johncrackernet.blogspot.com
Network Security Solutions : February 2012
http://johncrackernet.blogspot.com/2012_02_01_archive.html
Your Preferred Network Security Solutions Provider. Saturday, February 04, 2012. FBI Arrests Suspected LulzSec and Anonymous Hackers. The person arrested in Arizona is a student at a technical university and allegedly participated in the widely publicized hack against Sony. Both groups have been targeted by the FBI and international law enforcement agencies in recent months. The arrests shouldn't surprise anyone. They made two errors:. Mistake #1: They brough too much attention to themselves. As Imperva'...
johncrackernet.blogspot.com
Network Security Solutions : September 2012
http://johncrackernet.blogspot.com/2012_09_01_archive.html
Your Preferred Network Security Solutions Provider. Tuesday, September 25, 2012. How to find latest IE vulnerability (CVE-2012-4969) with Nexpose. As you probably know, Microsoft released advisory 2757760 ( Microsoft Security Advisory (2757760): Vulnerability in Internet Explorer Could Allow Remote Code Execution. Which describes a Remote Code Execution vulnerability in Internet Explorer 7, 8, and 9. This was assigned to CVE-2012-4969. To address this vulnerability. To continue reading; please click here:.
johncrackernet.blogspot.com
Network Security Solutions : sslyze – Fast and Full-Featured SSL Configuration Scanner
http://johncrackernet.blogspot.com/2011/12/sslyze-fast-and-full-featured-ssl.html
Your Preferred Network Security Solutions Provider. Thursday, December 15, 2011. Sslyze – Fast and Full-Featured SSL Configuration Scanner. Transport Layer Security (TLS), commonly called SSL, is one of the most widely used protocols to secure network communications. As costs fall and user security and privacy expectations rise companies are deploying it more widely every year. Attacks against the CA system. For weak strength ciphers. Checking for SSLv2, SSLv3 and TLSv1 versions. Support for client certi...
johncrackernet.blogspot.com
Network Security Solutions : Microsoft Security Bulletin for December 2011
http://johncrackernet.blogspot.com/2011/12/microsoft-security-bulletin-for.html
Your Preferred Network Security Solutions Provider. Thursday, December 15, 2011. Microsoft Security Bulletin for December 2011. MS11-092 is a vulnerability in Windows Media player and Media Center, which an attacker could use to phish a victim into visiting a site or opening a file on their site. Microsoft also reports that there is likely already exploit code available for this vulnerability. This is a month where Microsoft patched a wide variety of vulnerabilities so organizations need to test and patc...
johncrackernet.blogspot.com
Network Security Solutions : November 2011
http://johncrackernet.blogspot.com/2011_11_01_archive.html
Your Preferred Network Security Solutions Provider. Thursday, November 10, 2011. Computerized Prison doors hacked with vulnerabilities used by Stuxnet worm. Security holes in the computer systems of federal prisons in the United States can effectively allow hackers to trigger a jailbreak by remote control. The discovery of the Stuxnet worm has alerted governments around the world about the possibility of industrial control systems being targeted by hackers. Sqlninja 0.2.6. It is basically an official rel...
johncrackernet.blogspot.com
Network Security Solutions : Vendor Security
http://johncrackernet.blogspot.com/2011/12/vendor-security.html
Your Preferred Network Security Solutions Provider. Tuesday, December 06, 2011. All of this ends up slowing our deployment of the various third party solutions, which is an acceptable tradeoff in our view. But what do we do when none. Of the vendors in the space pass the security bar? And more broadly, what can we do as a security community to raise awareness of the state of vendor security and create impetus for change? First, in addition to screening new vendors, if you haven’t already been doing...
johncrackernet.blogspot.com
Network Security Solutions : The Mole – Automatic SQL Injection SQLi Exploitation Tool
http://johncrackernet.blogspot.com/2011/12/mole-automatic-sql-injection-sqli.html
Your Preferred Network Security Solutions Provider. Tuesday, December 06, 2011. The Mole – Automatic SQL Injection SQLi Exploitation Tool. The Mole is an automatic SQL Injection exploitation tool. Only by providing a vulnerable URL and a valid string on the site it can detect the injection and exploit it, either by using the union technique or a boolean query based technique. Support for injections using Mysql, SQL Server, Postgres and Oracle databases. Developed in python 3. H4x0re Security Project Offi...
johncrackernet.blogspot.com
Network Security Solutions : December 2012
http://johncrackernet.blogspot.com/2012_12_01_archive.html
Your Preferred Network Security Solutions Provider. Thursday, December 20, 2012. Log Analyzer 3.6.0 - Cross Site Scripting Vulnerability. 360 - Cross Site Scripting. Http:/ www.vulnerability-lab.com/get content.php? Vendor: http:/ loganalyzer.adiscon.com/security-advisories/loganalyzer-cross-site-scripting-vulnerability-in-oracle query-paramater. Common Vulnerability Scoring System:. LogAnalyzer is part of Adiscon`s MonitorWare line of monitoring applications. It runs both under Windows and Unix/Linux.
johncrackernet.blogspot.com
Network Security Solutions : Adding custom wordlists in Metasploit for brute force password audits
http://johncrackernet.blogspot.com/2011/12/adding-custom-wordlists-in-metasploit.html
Your Preferred Network Security Solutions Provider. Tuesday, December 06, 2011. Adding custom wordlists in Metasploit for brute force password audits. In any penetration test that involves brute forcing passwords, you may want to increase your chances of a successful password audit by adding custom wordlists specific to the organization that hired you. Some examples:. If you are security testing a hospital, you may want to add a dictionary with medical terms. Virus and Security Solution. Hack In The Box.
johncrackernet.blogspot.com
Network Security Solutions : March 2011
http://johncrackernet.blogspot.com/2011_03_01_archive.html
Your Preferred Network Security Solutions Provider. Monday, March 14, 2011. Android 2.0 ,2.1, 2.1.1 WebKit Use-After-Free Exploit. This is the exploit used in my Austin bsides presentation that returns a shell. The slides are at. Http:/ www.slideshare.net/mjza/bsides. Subscribe to: Posts (Atom). Rapid7 Community Blog (Metasploit). Darknet- Ethical Hacking n Penetration Testing. 1337 Exploit Database- inj3ct0r Team. Exploit Database by Offensive Security. H4x0re Security Project Official. Hack In The Box.