Zero-day vulnerability in Adobe Flash Player, Reader and Acrobat

Thursday, July 23rd, 2009

Adobe is warning of a critical security vulnerability in its current Flash Player for Windows, Macintosh and Linux. Adobe Reader and Acrobat 9.x for all platforms are also affected. The vulnerability is already being actively exploited two ways, via crafted PDF documents and manipulated web sites (drive-by downloads). It's reported ...

Capturing Keystrokes With Metasploit

Monday, June 22nd, 2009

I was contacted privately about this, so I thought I would post a step-by-step guide on how to capture keystrokes from a target machine using Metasploit. Instead of posting a ton of screenshots, I will provide the commands in text below, step-by-step: msf > use exploit/windows/smb/ms08_067_netapi (only an example - use whatever ...

‘Ardilla’ Automatically Roots Out SQL Injection And XSS, Generates Attacks

Thursday, June 18th, 2009

Researchers have built a tool that automatically finds and exploits SQL injection and cross-site scripting vulnerabilities in Web applications. The so-called Ardilla tool uses a technique developed by the researchers -- MIT's Adam Kiezun, the University of Washington's Michael Ernst, Stanford's Philip Guo, and Syracuse University's Karthick Jayaraman -- that creates ...

Nessus v4.0.1 Released

Sunday, June 7th, 2009

The Nessus vulnerability scanner, is the world-leader in active scanners, featuring high speed discovery, configuration auditing, asset profiling, sensitive data discovery and vulnerability analysis of your security posture. Nessus scanners can be distributed throughout an entire enterprise, inside DMZs, and across physically separate networks. Fixes: Fixed memory & register leaks in NASL nessus-fetch ...

Cain & Abel v4.9.31 Released

Sunday, June 7th, 2009

Cain & Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords ...