- ToorCon Seattle 2011 Browser Exploit Packs – secniche.blogspot.com
We gave a talk at ToorCon about the high level details of BlackHole. We will be releasing more details and complete talk in the upcoming conferences that are scheduled later this year.
- OWASP DC’s videos – vimeo.com
Video archive of OWASP DC lectures and presentations.
- Notacon 8 media now online – blog.notacon.org
I’m happy to say that the media for Notacon 8 is now online…I want to thank everyone for their patience as I worked through all of the media to get it ready for release. I chose to use MP4 as the video format of choice and OGG as the audio format. As a reminder, all of the media is being released under the Creative Commons Attribution-ShareAlike 3.0 license.
- Password mining, cracking, and GPUs – Errata Security
People imagine that sophisticated hacking requires sophisticated computers. The truth is that almost everything a hacker does can be done with a cheap notebook computer, or even a mobile phone.
- UPDATE: OWASP Mantra v0.61! – getmantra.com/download/index.html
Mantra is a collection of free and open source tools integrated into a web browser, which can become handy for students, penetration testers, web application developers,security professionals etc. It is portable, ready-to-run, compact and follows the true spirit of free and open source software.
- UPDATE: Skipfish v2.00b! – code.google.com/p/skipfish/downloads/list
Skipfish is a fully automated, active web application security reconnaissance tool.
- BSQLF v2.7 – code.google.com/p/bsqlbf-v2/downloads/list
An updated version is now available for download. This supports “-nomatch” switch. The -nomatch switch is exactly opposite of the -match switch, ie, it will look for the supplied unique keyword which only appears in the false page and NOT in true page. Remember, the “-match” looks for a unique string which only appears in true and do not appear in false cases.
- Mutillidae: A Deliberately Vulnerable Set Of PHP Scripts That Implement The OWASP Top 10 – irongeek.com
What I’m attempting to do with Mutillidae is implement the OWASP Top 10 in PHP, and do it in such a way that it is easy to demonstrate common attacks to others. Feel free to use it in your own classes or videos, but if you do I’d love to hear about it.
- Metaploit Framework 3.7.2 Released! – metasploit.com
It’s that time again! The Metasploit team is proud to announce the immediate release of the latest version of the Metasploit Framework, 3.7.2. Today’s release includes eleven new exploit modules and fifteen post modules for your pwning pleasure. Adding to Metasploit’s well-known hashdump capabilities, now you can easily steal password hashes from Linux, OSX, and Solaris.
Google announced on Tuesday the availability of a new free application testing tool, dubbed “DOM Snitch,” that it says will help Web application developers find vulnerabilities in client side Web applications.
- John the Ripper Gets A Face Lift – darkreading.com
One of the industry’s first open-source password-cracking tools just got a big boost in power and performance with sponsorship from Rapid7, which also plans to more tightly integrate the so-called John the Ripper tool with Metasploit.
- Auditing/Hacking WPA & WPA2 Security – it-audit.sans.org
Episode 3 of AuditCasts is a ten minute demonstration that shows, from beginning to end, how to attack the pre-shared key in a WPA or WPA2 network. This episode, unlike others to date, is a bit less “How To”, so I thought we’d give you some more details here in the Show Notes.
- Another Use of Clickjacking, Cookiejacking! – cgisecurity.com
Rosario Valotta has published an interesting attack against IE that takes advantage of clickjacking. In a nutshell it combines origin flaws within IE with clickjacking to trick a user into copying/pasting their own cookies from any site! Demonstration below.
- Restricted Citrix Excel Application Escapes – carnal0wnage.attackresearch.com
Blow by blow account of restricted citrix environment break outs.
- Metasploit Payloads Explained Part 1 – room362.com
Payload selection is something that rarely gets talked about in detail. Most PoCs just use calc.exe, netcat, or some kind of socket. The vast majority of Metasploit tutorials, videos and documentation use the windows/meterpreter/reverse_tcp payload which is only one of 224 possible payloads.
- WordPress backdoors
Following the discovery of a backdoor in three popular plug-ins, the developers of WordPress reset the passwords for WordPress.org and blocked access to all extension repositories while they “looked for anything else unsavory”. It is still unclear how the backdoors got into the AddThis, WPtouch and W3 Total Cache plug-ins.