-->
#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
Security Service Edge

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Blackhole Exploit Kit attack on WampServer & Wordpress sites

Blackhole Exploit Kit attack on WampServer & Wordpress sites

Nov 02, 2011
Blackhole Exploit Kit attack on WampServer & Wordpress sites Kimberly from  Stopmalvertising  found Blackhole Exploit Kit on Website of most popular Webserver software site WAMPSERVER . Almost at the bottom of the webpage they notice a Javascript requesting a file from jquery.googlecode.com . The URL is followed by a long string of parameters. The file  returns a 404, it’s just there to fool people. Once the script decoded we obtain an iframe leading to vc-business.com/in.php .According to Analyse of Kimberly , If a vulnerable Java, Windows Media Player, Flash or Adobe Reader version is detected, the visitor will be redirected to 91.194.214.66/dng311011/c7a44076f6c722eb74725563b0a000a0/spl.php and from there to 30domaaaam.in/main.php?page=c76874df55550a3f . According to Norton Safe Web , 91.194.214.66 has been caught in distributing the ZeroAccess rootkit. Second Recent Attack by Blackhole Exploit discovered in  thousands of WordPre...
Windows Kernel Zero Day Vulnerability Found in Duqu Installer

Windows Kernel Zero Day Vulnerability Found in Duqu Installer

Nov 01, 2011
Windows Kernel Zero Day Vulnerability Found in Duqu Installer Duqu malware attack exploited a zero-day vulnerability in the Windows kernel, according to security researchers tracking the Stuxnet-like cyber-surveillance Trojan. The vulnerability has since been reported to Microsoft and Microsoft is working on a fix for the kernel vulnerability right now. Researchers at the Laboratory of Cryptography and System Security (CrySyS) in Hungary confirmed the existence of the zero-day vulnerability and exploit in a brief note posted to its web site. Our lab, the Laboratory of Cryptography and System Security (CrySyS) pursued the analysis of the Duqu malware and as a result of our investigation, we identified a dropper file with an MS 0-day kernel exploit inside. We immediately provided competent organizations with the necessary information such that they can take appropriate steps for the protection of the users. The installer file is a Microsoft Word document (.doc) that exploits...
Virtual Machine for Android Reverse Engineering (A.R.E) Released

Virtual Machine for Android Reverse Engineering (A.R.E) Released

Nov 01, 2011
Virtual Machine for Android Reverse Engineering (A.R.E) Released The Honeynet Project release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox. Tools currently found on A.R.E. are: Androguard Android sdk/ndk APKInspector Apktool Axmlprinter Ded Dex2jar DroidBox Jad Smali/Baksmali Download A.R.E
cyber security

AI Security Board Report Template

websiteWizAI Security / Compliance
This template helps security and technology leaders clearly communicate AI risk, impact, and priorities in language boards understand.
cyber security

AI Security Isn’t Optional—Join the Conversation at SANS Security West

websiteSANSCybersecurity Training
SANS Fellow, Eric Johnson addresses emerging risks and tactical responses.
The Hacker News (THN) 1st Anniversary Celebration

The Hacker News (THN) 1st Anniversary Celebration

Nov 01, 2011
The Hacker News (THN) 1st Anniversary Celebration It has been a wonderful “HACK” filled year as we disseminated security and hacking information around the world. We are grateful for our loyal readership and welcome new readers and contributors. Let’s face it. Hacking isn’t going away and growing security concerns are an issue we all need to stay on top of. Being informed about the latest and newest in security measures and the work of hackers to break into these means is a global issue with tremendous consequences. Hacking and security violations affect us all. Not only big corporations which store your information but the health and welfare of your personal PC’s. The Hacker news has tracked the events of the last year and we are amazed and the talent and finesse of techy people who can break into the most complicated and sophisticated systems. You can depend on us for breaking news in the area of computer security. Keep reading and keep checking our daily web news. In c...
Facebook "Trusted friends" Security Feature Easily Exploitable

Facebook "Trusted friends" Security Feature Easily Exploitable

Oct 31, 2011
Facebook " Trusted friends " Security Feature Easily  Exploitable Last week Facebook announced that in one day 600,000 accounts possibly get hacked. Another possible solution for Facebook to combat security issues is to find 3 to 5 " Trusted friends ". Facebook will be adding two new security features that will allow users to regain control of their account if it gets hijacked. In Facebook's case, the keys are codes, and the user can choose from three to five " Trusted friends " who are then provided with a code. If you ever get locked out of your account (and you can't access your email to follow the link after resetting your Facebook password), you gather all the codes and use them to gain access to it again. Yet This method is used by hackers to hack most of the Facebook account using little bit of Social Engineering from last 5-6 Months according to me. Let us know, how this works... How its Exploitable: This Exploit is 90% Successful on...
Volatility 2.0 - Advanced Memory Forensics [With Video Demonstration]

Volatility 2.0 - Advanced Memory Forensics [With Video Demonstration]

Oct 30, 2011
Volatility 2.0 - Advanced Memory Forensics [With Video Demonstration] The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research. The Volatility Framework demonstrates our committment to and belief in the importance of open source digital investigation tools . Volatile Systems is committed to the belief that the technical procedures used to extract digital evidence should be open to peer analysis and review. We also believe this is in the best i...
Duqu Trojan found in Indian Server

Duqu Trojan found in Indian Server

Oct 30, 2011
Duqu Trojan found in Indian Server Last week we update you about Duqu when Symantec said it had found a mysterious computer virus that contained code similar to Stuxnet, a piece of malware believed to have wreaked havoc on Iran's nuclear program. Two workers at a web-hosting company called Web Werks told Reuters that officials from India's Department of Information Technology last week took several hard drives and other components from a server that security firm Symantec Corp told them was communicating with computers infected with Duqu. The equipment seized from Web Werks, a privately held company in Mumbai with about 200 employees, might hold valuable data to help investigators determine who built Duqu and how it can be used. But putting the pieces together is a long and difficult process, experts said. " This one is challenging ," said Marty Edwards, director of the US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response...
Torsocks 1.2 Released - Socks friendly ssh and irssi with Tor

Torsocks 1.2 Released - Socks friendly ssh and irssi with Tor

Oct 30, 2011
Torsocks 1.2 Released - Socks friendly ssh and irssi with Tor Torsocks is an application for Linux, BSD and Mac OSX that allows you to use network applications such as ssh and irssi with Tor. Torsocks allows you to use most socks-friendly applications in a safe way with Tor. It ensures that DNS requests are handled safely and explicitly rejects UDP traffic from the application you're using. Enhancements unique to torsocks Torifying reverse dns requests through gethostbyaddr() Blocking of UDP traffic from sendto() and its variants. Use of Tor-friendly defaults if no configuration file available. The addition of all RFC defined private address ranges to the default configuration How to Use TorScocks , Read Here Torsocks allows you to use most socks-friendly applications in a safe way with Tor. Once you have installed torsocks, just launch it like so: usewithtor [application] So, for example you can use ssh to a some.ssh.com by doing: usewithtor ssh username@some.ssh.com or...
Anonymous hackers threatening a Mexican drug cartel

Anonymous hackers threatening a Mexican drug cartel

Oct 30, 2011
Anonymous hackers threatening a Mexican drug cartel Anonymous Mexico is going head-to-head with one of the most dangerous criminal organizations in the world, the Mexican cartel Los Zetas. With this Anonymous Proofs that they are not just a common Internet users as cowards behind a keyboard. Not only has the Anonymous threatened to reveal names, but it has also started making good to its threats. Mexican Anonymous hackers is warning a Mexican drug cartel to release one of its members, kidnapped from a street protest, or it will publish the identities and addresses of the syndicate's associates, from corrupt police to taxi drivers, as well as reveal the syndicates' businesses. The website of a Mexican politician suspected of connections to the cartel and The page is still defaced as we write; here is what it looks like (“ es Zeta ” meaning “ is Zeta ”): " You made a huge mistake by taking one of us. Release him, " says a masked man in a video posted online on ...
How Facebook Ticker exposing your information and behavior without your knowledge

How Facebook Ticker exposing your information and behavior without your knowledge

Oct 28, 2011
How Facebook Ticker  exposing your information and behavior without your knowledge Nelson Novaes Neto , a Brazilian (independent) Security and Behavior Research have  analyze  a privacy issue in Facebook  Ticker  that allows any person chasing you without your knowledge or consent . He explain that this is not a code vulnerability, but here the whole issue is related to users privacy. Nelson said on his blog " This tool - monitor others began to run when it introduced a new feature called Ticker. This new feature (Ticker) does not respect the privacy settings and it now Comments (updates), add friends, likes and can be seen by others (friend *) anyone without your permission. * You really know a friend tell me if it is real or fake profile - cloned? " Nelson Give Proof of Concept with a very creative real life scenario. Check out a live demonstration, where a "novel" explains how the issue of privacy (you can use any browser to play it). Descri...
Most advanced and dangerous malware for Apple products - why you should be concerned !

Most advanced and dangerous malware for Apple products - why you should be concerned !

Oct 28, 2011
Most advanced and dangerous malware for Apple products - Why you should be concerned ! Indian security researcher from MalCon has created an advanced and dangerous malware for Apple products which can not only compromize your privacy but also steal important data and let hackers control your device by simple text messages. If you are using any Apple product such as iPhone, iPad or iPod, then you shuuld be concerned. Indian security researcher from MalCon , Atul Alex has created an advanced malware for the Apple products which can not only intercept calls of users, steal data, but also provide a reverse VNC to see remotely all the actions of the victim. The malware can be deployed remotely over the web and is supposed to work on the latest iOS 5. Atul Alex, Technical director of MalCon said " Apple products are extremely secure by design. The malware works on jailbroken devices - something which over 90% of users have. If your device is not jailbroken, you have nothing to w...
TeaMp0isoN releases list of vulnerable police web sites

TeaMp0isoN releases list of vulnerable police web sites

Oct 28, 2011
TeaMp0isoN releases list of vulnerable police web sites TeaMp0isoN group of hackers published a list of vulnerable law enforcement authorities websites that can be hacked using MSAccess SQL injection attacks. Member from TeaMp0isoN with codename " _f0rsaken " create a pastebin note with following message for Police and People of World : I do not like the Police. You beat on innocent and peaceful protestors for no reason other than that you want to protect your friends at the banks and yourselves to make money. It's all about money and the Police aiming to keep their job. Why did I decide on not releasing the databases? I want you to see for yourself how vulnerable these people really are and for you all to get an understanding on why I didn't release. In this release I present you vulnerable websites that are open to MSAccess SQL injection. Below are official city websites that also the Police of that said area uses for their updates. Of course with all the mone...
Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Tor 0.2.2.34 Released with fixes of anonymity vulnerability

Oct 28, 2011
Tor 0.2.2.34 Released with fixes of anonymity vulnerability Tor 0.2.2.34 fixes a critical anonymity vulnerability where an attacker can de-anonymize Tor users. Everybody should upgrade. Clients should upgrade so they are no longer recognizable by the TLS certs they present. Relays should upgrade so they no longer allow a remote attacker to probe them to test whether unpatched clients are currently connected to them.This release also fixes several vulnerabilities that allow an attacker to enumerate bridge relays. Some bridge enumeration attacks still remain. Download Here
Malware for xbox Kinect created by 15 years old Indian researchers

Malware for xbox Kinect created by 15 years old Indian researchers

Oct 28, 2011
Malware for xbox Kinect created by 15 years old  Indian researchers Indian researchers from MalCon have created a malware that utlizes Microsoft Kinect to secretly capture pictures and upload to a picasa account. A 15year old Indian security researcher ' Shantanu Gawde ' from MalCon Research has created a malware that utilizes the Microsoft xbox kinect controller. Kinect for Xbox 360, or simply Kinect, is a motion sensing input device by Microsoft for the Xbox 360 video game console. With over 10 million devices sold till date, the kinect holds the Guiness book for world record for the fastest selling consumer electronics device - and is exactly the reason why the malware is a concern. In recent months, there have been a number of innovative kinect hacks that make use of the kinect using both Open source drivers and the Kinect SDK. The malware, code-named 'gawde' after its creators name, works on Windows 7 to secretly capture pictures of the victim / surroundin...
Facebook EXE attachment Vulnerability can Compromise with Users Security

Facebook EXE attachment Vulnerability can Compromise with Users Security

Oct 28, 2011
Facebook EXE attachment Vulnerability can Compromise with Users Security Nathan Power from SecurityPentest has discovered new Facebook Vulnerability, that can easily attach EXE files in messages,cause possible User Credentials to be Compromised . When using the Facebook 'Messages' tab, there is a feature to attach a file. Using this feature normally, the site won't allow a user to attach an executable file. A bug was discovered to subvert this security mechanisms. Note, you do NOT have to be friends with the user to send them a message with an attachment. But Nathan Power Find the way to upload EXE . When uploading a file attachment to Facebook we captured the web browsers POST request being sent to the web server. Inside this POST request reads the line: Content-Disposition: form-data; name="attachment"; filename="cmd.exe" It was discovered the variable 'filename' was being parsed to determine if the file type is allowed or not. To s...
FOCA 3.0 - Network Infrastructure Mapping Tool Free Release

FOCA 3.0 - Network Infrastructure Mapping Tool Free Release

Oct 28, 2011
FOCA 3.0 - Network Infrastructure Mapping Tool Free Release This new version has new fresh look and feel, and it is full of new features that you will love to discover. If you want to learn more about FOCA, and Get FOCA 3 PRO, then you can book for a seat in the next online training about FOCA. It is going to be delivered on 4th of November in English and on 8th of November in Spanish. Both of them delivered by our FOCA father Chema Alonso. In FOCA 3 PRO you will discover features focused in discovering vulnerabilities in web sites, which are completely new. If you booked for an online seminar about FOCA PRO in 2011 then you can get a seat with 50% OFF.Also, we would like to remember you that we created MetaShield Protector as a solution to filter metadata in published documents through Windows Server 2008 / 2008 R2, IIS 7.0 / 7.5 and SharePoint 2007, Windows SharePoint Services and SharePoint 2010. More info . After six months we got FOCA 3 FREE available for direct download ....
US satellites was victim by Chinese Hackers

US satellites was victim by Chinese Hackers

Oct 28, 2011
US satellites was victim by Chinese Hackers Computer hackers, possibly from the Chinese military, interfered with two U.S. government satellites four times in 2007 and 2008 through a ground station in Norway, according to a congressional commission. According to Bloomberg , the Chinese military is suspected of executing the digital intrusions which targeted satellites used for earth climate and terrain observation. Indeed, a Landsat-7 earth observation satellite system experienced 12 or more minutes of interference in October 2007 and July 2008, while hackers tapped into a Terra AM-1 earth observation satellite twice, for two minutes in June 2008 and nine minutes in October that year. Interestingly enough, the report doesn't actually accuse the Chinese government of sponsoring or executing the four attacks. 

 However, it clearly states that the breaches are "consistent" with Beijing's military doctrine which advocates disabling an enemy's space systems, and ...
Anonymous DDOS Oakland police site after violence

Anonymous DDOS Oakland police site after violence

Oct 28, 2011
Anonymous DDOS Oakland police site after violence Cyber activists associated with Anonymous have targeted the Oakland Police Department (OPD) and other law enforcement agencies that participated in a controversial crackdown against OccupyOakland protestors. A DDOS (distributed denial-of-service) attack against the department's website www.oaklandpolice.com is underway, and the website currently is unreachable. AnonyOps tweet " I'm amazed and proud of #occupyOakland protesters who stood defiant, peaceful in the face of lethal force by Oakland PD. " Police fired a number of tear gas canisters, concussion grenades, rubber bullets and non-lethal rounds at demonstrators on Tuesday night, drawing widespread condemnation for the use of heavy-handed tactics against unarmed civilians. The attack was first announced via Anonymous' AnonOps Twitter feed. " @Anon_Central : Admin/User/Password Dump of oaklandnet.com Problem Oakland authorities? F--- you! >> p...
How to Beat Evil Governments When Your Internet Turned Off ?

How to Beat Evil Governments When Your Internet Turned Off ?

Oct 28, 2011
How to Beat Evil Governments When Your Internet Turned Off ? Bruce Sutherland explain at DefCon 19 Conference that " How To Get Your Message Out When Your Government Turns Off The Internet " . Bruce Sutherland  is a network systems architect and software developer with Domex Computer Services Inc, based in Melbourne Beach, FL. How would you communicate with the world if your government turned off the Internet? Sound far-fetched? It isn't. It already happened in Egypt and Lybia and the US Congress is working on laws that would allow it to do the same. In this talk we'll explore how to get short messages out of the country via Email and Twitter in the event of a national Internet outage. Remember, data wants to be free. Bruce has worked in the industry for over 20 years and has recently been working on building and hardening web-based applications. He has been an amateur radio operator since 2003 and enjoys making contacts worldwide via amateur radio satellite ...
India's leading telecom Company BSNL hacked by Pakistani Hacker

India's leading telecom Company BSNL hacked by Pakistani Hacker

Oct 26, 2011
India's leading telecom Company  BSNL hacked by Pakistani Hacker A Pakistani hacker "KhantastiC haX0r" today hack into the official website of India's leading telecom Company Bharat Sanchar Nigam Limited (BSNL) . This is not 1st time when BSNL become victim of any cyber attack. Pakistani Hackers hit Indian Corporate and National Government Websites, Servers time by time Just for FUN or so called Cyber War b/w these two countries. This year 2011, Attack/ defacement are less than the records of previous years. Most of the hacking groups from India now become White hat hackers and working for Cyber Security Awareness and Development. We wish same for all Pakistani hackers to start working for Security and Development. Anyway, The Hacker domain is  http://bsnl.co.in/tender1/  .
The Hacker News (THN) wishes its readers a very Happy Diwali

The Hacker News (THN) wishes its readers a very Happy Diwali

Oct 26, 2011
The Hacker News (THN) wishes its readers a very Happy Diwali To Readers,                     On this auspicious occasion of Diwali, all of us here at THN would like to wish you a very Happy Diwali and a wonderful year ahead ! We hope the lights of the season andthe festivities bring you and your family tons of joy and good luck. A festival full of sweet childhood memories,sky full of fireworks, mouth full of sweets, house full of diyas and heart full of joy. The word Diwali means " Rows of lighted lamps " , Known as the Festival of Lights, Diwali holds significance to the Hindu, Sikh and Jain religions and is a public holiday in India.We should pledge that we will make an all-out endeavour to make Diwali 2011 a pollution-free festival. The Hacker News has evolved to work closely with and within the cyber security communities in an effort to make the internet more secure. THN is dedicated to making your learning a valu...
Latest Security Flaw in Skype Enables IP address & Location Tracking

Latest Security Flaw in Skype Enables IP address & Location Tracking

Oct 25, 2011
Latest Security Flaw in Skype Enables IP address & Location Tracking The serious breach in the widely-used, internet video chat program means that any evil computer nerd could easily hunt down users' whereabouts, according to a study co-authored by an NYU-Poly professor. The flaw in Skype could allow a skilled hacker to find out the IP address from which a user has logged in to Skype, thereby determining the location of Skype users, which is a massive breach of privacy and security. The company is trying to downplay the flaw, claiming that the ability to derive IP addresses was common with all web based communication clients. The flaw can reportedly be exploited without the user’s knowledge, and can be executed on a massive scale. The reserch team demonstrated this by scheduling hourly calls to tens of thousands of Skype users. Adrian Asher, Skype's chief information security officer, said that IP addresses are easily uncovered in most web communications clients....
Japan under Heavy Cyber Attack !

Japan under Heavy Cyber Attack !

Oct 25, 2011
Japan under Heavy Cyber Attack ! In last two days several Cyber attacks breach corporate and National Security of Japan. First, Japanese parliament hit by cyber attack from China according to Report. A server located in China was used for the attack on the Japanese Lower House. This led to an extraordinary meeting of a key subcommittee after it emerged that hackers had access to emails and documents belonging to the chamber's 480 legislators for at least one month. The personal computers and servers of Japanese lower house lawmakers have been hit by a cyber attack, and passwords and user IDs may have been stolen. Next, Information on military aircraft and nuclear power plants may have been stolen in a series of cyberattacks on Japanese defence contractor Mitsubishi Heavy. Mitsubishi Heavy said late last month that 83 computers at 11 of its facilities had been hit by cyberattacks but no leakage of information on products and technologies had been confirmed. Christo...
The Hacker’s Choice releases SSL DOS Tool

The Hacker’s Choice releases SSL DOS Tool

Oct 24, 2011
The Hacker’s Choice releases SSL DOS Tool German hacker group “The Hacker’s Choice” officially released a new DDoS tool. The tool exploits a weakness in SSL to kick a server off the Internet. Establishing a secure SSL connection requires 15x more processingpower on the server than on the client.THC-SSL-DOS exploits this asymmetric property by overloading theserver and knocking it off the Internet.This problem affects all SSL implementations today. The vendors are awareof this problem since 2003 and the topic has been widely discussed.This attack further exploits the SSL secure Renegotiation featureto trigger thousands of renegotiations via single TCP connection. Download: Windows binary: thc-ssl-dos-1.4-win-bin.zip Unix Source : thc-ssl-dos-1.4.tar.gz Usage: Use " ./configure; make all install " to build and Run :  ./thc-ssl-dos 127.3.133.7 443 Tips & Tricks for whitehats 1. The average server can do 300 handshakes per second. This would require 10-25% of your lapt...
Tor anonymizing network Compromised by French researchers

Tor anonymizing network Compromised by French researchers

Oct 24, 2011
Tor anonymizing network Compromised by French researchers French researchers from ESIEA , a French engineering school, have found and exploited some serious vulnerabilities in the TOR network. They performed an inventory of the network, finding 6,000 machines, many of whose IPs are accessible publicly and directly with the system’s source code. They demonstrated that it is possible to take control of the network and read all the messages that circulate. But there are also hidden nodes, the Tor Bridges, which are provided by the system that in some cases. Researchers have developed a script that, once again, to identify them. They found 181. " We now have a complete picture of the topography of Tor ," said Eric Filiol. The specific attack involves creating a virus and using it to infect such vulnerable systems in a laboratory environment, and thus decrypting traffic passing through them again via an unknown, unmentioned mechanism. Finally, traffic is redirected towards ...
Bleeding Life 2 Exploit Pack Released

Bleeding Life 2 Exploit Pack Released

Oct 24, 2011
Bleeding Life 2 Exploit Pack Released Black Hat Academy releases Bleeding Life 2 exploit pack. This is an exploit pack that affects Windows-based web browsers via Adobe and Java. You can read all about it, and download it for yourself. Statistics are kept based on exploit, browser, and OS version. Exploits Adobe CVE-2008-2992 CVE-2010-1297 CVE-2010-2884 CVE-2010-0188 Java CVE-2010-0842 CVE-2010-3552 Signed Applet Features Advanced Statistical Information Stylish Progress Bars Full User-Friendly Admin Panel Referer Stats Secure Panel - Login/Logout Ability To Set and Save Passwords On Panel Ability To Allow Guest Access - Guest Can Only View Stats Page, Clicking and Other Pages Disabled. Ability To Add and/or Remove Exploits Used Ability To Add Scan4You Credentials For Built-In Scanner Use Ability To Filter Browsers Ability To Filter Operating Systems Attempt To Detect and Filter HTTP Proxies Ability To Blacklist by IP/Range Ability To Import Blacklist On Pan...
Microsoft’s official Youtube channel hacked

Microsoft’s official Youtube channel hacked

Oct 24, 2011
Microsoft ’s official Youtube channel hacked It appears that someone has hacked into Microsoft’s account on Youtube and removed all videos. As can be seen in the picture, there are currently no videos at all anymore (see the red arrow in the screenshot) and the comment about the website is not “ Wish to Become Sponsored ? Message me ”. Also the hometown has been changed to “Hey”. In their place are short clips soliciting advertisers, not surprisingly, as the channel has some 24,000+ subscribers.As of 1:30 p.m. ET, four videos have been uploaded to the account, all time-stamped within the past two hours. A fifth video, most recently uploaded, seems to have been removed. The video, “Garry’s Mod – Escape the Box,” featured what appeared to be an animated gunman shooting at the inside of a construction box.The channel’s description reads, “ I DID NOTHING WRONG I SIMPLY SIGNED INTO MY ACCOUNT THAT I MADE IN 2006 :/. ” Neither Microsoft nor Google (which owns YouTube) have disclosed info...
XSS Vulnerability in Interactive YouTube API Demo Beta

XSS Vulnerability in Interactive YouTube API Demo Beta

Oct 23, 2011
XSS Vulnerability in Interactive YouTube API Demo Beta There is a Critical Cross site XSS Vulnerability in Interactive YouTube API Demo Beta, Discovered by various sources. One of the White Hat Hacker " Vansh Sharma " Inform us about this XSS Vulnerability with proof of concept. Proof Of Concept : Open  http://gdata.youtube.com/ Enter script <img src="<img src=search"/onerror=alert("xss")//"> in the keyword area. Press ADD
Apache Server  2.3.14 Denial of Service (DDOS) Vulnerability exploit

Apache Server 2.3.14 Denial of Service (DDOS) Vulnerability exploit

Oct 23, 2011
Apache Server  2.3.14  Denial of Service (DDOS) Vulnerability exploit Latest version of Apache Server 2.3.14 fails.The Egyptian Hacker and Exploit writer " Xen0n " discovered this Vulnerability and Develop an perl exploit for (DDOS) Vulnerability. The Exploit is available on Inj3ct0r 's Website.
OpenVAS - Advanced Open Source vulnerability scanner

OpenVAS - Advanced Open Source vulnerability scanner

Oct 23, 2011
OpenVAS - Advanced Open Source vulnerability scanner OpenVAS is a framework of several services and tools offering a comprehensive and powerful vulnerability scanning and vulnerability management solution.The powerful and comprehensive OpenVAS solution is available as Free Software and maintained on a daily basis. An overview of the vulnerability handling process is: The reporter reports the vulnerability privately to OpenVAS. The appropriate component's developers works privately with the reporter to resolve the vulnerability. A new release of the OpenVAS component concerned is made that includes the fix. The OpenVAS Manager is the central service that consolidates plain vulnerability scanning into a full vulnerability management solution. The Manager controls the Scanner via OTP (OpenVAS Transfer Protocol) and itself offers the XML-based, stateless OpenVAS Management Protocol (OMP). All intelligence is implemented in the Manager so that it is possible to implement variou...
Expert Insights Articles Videos
Cybersecurity Resources