

23 Applications to Detect, Remove and Prevent Rootkits
Aries Sony Rootkit Remover, Archon Scanner, AVG AntiRootkit, chkrootkit, DarkSpy, F-Secure Blacklight Beta, Gmer, Helios, HiddenFinder, HookExplorer, IceSword, Process Master, RootKit Hook Analyzer, Rootkit Hunter, RootkitRevealer, RootKitShark, RootKit Uncover, RootKit Unhooker, Sophos Antirootkit, System Virginity Verifier, Unhackme, Zeppoo, AntiHook, AppDefend, Cyberhawk, DefenseWall HIPS, Dynamic Security Agent, Exe LockDown, GeSWall Personal Edition, Neoava Guard, ProcessGuard, SocketShield, ThreatMon.
Link http://www.antirootkit.com/software/index.htm
Added by Dancho Danchev
Homepage http://www.antirootkit.com/
05.09.2006

Over 160 Free Personal Information Managers

Over 160 Free Personal Information Managers
The best type of software for productivity is personal information manager (PIM). They are softwares which help you oraganising your personal information, such as contacts, calendars, emails, notes etc. To give you choices, find out what are available on the Internet and fits you, Listible has a huge list (over 160) of PIMs. There are Windows & Mac based software; web based, and all of them are free!
Link http://www.lifehack.org/articles/lifehack/over-160-free-personal-information-managers.html
Added by Dancho Danchev
05.09.2006

How To Prevent Windows XP Users From Writing To USB Drives

How To Prevent Windows XP Users From Writing To USB Drives
USB drives are extremely handy tools, but in some instances it might not be a good idea to allow users to write onto these devices from their PCs. This is especially true when working with highly confidential data or intellectual property at work. Users of Windows XP with service pack 2 installed can disable writing to USB devices.
Link http://www.tech-recipes.com/rx/1536/how_to_prevent_windows_xp_users_writing_to_usb_drives
Added by Dancho Danchev
Homepage http://www.tech-recipes.com/modules.php?name=Recipes&op=listcategories&catid=14
05.09.2006

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone’s Battery

Exploiting MMS Vulnerabilities to Stealthily Exhaust Mobile Phone’s Battery
In this paper, we demonstrate such an attack, which surreptitiously drains mobile devices’ battery power up to 22 times faster and therefore could render these devices useless before the end of business hours. This attack targets a unique resource bottleneck in mobile devices (the battery power) by exploiting an insecure cellular data service (MMS) and the insecure interaction between cellular data networks and the Internet (PDP context retention and the paging channel).
File securecomm06.pdf
Filesize 123.748 KB
MD5 checksum 41979c3235eeca7f7efe434de27d2ba8
Added by Dancho Danchev
Homepage http://www.cs.ucdavis.edu/~hchen/
05.09.2006

Malicious Website / Malicious Code of the Week

Malicious Website / Malicious Code of the Week
Starting today, Websense Security Labs presents the analysis of the "Malicious Website / Malicious Code of the Week" which will be posted at the end of each week. These weekly postings will provide highly detailed, in-depth analysis of a piece of malicious code that the Labs has captured and classified.
Link http://www.websense.com/securitylabs/blog/blog.php?BlogID=77
Added by Dancho Danchev
05.09.2006

HardWall Firewall

HardWall Firewall
HardWall Firewall is an iptables firewall script that provides port forwarding, packet filtering, stateful packet inspection, port redirection, masquerading, SNAT, DNAT, NAT, and bridging. It functions as both a workstation firewall and an IP forwarding firewall.
Link http://prdownloads.sourceforge.net/hwfirewall/hwfirewall-15-Stable-6.tar.gz?download
Platform Linux
Added by Dancho Danchev
Homepage http://sourceforge.net/projects/hwfirewall/
05.09.2006

New Trojans - August

New Trojans - August
Screenshots, detailed descriptions and behavior characteristics included.
Link http://www.megasecurity.org/files_archive/files082006.html
Added by Dancho Danchev
05.09.2006

Internet Explorer PassView v1.00

Internet Explorer PassView v1.00
IE PassView is a small utility that reveals the passwords stored by Internet Explorer browser. It supports the new Beta version of Internet Explorer 7.0, as well as older versions of Internet explorer, v4.0 - v6.0.IE PassView utility can recover 3 types of passwords: - AutoComplete Passwords: - HTTP Authentication Passwords - FTP Passwords: Be aware that in the last Beta of Internet Explorer 7.0 (Beta 3), FTP passwords are not saved in the system.
File iepv.zip
Filesize 43.345 KB
MD5 checksum 7e9712be8d8982a10a6c59e15f8453a8
Added by Dancho Danchev
Homepage http://www.nirsoft.net/utils/internet_explorer_password.html
05.09.2006

Tips and Tricks to Running Windows with Least Privilege

Tips and Tricks to Running Windows with Least Privilege
In-depth and informative slides with practical tips on the topic.
File SEC314_Riley.pdf
Filesize 1530.901 KB
MD5 checksum 8cdc6583f566516bc1a4555a6f90793c
Added by Dancho Danchev
05.09.2006

LAPSE: Web Application Security Scanner for Java

LAPSE: Web Application Security Scanner for Java
LAPSE stands for a Lightweight Analysis for Program Security in Eclipse. LAPSE is designed to help with the task of auditing Java J2EE applications for common types of security vulnerabilities found in Web applications. LAPSE was developed by Benjamin Livshits as part of the Griffin Software Security Project.
Link http://suif.stanford.edu/~livshits/work/lapse/download.html
Added by Dancho Danchev
Homepage http://suif.stanford.edu/~livshits/work/griffin/
05.09.2006

Email Injection - Secure PHP

Email Injection - Secure PHP
There are a lot of ways to send anonymous emails, some use it to mass mail, some use it to spoof identity, and some (a few) use it to send email anonymously. Usually a web mailform using the mail() function generates emails containing headers with the originating IP of the server it's running on. Therefore the mailform acts as a SMTP proxy. The input fields of the form may vary, but it is common to specify a mailform that gives you control over the subject, the message, and the sender's email address.
Link http://www.securephpwiki.com/index.php/Email_Injection
Added by Dancho Danchev
Homepage http://www.securephpwiki.com/
05.09.2006

Python 101 cheat sheet

Python 101 cheat sheet
Python columnist Evelyn Mitchell brings you a quick reference and learning tools for newbies who want to get to know the language. Print it, keep it close at hand, and get down to programming!
Link http://www-128.ibm.com/developerworks/library/l-cheatsheet3.html
Added by Dancho Danchev
05.09.2006

Sunday, September 03, 2006

Reach-a-Mail

Reach-a-Mail

Reach-a-Mail is a USB based portable email client. From now on, your e-mail will always be with you no matter where you are. All you need is a USB drive to receive and send e-mail from any computer without the need to install any software. You save a lot of time thanks to Reach-a-Mail, as well as keep your e-mail correspondence private leaving nothing in a computer. You will be impressed by the easiness and simplicity of user's interface.

http://www.smartpctools.com/portable_email/

Friday, September 01, 2006

Talos - Security LiveCD

Talos - Security LiveCD
Talos is a security LiveCD, based on SLAX 5.1.0 with over 90 security tools preinstalled. It runs directly from the CD without the need to install on the harddisk. Talos is currently on BETA version 0.1 and its available to download. I would like your help since its on BETA version.
Link http://www.isafe.gr/talos.html
Added by Dancho Danchev
01.09.2006

Database Hackers Handbook- Attacking Informix

Database Hackers Handbook- Attacking Informix
Informix: Discovery, Attack, and Defense.
File DatabaseHackersHandbook-AttackingInformix.pdf
Filesize 206.667 KB
MD5 checksum 8016df3d3d2c0d5685ba2c6954434a94
Added by Dancho Danchev
Homepage http://www.ngssoftware.com/
01.09.2006

Browzar - Your private window on the Web

Browzar - Your private window on the Web
With Browzar you can search and surf the web without leaving any visible trace on the computer you are using. Browzar is free, it only takes seconds to download and you don’t even need to install it, so you can download Browzar time and time again,
Link http://www.browzar.com/
Added by Dancho Danchev
01.09.2006

Detecting Hardware Assisted Hypervisor's

Detecting Hardware Assisted Hypervisor's
So one side of the fence is screaming about how a hardware assisted hypervisor rootkits are 100% undetectable, and the other side is yelling back saying thats totally wrong and timing attacks against it are trivial. This of course can be countered saying that an HV can trick timing attacks by modifying a VCPU's TSC_OFFSET value and an external clock would be required to measure time skew which may or may not be conclusive that there is something malicous going on.
Link http://rootkit.com/newsread.php?newsid=548
Added by Dancho Danchev
01.09.2006

Gmail Filesystem - a Mountable Linux Filesystem Using your Gmail

Gmail Filesystem - a Mountable Linux Filesystem Using your Gmail
Gmail Filesystem provides a mountable Linux filesystem which uses your Gmail account as its storage medium. Gmail Filesystem is a Python application and uses the FUSE userland filesystem infrastructure to help provide the filesystem, and libgmail to communicate with Gmail. GmailFS supports most file operations such as read, write, open, close, stat, symlink, link, unlink, truncate and rename. This means that you can use all your favourite unix command line tools to operate on files stored on Gmail (e.g. cp, ls, mv, rm, ln, grep etc. etc.).
Link http://richard.jones.name/google-hacks/gmail-filesystem/gmail-filesystem.html
Added by Dancho Danchev
01.09.2006

Email Cloaker for Web

Email Cloaker for Web
Simple utility generates code that cloaks e-mail addresses in HTML and prevents them from being harvested by spam spiders.
Link http://cloaker.xinbox.com/
Added by Dancho Danchev
01.09.2006

Foundstone's Video Blog - Live from Las Vegas!

Foundstone's Video Blog - Live from Las Vegas!
Join us at BlackHat 2006 to view informal interview from some of the top names in security. Chris Wysopal, Weld Pond from the hacker think tank l0pht, that went on to form @stake talks about the days when security research was non-commercial and the current state of the security industry. Dinis Cruz, leader of the OWASP.NET project joins us to talk about .NET, web security tools, the future of OWASP, and Open Source Software.
Link http://www.foundstone.com/resources/vblog/index.htm
Added by Dancho Danchev
01.09.2006

Steal This Film - Documentary about File Sharing

Steal This Film - Documentary about File Sharing
"Steal This Film is the first part of a free documentary series about file-sharing. This part focuses on The Pirate Bay, and copyfighters Piratbyran.
Link http://www.stealthisfilm.com/
Added by Dancho Danchev
Homepage http://slashdot.org/articles/06/08/28/116239.shtml
01.09.2006