Show Posts

This section allows you to view all posts made by this member. Note that you can only see posts made in areas you currently have access to.

Topics - Axon

Pages: 1 ... 3 4 [5] 6 7 ... 35
Hacking and Security / Why Google is Hurrying the Web to Kill SHA-1
« on: September 09, 2014, 11:19:03 pm »
Most of the secure web is using an insecure algorithm, and Google's just declared it to be a slow-motion emergency.
Interesting article.

Operating System / FenOS
« on: August 17, 2014, 05:07:24 pm »
FenOS is a Hybrid Operating System that allows you to use any software made for Microsoft, Apple, Linux/Unix and Solaris natively without being forced to use any middleware. It is compartible with all common hardware architectures such as x86, x86-64, POWER-PC and ARM

This hasn't been released yet, it's expected to be released on Sep 9 2014. Apparently, it's not free? I'm posting this for anyone who is interested in trying it out, and it's a brand new OS.

Security Tools / Tomb
« on: August 15, 2014, 02:03:03 pm »
Tomb aims to be an 100% free and open source system for easy encryption and backup of personal files,tomb generates encrypted storage files to be opened and closed using their associated keyfiles, which are also protected with a password chosen by the user. Tomb is a simple tool to manage encrypted storage on GNU/Linux, from the hashes of the dyne:bolic nesting mechanism.

Articles / Cancer is as old as multi-cellular life on Earth
« on: August 11, 2014, 11:27:34 pm »
Date: June 24, 2014
Can cancer ever be completely defeated? Researchers have now reached a sobering conclusion: "cancer is as old as multi-cellular life on Earth and will probably never be completely eradicated," says one expert, following his latest research results. The researchers have now achieved an impressive understanding of the roots of cancer, providing proof that tumors indeed exist in primitive and evolutionary old animals.

Hacking and Security / Pass-the-Hash is Dead, or is it?
« on: July 30, 2014, 10:44:05 pm »
This is a good read on the recent fix by Microsoft called KB2871997, which some have dubbed "Pass the hash fix". According to this fix, local accounts can no longer be used to access remote systems, either via simple network logon or interactive login. This includes using tools like PSEXEC or even browsing to C$ remotely. But this is not always the case?

Articles / Scientists Discover Mysterious Giant Hole in Siberia
« on: July 19, 2014, 01:50:36 am »
Scientists have discovered a mysterious giant hole that has appeared in one of Russia's most isolated northernmost regions, state television reported.

A preliminary study on Thursday determined that the gaping crater, about 100 meters in diameter, was created by a natural event but not a meteorite impact.

There were no signs that the hole was artificially made, and the radiation level at the site was not dangerous, a team of scientists from Siberia's Institute of the Earth Cryosphere said in a press release quoted by Russian media.

Speculation has swirled about how the hole could have been created including theories of an unknown meteorite or even alien beings after a video of the mysterious site went viral on YouTube last week.

The hole is located in the vast region of Yamal, which means "the end of the Earth" in the local Nenets language. Straddling the Arctic Circle, the region is a place where temperatures plummet to negative 50 degrees Celsius and the sun barely rises in winter.

Inhabited by indigenous reindeer herders, Yamal is one of Russia's richest regions in natural gas. The hole was found near the Bovanentsky gas field, leading to speculation that it could have been caused by an underground explosion.

TV Zvezda, broadcast by the Defense Ministry, reported that the person who shot the video said the hole appeared to have been caused from below and that the darker soil around its top indicated the effect of high temperatures.

More to the news.

Russia ::)

Found it on the Webs / SSL Blacklist
« on: July 18, 2014, 01:13:37 pm »
database of SSL certificates used by malware or botnets.

General discussion / Germany wins 2014 world cup
« on: July 14, 2014, 12:39:13 am »

Finally after 24 years, Germany got it hands on world cup, many of you might not know about the irony in 2014 world cup. Last time Germany won world cup was in 1990 in Italy, they played against Argentine and won 1-0?

Articles / Searching SHODAN For Fun And Profit
« on: July 10, 2014, 10:44:56 pm »
This paper act as a guide for penetration testers and security folks who want to use Shodan and helps them to understand how it can be used it for security auditing purposes. This paper also outlines the procedure and explains the methods to find various vulnerable services and devices located on the internet. It helps to explain the basic filters that could be used by Shodan and its integration with other tools .It can be mainly used for reconnaissance phase of penetration testing.

Articles / The ultimate XSS protection cheat sheet for developers
« on: July 10, 2014, 10:43:15 pm »
This guide is a compilation of information available on XSS Protection from various organization, researchers, websites, and from the author's own experience. This document follows a simple language and justifying explanations that helps a developer to implement the correct XSS defense and to build a secure web application that prevents XSS vulnerability and Post XSS attacks.

Security Tools / UPnP Pentest Toolkit
« on: June 30, 2014, 06:33:33 am »
This tool aims to bring together a range of UPnP assessment features, enabling quick assessment with minimal configuration and set-up. It has been developed to aid security consultants in exploring, spoofing and manipulating of UPnP devices and the underlying protocols at work. It is intended as a proof of concept to be used for research purposes in a trusted environment.

Found it on the Webs / Python Arsenal for Reverse Engineering
« on: June 30, 2014, 06:32:22 am »
This site is a collection of various python engines, extensions, libraries, shells, that aids in the job code for understanding, analyzing and sometimes breaking code.

Interesting guide on how to perform remote debugging for each of the three major mobile platforms.

In short, the author uses a PowerShell script that uses Service Principal Name (SPN) records from Active Directory to identify and attack SQL Servers on Windows domains without having to perform discovery scanning.

Pages: 1 ... 3 4 [5] 6 7 ... 35

Intern0t SoldierX SecurityOverride programisiai
Want to be here? Contact Ande, Factionwars or Kulverstukas on the forum or at IRC.