Events Related:



  • DotDotPwn v1.0 – Directory Traversal Checker/Scanning Tool –
    A simple PERL tool which detects several Directory Traversal Vulnerabilities on HTTP/FTP Servers.
  • WinAppDbg 1.4 is out! –
    The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment.
  • Ostinato 0.2 –
    Ostinato is an open-source, cross-platform network packet/traffic generator and analyzer with a friendly GUI.
  • Better, Faster, Stronger: DLLHijackAuditKit v2 –
    Due to an overwhelming amount of interest in the initial DLLHijackAuditKit released on Monday, I rewrote the tool to use native JScript.
  • RSMangler Keyword Based Wordlist Generator –
    The main new feature is permutations mode which takes each word in the list and combines it with the others to produce all possible permutations (not combinations, order matters).
  • WinAppDbg – Python Instrumentation Scripting/Debugging Tool For Windows –
    The WinAppDbg python module allows developers to quickly code instrumentation scripts in Python under a Windows environment.
  • SIP Inspector –
    SIP Inspector is a tool written in JAVA to simulate different SIP messages and scenarios.
  • WebAppTools v0.2 –
    The given complex is intended for inventory and an security estimation of various (heterogeneous) web-applications. The project is developed with usage of WebEngine kernel.
  • RainbowCrack 1.5 released –
    One big advantage of 64-bit operating systems is that more than 4 GB of memory can be used by application.
  • cvechecker –
    The goal of cvechecker is to report about possible vulnerabilities on your system, by scanning the installed software and matching the results with the CVE database.


  • EasyRMtoMP3 exploit for Vista SP2 –
    In my likely impossible challenge to ever understand one of Nico Waisman’s talks, I found corelanc0d3r’s site.
  • Favorite nmap NSE scripts –
    I’ve written a couple of posts about it and why I find it so useful, but in this post I’m going to cover some of my favorite scripts that come with the most recent Nmap release.
  • Bypassing Restrictive Proxies Part 2, Modified Windows Shell via Metasploit PassiveX –
    In the Download and Execute Script Shellcode post, I discussed some of the problems that a restrictive proxy could pose when you were attempting to use it as transport device for your exploitation traffic.
  • New Windows Meterpreter Search Functionality –
    Yesterday Stephen Fewer committed to the development version of Metasploit code for the Windows Version of Meterpreter for searching thru the file system and using the index service of the modern versions of Windows.


Other News:

  • Anti-virus Products Struggle Against Exploits –
    Most anti-virus products designed for use in businesses do a poor job of detecting the exploits that hacked and malicious Web sites use to foist malware, a new report concludes.
  • Google Advanced Operators And Government Website Leakage –
    All the “infosec cool kids” have been having a blast this week using a combination of filetype and site operators to look for classification markings in documents.
  • The Government’s New Right to Track Your Every Move With GPS –
    Government agents can sneak onto your property in the middle of the night, put a GPS device on the bottom of your car and keep track of everywhere you go.
  • Icons of the Web –
    A large-scale scan of the top million web sites (per Alexa traffic data) was performed in early 2010 using the Nmap Security Scanner and its scripting engine.
  • Thumb Drive Attack in 2008 Compromised Classified U.S. Networks –
    A senior official at the Department of Defense is talking publicly about a 2008 security breach that he claims compromised classified intelligence networks used by the U.S. military.
  • Military Computer Attack Confirmed –
    A top Pentagon official has confirmed a previously classified incident that he describes as “the most significant breach of U.S. military computers ever”.
  • DiskGenie hacking –
    Great review / write up and hacking of the iStorage DiskGenie (Portable Encrypted Hard Drive with Secure PIN code access)
  • Hackers accidentally give Microsoft their code –
    When hackers crash their systems while developing viruses, the code is often sent directly to Microsoft, according to one of its senior security architects, Rocky Heckman.

One Comment

  1. […] This post was mentioned on Twitter by grecs, cantormath. cantormath said: Infosec Events: Week 34 in Review – 2010 […]

Leave A Comment