#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

Ravan : A Distributed Hash Brute Forcer !

Ravan : A Distributed Hash Brute Forcer !

Dec 01, 2010
A short post for  Ravan  this time. It is a JavaScript based Distributed Computing system that can perform brute force attacks on salted hashes by distributing the task across several browsers. Salted and plain versions of the following hashing algorithms are currently supported: MD5 SHA1 SHA256 SHA512 How to use ? Using Ravan is very simple, just follow these steps: Go to  https://www.andlabs.org/tools/ravan.html Enter the value of the hash that must be cracked Enter the value of the salt, if it is not a salted hash then leave it blank Enter the charset. Only these characters will be use in the brute force attack Select the hashing algorithm (MD5, SHA1, SHA256, SHA512) Select the position of the salt. (clear-text+salt or salt+clear-text) Hit ' Submit Hash '. If hash is successfully submitted it would return a URL. Send this URL to all the workers and get them to click 'start' on that page. Keep the main page open without reloading till the hash is cracked. That is all!
HTTPS Everywhere : Another Tool to Protect from Firesheep !

HTTPS Everywhere : Another Tool to Protect from Firesheep !

Dec 01, 2010
HTTPS Everywhere  is a Firefox extension produced as a collaboration between The Tor Project and the Electronic Frontier Foundation. It encrypts your communications with a number of major websites. The EFF launched a new version of HTTPS Everywhere, a security tool that offers enhanced protection for Firefox browser users against Firesheep and other exploits of webpage security flaws. HTTPS secures web browsing by encrypting both requests from your browser to websites and the resulting pages that are displayed. Without HTTPS, your online reading habits and activities are vulnerable to eavesdropping, and your accounts are vulnerable to hijacking. Unfortunately, while many sites on the web offer some limited support for HTTPS, it is often difficult to use. Websites may default to using the unencrypted, and therefore vulnerable, HTTP protocol or may fill HTTPS pages with insecure HTTP references. EFF's HTTPS Everywhere tool uses carefully crafted rules to switch sites from HTTP to HTTPS.
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
25 websites hacked by $g$ n00ber

25 websites hacked by $g$ n00ber

Dec 01, 2010
25 websites hacked by $g$ n00ber Links : https://www.xschaoyue.com/n00ber.htm https://www.xiangchengtex.com/n00ber.htm https://www.51edd.com/n00ber.htm https://www.stonemessage.com/n00ber.htm https://www.danszx.com/n00ber.htm https://www.dmc100szx.com/n00ber.htm https://www.kchong.net/n00ber.htm https://www.stscw.com/n00ber.htm https://www.stonebab.com/n00ber.htm https://www.hxty88.com/n00ber.htm https://bbs.kchong.net/n00ber.htm https://www.ewu-2.com/n00 https://www.yjwz.com/n00ber.htm https://www.weiyucn.com/n00ber.htm https://www.shenqid.com/n00ber.htm https://ybmach.com/n00ber.htm https://xsmsqy.com/n00ber.htm https://xschaoyue.com/n00ber.htm https://xiangchengtex.com/n00ber.htm https://mingchencn.com/n00ber.htm https://hzqscn.com/n00ber.htm https://hzmlsy.com/n00ber.htm https://ladwyy.com/n00ber.htm https://mail.weiyucn.com/n00ber.htm https://jxc.xschaoyue.com/n00ber.htm
cyber security

SaaS Security Buyers Guide

websiteAppOmniSaaS Security / Threat Detection
This guide captures the definitive criteria for choosing the right SaaS Security Posture Management (SSPM) vendor.
Wikileaks suffered with distributed denial of service (DDoS) attack !

Wikileaks suffered with distributed denial of service (DDoS) attack !

Dec 01, 2010
Wikileaks suffered with distributed denial of service (DDoS) attack ! Wikileaks suffered another distributed denial of service (DDoS) attack Tuesday morning, reports Fast Company.  This attack was much more intense than Sunday's but still did not come close to actually shutting down the site. A computer hacker known as " The Jester ," shocked officials when he claimed to be behind the cyber attack that disabled the WikiLeaks website Sunday morning, just before it released hundreds of thousands of classified U.S. embassy cables to the public. The Jester, an ex-soldier justified his hacking by accusing the website of " attempting to endanger the lives of our troops, 'other assets' & foreign relations. " The self-proclaimed " hacktivist for good " looked to the Web to continue combating terrorism and organizations that appear to back Islamic extremism after ending his military service. Cyber security expert Mikko Hypponen of F-Secure told CNN he believe
Cyber Crime : E-mail hacker fined £20,000

Cyber Crime : E-mail hacker fined £20,000

Dec 01, 2010
A hacker who posed as a university graduate to gain access to the e-mails of hundreds of unsuspecting students has been given a suspended prison sentence and ordered to pay more than £20,000 in costs and compensation. Daniel Woo, a 23-year-old Bulgarian national, was sentenced for offences under the Misuse of Computers Act on 25 November. Woo was arrested in November 2006 at the University of London's School of Oriental and African Studies after being spotted by IT staff investigating anomalies in the running of the computer network. He used various hacking techniques to break a number of students' passwords, thereby gaining access to their accounts. Woo then placed computer software known as 'Cain and Able' on a number of machines, which enabled him to collect further student passwords and gather traffic passing through the university's computer network. It was subsequently established that fraud had taken place on a number of the compromised pa
6 Indian websites Hacked By PAK COBRA'S

6 Indian websites Hacked By PAK COBRA'S

Dec 01, 2010
6 Indian websites Hacked By PAK COBRA'S Websites : https://theindianstylist.com/ https://nsskunnathoor.org/ https://luvkid.co.in/index.php https://cryptel.co.in/ https://adjacen.com/ https://actsinfo.biz/
Expert Insights
Cybersecurity Resources