Showing posts with label hack. Show all posts
Showing posts with label hack. Show all posts

Friday, December 18

The Simplest Hack: Hitting The Backspace 28 Times Will Break You Into a Linux Computer

Linux may be the operating system of choice for some computer snobs, but there is apparently one giant flaw in it: you can break into it really, really, really easily. All you have to do is hit the backspace key enough times, something on the order of 28.

The number of backspaces hits was the only input controllable by the user to cause different manifestations of the error.

Tuesday, November 17

A Collection of Python Pentest Scripts

A large scripts for python fully featured security and hacking tools. We also provide some exploits, proof of concept code, shellcodes and snippets.

These files and scripts are not intended for malicious purposes, they are to be used for training, and legally approved assessments.

A Collection of Python Pentest Scripts


Friday, November 6

ProtonMail: encrypted email provider Recovers from DDoS punch after being extorted

ProtonMail, a Switzerland-based encrypted email provider, was forced offline on Thursday after hackers held the company’s internet connection for ransom by using a distributed denial of service (DDoS) attack.
Secure webmail outfit ProtonMail is still fighting against a sustained DDoS attack that has left its service largely unavailable since Tuesday.

Wednesday, November 4

The Gentlest Way To Rob A BANK

Bank robbers have found a new method to eliminate ATMs. You use a USB flash drive, the device spits out the entire contents and remain unscathed. One of the "Jack Potter" was filmed in the act in Berlin.

Thursday, October 29

Government Gateway online hack claims 'nonsense' from the government information security experts.

Claims the Government Gateway online identity portal has been "hacked" have been dismissed as "nonsense" by the man originally responsible for the project and two government information security experts.

Earlier this week the Financial Times (behind paywall) reported that “tens of thousands” of Britons’ identities were currently for sale on "the dark web". The newspaper cited a Whitehall security officer, who revealed this included thousands of detailed profiles stolen from the government’s own computer systems.

Wednesday, October 28

000WEBHOST: Biggest Free Hosting Company Hacked, 13.5 Million Plaintext Passwords Leaked

Hackers have made off with the names, email addresses, and unencrypted passwords of 13 million accounts at 000webhost, a free web hosting biz.

If anyone hit by the raid has reused a 000webhost password on another website, now's the time to change it.

Thursday, October 8

A Collection Security And Hacking Tools, Exploits, Proof Of Concepts, Shell Codes, Scripts

This offers a selection of our fully featured security and hacking tools. We also provide some exploits, proof of concept code, shellcodes and snippets. That means some tools are not tested and may not have the feature set.

A Collection Security And Hacking Tools, Exploits, Proof Of Concepts, Shell Codes, Scripts

This section offers a selection of our fully featured security and hacking tools from NullSecurity.

+ Automation :

This section includes automation tools and wrapper scripts for well-known and public security tools to make your life easier. You can adjust the scripts fast and easily according to your own needs. Mostly written in bourne shell.

+ Backdoor :

Backdoors and rootkits for kernel and userland, network, hardware and software. Once you have gone through all the hard work making sure you can get on the system. Make sure you can always get back in.

+ Binary :

ELF and PE binary related tools. This section includes packers, runtime crypters, including our famous (thanks trusted sec team) hyperion tool from our very own belial and other stuff.

+ Cracker :

Tools for cracking network and software login masks. Not been able to find an exploit to give you RCE? Too lazy to SE? So go smash down the front doors and rummage around with our cracking and brute force tools.

+ Cryptography :

Encrypt all the things! With privacy issues moving up most people agenda with items like PRISM in the news cryptography it one of todays hot topics. It’s also pretty useful for exfiltrating data from your target environment, connecting to that C2 box and keeping your loot away from prying eyes.

+ DDoS :

(D)DoS tools if you wanna by like those n00bs at anonymous or simulate everyones favourite underground extortionists.

+ Exploit :

Proof of Concept tools and, if we are feeling particularly generous, fully working exploits because there is nothing more fun that RCE, except dinner with noptrix of course.

+ Fuzzer :

Didn’t find the exploit you wanted in our exploit section well try one of our fuzzers and write you own god damn code.

+ Keylogger :

When you really need to know those credentials you keep seeing the user enter or are too lazy to go searching for every new piece of useful information just try one of our keyloggers and get the user to do the hard work for you!

+ LogCleaner :

Just because our mothers raised us right, we always clean up after ourselves and pwnage is no exception. These logcleaners also help in not getting caught on that important engagement.

+ Misc :

This section includes miscellanous files. Often, you will find non-security related stuff here.

+ Resersing :

Whether figuring out how that new piece of malware you just discovered works or hunting for the next 0day from $vendor, our reversing toolz will help you on your way.

+ Scanner

Can’t find any useful hints on shodan? Google dorks not dishing up the goods? Hell get one of our scanners out and track down your targets in 2 shakes of a lol-cat’s tail.

+ Shellcode

Just because our fuzzer worked or the PoC was fantastic doesn’t mean that running calc is gonna put a smile on your face. If you got RCE try our shellcodes to actually do something useful.

+ Wireless

Why wireless? It works and you don’t have to wear your favorite nullsecurity hoody to hide you face from the camera in reception. Hack all the thingz!

If you find some bugs or if you have any questions, ideas or criticism regarding to this section, feel free to message us.

And For Latest Tools stay Online.

Downlaod : Master.zip | Clone Url

Source : http://nullsecurity.net/

Friday, July 24

Bug In Widely Used Openssh Opens Servers To Password Cracking

A recently disclosed bug in OpenSSH software used to remotely access Internet-facing computers and servers allows attackers to make thousands of password guesses in a short period of time, a defect that could open systems to password cracking, a security researcher has warned.

Bug In Widely Used Openssh Opens Servers To Password Cracking
Used OpenSSH Opens Servers To Password Cracking

Wednesday, July 22

Four Men Reportedly Arrested In Connection To JPMorgan Chase Hack



According to The New York Times and Bloomberg News, four men in Florida and Israel have been arrested in connection to the 2014 hack against JPMorgan Chase, which resulted in gigabytes of bank data being exfiltrated. The news outlets, citing anonymous sources, did not fully explain how all the suspects were connected.
Four Men Reportedly Arrested In Connection To  JPMorgan Chase Hack
Four Men Reportedly Arrested In Connection To  JPMorgan Chase Hack


Sunday, July 19

Latest Python tools for penetration testers



If you are involved in vulnerability research, reverse engineering or penetration testing, I suggest to try out the Python programming language. It has a rich set of useful libraries and programs. This page lists some of them.

Latest Python tools for penetration testers
Latest Python tools for penetration testers

Tuesday, July 14

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations



Another zero-day vulnerability is being exploited in attacks spotted in the wild: this time, the targeted software is Java.

Pawn Storm: First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations
First Java Zero-Day Attack in Two Years Targets NATO & US Defense Organizations

Tuesday, July 7

Kali Linux 2.0 Release Day on August 11th, 2015 with teaser

We’ve been awfully quiet lately, which usually means something is brewing below the surface. In the past few months we’ve been working feverishly on our next generation of Kali Linux and we’re really happy with how it’s looking so far.

Thursday, July 2

How to Install Kali Linux on Android Using Linux Deploy

You can now install Kali Linux on any Android Phone or Tablet. The developers of Linux Deploy have made it extremely easy to get any number of Linux distributions installed in a chroot environment using a simple GUI builder.
Install Kali Linux on Android Using Linux Deploy

Hackers Targeted Employees Of A Bitcoin Exchange Via Skype Before Stealing $5 Million

Six employees of Bitstamp were targeted in a weeks-long phishing attempt leading up to the theft of roughly $5m in bitcoin in January, according to an incident report said to be drafted internally by the bitcoin exchange.
$5 Million Bitstamp Bitcoin Exchange Hack

The confidential document, posted to Reddit by a single-purpose account, offers an in-depth look into what is believed to be the inside story of the hack, which resulted in the loss of just under 19,000 BTC earlier this year. Since then, the company has offered scant details on what took place behind the scenes, citing confidentiality regarding the investigation into the lost funds.

EvilAP Defender: Protect Wireless Network from Evil Access Points!

EvilAP_Defender is an application that helps wireless network administrator to discover and prevent Evil Access Points (AP) from attacking wireless users.

How to protect wifi from the Evil Access | Fake accessPoints (AP)

Saturday, June 27

Magento E-Commerce Platform Targeted In An Attack With Sneaky Code

Attackers are using a sneaky method to steal payment card data from websites using Magento, eBay’s widely used e-commerce platform.
Attackers are injecting code into the Magento e-commerce platform
to extract payment card data, according to Sucuri.

WARNING Report: HACKER's Make Mistakes which can get you in PRISON!!!!!!!!!!

According to this Report a Hacker can be arrest due to some Silly mistakes so start avoiding the little errors and keep Clam. And if you're a hacker or a member of hacker group or wanna to be a hacker then its important to know so the read the given below Report:


Attackers Make Mistakes But SysAdmins Tool

Thursday, June 25

Hundreds of .Gov Credentials Found In Public Hacker Dumps

It’s no surprise that careless government employees use their .gov email addresses to sign up for all sorts of personal accounts. But when those insecure third party services are breached by hackers—and if those employees were foolish enough to reuse their .gov passwords, too—that carelessness can offer a dead-simple backdoor into federal agencies, with none of the usual “sophisticated Chinese attackers” required.