Sign in or Join FriendFeed
FriendFeed is the easiest way to share online. Learn more »
exploit

exploit

rooms for exploits
Blog
Peter Dawson
Fwd: How to pry your file out of the FBI’s grasp - http://grahamcluley.com/2013... (via http://friendfeed.com/hackern...)
Fwd: How to pry your file out of the FBI’s grasp - http://grahamcluley.com/2013/11/pry-file-fbi-grasp-ryan-shapiro/?utm_source=rss&utm_medium=rss&utm_campaign=pry-file-fbi-grasp-ryan-shapiro (via http://ff.im/1g7D1w)
Peter Dawson
INETCECPT <= whats this ??
has any heard of this term or software service ?? - Peter Dawson
Peter Dawson
HoneyMap Offers Real-Time Glimpse of Cyber Attacks as They Happen - http://betabeat.com/2012... (via http://friendfeed.com/shareme...)
Peter Dawson
FLAME => browsed thru an excellent article fr - Laboratory of Cryptography and System Security
flame.jpg
Show all
Peter Dawson
Fwd: On finding solutions on cyberwar's !! Here's a good response from THOR ! (via http://friendfeed.com/slashpd...)
Peter Dawson
Flame = LookingGlass+EnDGame
Peter Dawson
Fwd: Ever wanted to know how secure a Linux password file, with hashed passwords using SHA-512 and salt, us? I think this is a good answer: http://security.stackexchange.com/questio... Pretty damn secure. - http://itmanager.blogs.com/notes... (via http://friendfeed.com/itblogg...)
Peter Dawson
Excellent Resource on bit hacking :)- Bit Twiddling Hacks - http://www.graphics.stanford.edu/~seande...
Peter Dawson
Who's Behind the Koobface Botnet? - An OSINT Analysis http://ddanchev.blogspot.com/2012...
Peter Dawson
SANS AppSec Summit being held in Las Vegas, Nevada on April 30 - May 1, 2012.
Peter Dawson
need to try this :)- Printer pass-back-attack http://www.foofus.net/~percX...
Peter Dawson
Peter Dawson
Peter Dawson
The tool exploits a weakness in SSL to kick a server off the Internet. http://www.thc.org/thc-ssl-dos
Peter Dawson
Peter Dawson
"Tracking Performance of Software Security Assurance – 5 Essential KPIs" - http://h30499.www3.hp.com/t5... (via http://friendfeed.com/hackern...)
Peter Dawson
Fwd: Multiple security issues have been discovered in Puppet, a centralized configuration management system. (via http://friendfeed.com/slashpd...)
Peter Dawson
Peter Dawson
Fwd: Malicious QR codes - anyone with pointers/ casestudy on these vectors. pls DM me ! (via http://ff.im/J9Lp7)
Peter Dawson
Hacking IPv6 Networks" // Paris 2011 Conference http://www.hackingipv6networks.com/past-tr...
Key West
Cracked digital certificates endanger 'web of trust' - http://www.msnbc.msn.com/id...
Cracked digital certificates endanger 'web of trust'
One stolen Google website authentication certificate would have been reason enough for Web users to worry, but it turns out last week's security breach at the Dutch certificate authority DigiNotar is far more damaging than first thought, and could signal a new and extremely dangerous cyber crime threat. On Aug. 30, the news broke that a hacker calling himself "Comodohacker" made off with a Google authentication certificate on July 19, which allowed him to set up fraudulent Web pages under a legitimate Google domain name and harvest the personal information of anyone who visited his spoofed sites. A bit of background on authentication certificates: DigiNotar, like all certificate authorities, issues digital Secure Sockets Layer (SSL) certificates of trust to websites that authenticate themselves to browsers, which is necessary to establish a secure, HTTPS connection. Every time you start a secure session online, your computer gets a digital certificate from that site authenticating... more... - Key West from Bookmarklet
Key West
Operation Black Tulip: Fox-IT’s report on the DigiNotar breach. - http://nakedsecurity.sophos.com/2011...
Operation Black Tulip: Fox-IT’s report on the DigiNotar breach.
Fox-IT analyzed the lookups against DigiNotar's OCSP servers (which browsers check to see if a certificate has been revoked) and determined that during the active attack period more than 99% of queries originated in Iran. This is the most solid evidence yet that these certificates may have been used by the Iranian government or ISPs to spy on private communications of Iranian internet users. Many of the other requests not originating from Iran appear to have originated via Tor exit nodes or other proxies used by Iranians to avoid censorship. This indicates that the method used to perform the man-in-the-middle attacks with these certificates likely depended on DNS poisoning at the ISPs. While some folks are complaining that too much fuss is being made over this attack, it is far more important than many other stories that the security press have been obsessed with over the last two years. This incident demonstrates in a real way the fragility of the SSL/TLS certificate trust model in... more... - Key West from Bookmarklet
Peter Dawson
hundreds of Chinese proxies on port 8909 started showing up every day on public proxy lists. In August the daily numbers were in the thousands. Here is the list collected during that period. There are >135K proxies in this file (text, tab delimited, ~8 megs). http://www.mrhinkydink.com/utmods...
Peter Dawson
84. 85.openssl verify -verbose -CApath /etc/ssl/certs/ -CAfile /etc/ssl/certs/DigiNotar_Root_CA.pem -CAfile inter.crt -purpose any google.com.crt - Peter Dawson
darknet is now reporting http://friendfeed.com/hackern... - Peter Dawson
Peter Dawson
Fwd: Looking for e.g on crossbound DDoS attacks initiated by botted hosts (via http://ff.im/JTHx6)
Peter Dawson
Excellent Edition for Aug !! Kudo's to Clubhack.com http://chmag.in/issue...
Peter Dawson
Mobile Hack
A German technology researcher on Wednesday showed global mobile makers and technology firms how General Packet Radio Service can easily be tapped, intercepted, and decrypted with an average mobile phone and a few applications. According to the New York Times, Karsten Nohl, a computer engineer and mobile security researcher, demonstrated to fellow researchers gathered to attend Chaos Communication Camp, a Berlin-based hackers event, how to intercept the voice or data messages sent between mobile devices over GPRS easily, owing to weak protection provided by mobile network carriers for data information. Nohl, in collaboration with his colleague Luca Melette, tapped the information within a radius of five kilometers using a seven-year-old inexpensive mobile phone from Motorola." http://mobile.slashdot.org/story... http://www.nytimes.com/2011... - Peter Dawson
Peter Dawson
Fwd: hackers hit hong kong stock exchange, halting some trading - http://www.paranoidprose.com/2011... (via http://ff.im/JzjCw)
Peter Dawson
Peter Dawson
Other ways to read this feed:Feed readerFacebook