A group of white hat hackers from RedTeam traveled to the Midwest to test the systems of a major power company and breach it with Social Engineering. RedTeam Security is a group of ethical hackers who specialize in offensive security, believing that the best defense is a good offense. Engaging in social engineering, in addition […]
The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to automate the Evil Twin Attack. The Infernal-Twin is an automated tool designed for penetration testing activities, it has been developed to assess wireless security by automating the Evil Twin Attack. “The tool was created to help the auditors and penetration testers […]
US Army Military experts urge the establishment of an Army Vulnerability Response Program (AVRP), a sort of military bug bounty program. What happen when bug hunters have to work with high sensitive environment? An interesting post published by the Cyber Defense Review raises the discussion about the was way to handle vulnerabilities in the information security infrastructure of the […]
This post explains how to use the PowerMemory script to reveal the passwords used by users of the computers running under Windows systems. Disclaimer Any actions and or activities related to the material contained within this blog is solely your responsibility.The misuse of the information in this website can result in criminal charges brought against […]
The penetration tester Thiebauld Weksteen has published an interesting analysis to explaine the importance of robots.txt for the hacking activities. Thiebauld Weksteen, a penetration tester from Melbourne is advising system administrators that robots.txt can give precious details to hackers, when it comes to attacks, because robots.txt as the capability to tell search engines which directories […]
Pen Testers at Offensive Security discovered Zero-day flaws in Symantec Endpoint Protection that could be exploited to gain full system access. Yesterday I reported the results of the study conducted by the security researcher Joxean Koret which publicly revealed a series of flaws affecting 14 of 17 major antivirus engines. The security experts remarked that antivirus products are […]
Exploring the Business Intelligence module proposed by the online course of the Hacker Academy – Intro to reconnaissance phase for a penetration testing. One of the most important components of the reconnaissance process in pen testing activity is the business intelligence. Once chosen the target it is important to gather business information on it before […]
Penetration testing is a skill, a profession that requests specific capabilities and the respect of strict rules. Hacking is different from pen testing … Professional hackers are an essential component in today IT landscape, in a previous post I highlighted the great request of the market for so precious figures. Being a hacker is a […]
Security expert Dancho Danchev profiled one of the numerous hacking services offered in the underground highlighting new trends in the cybercrime ecosystem. With the term attack-as-a-service model is indicated the practice to outsource all the phases of an attack to specialists instead to rent tools and architecture to conduct personally the illegal activities (Malware-as-a-Service). Danchev […]
Context Information Security issued the report “Web Application Vulnerability Statistics 2013” that provides statistic on Web Application Vulnerabilities based on data gathered from a range of IT security activities and consultancy engagements during last three years. The number of data breaches is increasing in concerning way also thanks to numerous cyber attacks that exploited Web Application Vulnerabilities in many web […]