#1 Trusted Cybersecurity News Platform Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News
Insider Risk Management

The Hacker News | #1 Trusted Cybersecurity News Site — Index Page

25 Year old UK Student hacker penetrated Facebook‎

25 Year old UK Student hacker penetrated Facebook‎

Aug 20, 2011
25 Year old UK Student hacker penetrated Facebook‎ A 25 year old Brit allegedly used "considerable technical expertise" to hack into Facebook's servers. The student, from York, faces five charges, including that he "made, adapted, supplied or offered to supply" a computer program to hack into a Facebook server, Westminster magistrates' court heard. Mangham, a resident of York, was arrested by the e-Crime Unit of the Metropolitan Police in June this year; and has been charged with five offences under the Computer Misuse Act. Mangham is currently on bail, and like all accused hackers has been prohibited from accessing anything even resembling a computer. " The court feels it will be safer if there was no access to the internet which will reduce the temptation for your son to go on to Facebook ," said Judge Evans. As per Facebook, no personal information had been compromised during the hacks attempted by Mangham. The social network also added that it had been
PDD - Packet Dump Decode Released

PDD - Packet Dump Decode Released

Aug 20, 2011
PDD - Packet Dump Decode Released PDD is an open-source program created by Srivats.Packet Dump Decode (pdd) is a simple convenient GUI wrapper around the Wireshark/Ethereal tools to convert packet hexdumps into well formatted xml containing the decoded protocols and protocol contents.You need to have Wireshark installed, because PDD is only a wrapper around Wireshark. Convert hexdumps to - Tree-View (within application) Pcap file and open with Wireshark/Ethereal Text description of packet contents XML description of packet contents Download
Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Navigating the Threat Landscape: Understanding Exposure Management, Pentesting, Red Teaming and RBVM

Apr 29, 2024Exposure Management / Attack Surface
It comes as no surprise that today's cyber threats are orders of magnitude more complex than those of the past. And the ever-evolving tactics that attackers use demand the adoption of better, more holistic and consolidated ways to meet this non-stop challenge. Security teams constantly look for ways to reduce risk while improving security posture, but many approaches offer piecemeal solutions – zeroing in on one particular element of the evolving threat landscape challenge – missing the forest for the trees.  In the last few years, Exposure Management has become known as a comprehensive way of reigning in the chaos, giving organizations a true fighting chance to reduce risk and improve posture. In this article I'll cover what Exposure Management is, how it stacks up against some alternative approaches and why building an Exposure Management program should be on  your 2024 to-do list. What is Exposure Management?  Exposure Management is the systematic identification, evaluation,
Cross Site Scripting Vulnerability at Google Appspot

Cross Site Scripting Vulnerability at Google Appspot

Aug 20, 2011
Cross Site Scripting Vulnerability at Google Appspot The Google Appspot " ClickDesk " login page is vulnerable to Cross Site Scripting attack. Cross Site scripting attack is a critical issue in web application. When an attacker gets a user's browser to execute his/her XSS code, the code will run within the security context (or zone) of the hosting web site. With this level of privilege, the code has the ability to read (keylogging), modify and transmit any sensitive data accessible by the browser. A Cross-site Scripted user could have his/her account hijacked (cookie theft), their browser redirected to another location, or possibly shown fraudulent content delivered by the web site they are visiting. The vulnerability can easily be amplified by publicly available tools like Cross Site Scripting framework (XSSF), Cross Site Scripting harvest perl (XSS-Harvest) and so on. Proof of concept: The following proof-of concept sample will do a HTTP POST to trigger the XSS vuln
cyber security

Want to Bolster Your CI/CD Pipeline?

websiteWizSecurity Auditing / Container Security
This cheat sheet covers best practices with actionable items in Infrastructure security, code security, secrets management, access and authentication, and monitoring and response.
Korean HSBC bank hacked TurkGuvenligi (TG)

Korean HSBC bank hacked TurkGuvenligi (TG)

Aug 20, 2011
Korean HSBC bank hacked TurkGuvenligi (TG) TurkGuvenligi (TG) Hacker Hack and deface the  Korean HSBC bank website. Mirror of Hack is also available here . Same hacker deface the Websites of Free Gary McKinnon Campaign last week.
Biggest ISP in Kuwait Qualitynet Side-Server Database Leaked

Biggest ISP in Kuwait Qualitynet Side-Server Database Leaked

Aug 20, 2011
Biggest ISP in Kuwait Qualitynet Side-Server Database Leaked AnonKuwait claim to hack the Biggest ISP in Kuwait " Qualitynet " and leaked  14MB of data in sql format  server-side database. Penetration of one of Qualitynet servers working for Ministry of Education having a database containing high school graduating students information. The server is moe.qualitynet.net . Hacker have hacked the whole server and extracted an SQL dump. Qualitynet is the biggest internet service provider in Kuwait. It owns a very big network connected to other countries in Middle East. Qualitynet shocked us all in InfoConnect exhibition when it increased the pricing of their services by 70% and it shocked us again by applying the unfair downstream cap policy. Qualitynet is one of the major factors in setting the decision of cap policy which angered people of Kuwait toward these unlawful unacceptable decisions. Qualitynet does not provide the perfect security so we encourage different organiz
THC-ipv6 Toolkit – Attacking the IPV6 Protocol

THC-ipv6 Toolkit – Attacking the IPV6 Protocol

Aug 19, 2011
THC-ipv6 Toolkit – Attacking the IPV6 Protocol A complete tool set to attack the inherent protocol weaknesses of IPV6 and ICMP6, and includes an easy to use packet factory library. Please note to get full access to all the available tools you need to develop IPV6 tools yourself or submit patches, tools and feedback to the thc-ipv6 project. Tools Included : parasite6: icmp neighbor solitication/advertisement spoofer, puts you as man-in-the-middle, same as ARP mitm (and parasite) alive6: an effective alive scanng, which will detect all systems listening to this address dnsdict6: parallized dns ipv6 dictionary bruteforcer fake_router6: announce yourself as a router on the network, with the highest priority redir6: redirect traffic to you intelligently (man-in-the-middle) with a clever icmp6 redirect spoofer toobig6: mtu decreaser with the same intelligence as redir6 detect-new-ip6: detect new ip6 devices which join the network, you can run a script to automatically scan t
BackTrack 5 R1 Released - Penetration Testing Distribution

BackTrack 5 R1 Released - Penetration Testing Distribution

Aug 19, 2011
BackTrack 5 R1 Released - Penetration Testing Distribution BackTrack is a Linux-based penetration testing arsenal that aids security professionals in the ability to perform assessments in a purely native environment dedicated to hacking. Regardless if you're making BackTrack your primary operating system, booting from a LiveDVD, or using your favorite thumbdrive, BackTrack has been customized down to every package, kernel configuration, script and patch solely for the purpose of the penetration tester. Official BackTrack 5 R1 change log: This release contains over 120 bug fixes, 30 new tools and 70 tool updates. The kernel was updated to 2.6.39.4 and includes the relevant injection patches. According to the guys at OffSec, This release is their best one yet! Some pesky issues such as rfkill in VMWare with rtl8187 issues have been fixed, which provides for a much more solid experience with BackTrack.We've have Gnome and KDE ISO images for 32 and 64 bit (no arm this release),
78000 Indian Blogs Hacked by ZHC

78000 Indian Blogs Hacked by ZHC

Aug 19, 2011
78000 Indian Blogs Hacked by ZHC Each and every blog hosted on  Blog.co.in  has been hacked by ZCOMPANY HACKING CREW. There are around 78000 blogs hosted on this service , Represent Indian blogs Service.  Reason of Hacking By hackers : ZCompany Hacking Crew Observes Black Day with the people of Indian occupied Kashmir on 15th August.  Free Kashmir .. Freedom is our goal..// End the Occupation. . . . List of all the websites that were hacked: https://www.2shared.com/document/pneC3OHn/blogcoin.html Mirror of Hacks available here :  https://mirror.sec-t.net/hacker/?s=1&user=ZCompanyHackingCrew
#OpBart : BART Police database hacked by Anonymous

#OpBart : BART Police database hacked by Anonymous

Aug 19, 2011
#OpBart : BART Police database hacked by Anonymous A database belonging to the BART Police Officers Association appears to have been hacked by Anonymous Hackers and the names, postal and email addresses of officers posted online HERE . Some say it was Anonymous, some say it was a n00b mademoiselle wielding a +1 SQL injection. This is the second attack was launched on the San Francisco Bay Area Rapid Transit (BART) yesterday that led to the personal details of 102 police officers being leaked. Anonymous appeared to remove itself from the blame, saying on one of its Twitter feeds that ' no one claimed responsibility for the hack ' and that 'some random Joe joined a channel and released the data to the press'. It said: " The leak today of BART officer data could be the work sanctioned by those who truly support Anonymous, or agent provocateurs.   People who are against Anonymous know they can do things under the name 'Anonymous' and never be questioned. This is Anonym
Vanguard Defense Industries (VDI) Hacked for #Antisec Operation

Vanguard Defense Industries (VDI) Hacked for #Antisec Operation

Aug 17, 2011
Vanguard Defense Industries (VDI) Hacked for #Antisec Operation AntiSec is targeting defense contractors again. Continuing their beef with law enforcement, and organizations that offer them support, they have targeted Richard Garcia, the Senior Vice President of Vanguard Defense Industries (VDI) . AntiSec plans to release nearly 4,713 emails and thousands of documents taken during the breach. AntiSec targeted VDI's website due to their relationship with several law enforcement agencies from Texas and other parts of the U.S., as well as their relationship with the FBI, the DHS, and U.S. Marshals Service. Moreover, with this hack Antisec (in)directly targeted FBI since Richard Garcia is the former Assistant Director in Charge of the FBI's field office in Los Angeles. To those supporting AntiSec, this alone is reason enough to target VDI and release Garcia's corporate email to the public. " Any private corporation supporting US military or law enforcement operations are legitimate
Samsung hires Android hacker Cyanogen

Samsung hires Android hacker Cyanogen

Aug 17, 2011
Samsung hires Android hacker Cyanogen Steve 'Cyanogen' Kondik is best known as the creator of the CyanogenMod for Android, an after market customised firmware bringing new features and functionality to the Android platform. There's no information yet on whether Samsung is interested in CyanogenMod, or more in Kondik himself, but the programmer and hacker has said the move will allow him to use his talents in " the real world ," while development of CyanogenMod continues as usual. The Cyanogen firmware caters to more than 40 different Android devices and brings such functionality as native theming, Free Lossless Audio Codec (FLAC), an OpenVPN client, USB tethering, and claims increased performance and reliability over official firmware releases. Kondik has on occasion received input from Google on the development of the platform and as of mid-July it had been downloaded and installed on more than half a million devices. [ source ]
#OpSPCAwake : Operation SPCAwake leaks large number of users data of Spcala.com

#OpSPCAwake : Operation SPCAwake leaks large number of users data of Spcala.com

Aug 17, 2011
#OpSPCAwake : Operation SPCAwake leaks large number of users data of Spcala.com Anonymous Hackers with name FutureSec hack Spcala.com and mass release of spcala Customer/Supporter/Members Names, Emails, Phone Numbers. Hackers have plan to Mass E-mail/Call as many of supporters as possible. According to FutureSec " They support a sick and twisted agency that only cares about the profit and not true Animal Rights. You are to be as discreet as possible for obvious reasons, use the phone blocking code *67 if calling and use an anonymous e-mail address setup by proxy.So if you've ever had an Animal of ANY kind you truly loved, this mission if for you. ". FutureSec Leak complete database here .
Cybersecurity
Expert Insights
Cybersecurity Resources