TrackSomebody.com

october27thgroup.com pentesting, pci, red team

illmob.org

Tech Toolkit 2.0

July 23rd, 2009 by Dev Team in News, Our Tools

Newer Version Has Been Released! CLICK HERE!

Based off of the idea of Bryce Whitty’s “Computer Repair Utility Kit” from Technibble.com. The downfalls of Bryce’s idea was that he had the complete package with all the tools offered for download on his site, which of course sucked up bandwidth, and some authors of the applications, while freeware, wanted the only download of their software to be at their own sites.

To bypass these problems Tech Tools uses Ketarin, which is an application downloader that checks to see if an application has been updated and downloads it if so.

So I’ve compiled a list of apps that that were part of the original tool, and either
subtracted or added them due to their portability. i.e. if the program had an installer i didnt include it, I used mostly standlone executables for this first package.

You use Ketarin to first download all your tools and it will automatically extract them to their categorized folders.Once Downloaded you can then open Pstart.exe ,its menu is already configured to show the downloaded tools. You would then use Ketarin weekly to auto-update all these tech tools so you would always have a fresh copy of the program on your USB.

[smartcounter:2]

Version 2.0 update: added more tools and fixed some categories

If you have any questions,bugs, or ideas to include in the next version please visit the topic in our forums
*** THE NIRSOFT TOOLS THAT GET DOWNLOADED FOR PASSWORD RECOVERY GET MISTAKENLY IDENTIFIED AS VIRUS/HACKTOOLS THEY ARE NOT VIRUSES!!!***
I’m trying to keep it up to date every few months to make sure the weblinks to some apps are fixed.

Happy National Change Your Password Day

June 6th, 2009 by admin in Life, News

DID you change your computer password?

This simple act can save money and protect your personal information, the Broadband Minister, Stephen Conroy, said yesterday as he launched the first “National Change Your Password Day”.

Senator Conroy, who revealed his own computer had this week been bombarded with more than 50 fake emails pretending to be from his bank, said people should change their passwords at least twice a year.

He recommended passwords always include letters and numbers and warned people to be vigilant. “Stop and think before you click on links or attachments,” he said.

“No one wants to lose their bank details to criminals or fall victim to an online scam and that’s why it’s important that people understand simple steps, such as getting a better, stronger password, can help them stay smart online and protect their personal information.”

He said this would build confidence in the digital economy, especially as more people increasingly use computers for personal, social networking and business purposes.

“Don’t just choose a password with your birthday or the name of your favourite football team. Get security software and update it regularly,” he said.

Meanwhile, the Auditor-General said he would have a full inquiry into the Government’s first failed broadband tender. The Opposition spokesman, Nick Minchin, has urged the audit into the process after Telstra was excluded on a technicality and the Government said none of the other bids was good enough.

The Government made the surprise announcement to instead set up its own $43 billion company to build the broadband network.

Via: smh.com.au

Elcomsoft Denied By PGP

April 29th, 2009 by Dev Team in News

Software makers elmcomsoft were denied use of their PGP cracking wallpaper on their exhibit by Reed Exhibitions supposedly from complaints by PGP
elmcomsoft

Via: blog.crackpassword.com

Vbootkit 2.0

April 25th, 2009 by Dev Team in News, Privilege Escalation

Like Kon-boot we talked about in our last post VBootkit 2.0 is an updated code from 2007 that hasnt hit the internet yet , but is pretty much the same idea, modify the bootmgr and you essentially can modify the security checks on the fly to let you do anything you wanted on the system as any user without knowing the password. Read more from there authors site ::HERE::

VBootkit 2.0 is a follow-up to earlier work that Kumar and Kumar have done on vulnerabilities contained in the Windows boot process. In 2007, Kumar and Kumar demonstrated an earlier version of VBootkit for Windows Vista at the Black Hat Europe conference.

The latest version of VBootkit includes the ability to remotely control the victim’s computer. In addition, the software allows an attacker to increase their user privileges to system level, the highest possible level. The software can also able remove a user’s password, giving an attacker access to all of their files. Afterwards, VBootkit 2.0 restores the original password, ensuring that the attack will go undetected.

Forums Open

March 31st, 2009 by admin in News

If you look under the top banner you’ll notice a new forums link, we wanted to test drive a forum to see if its something the community would like to utilize. Sign-up and post your questions 🙂

Weak Passwords on Extensions = Hacked SIP/PBX

March 27th, 2009 by admin in Linux, News

An unknown organization is systematically checking for open SIP ports and then trying common extension usernames and passwords. If they find weak passwords, they are then into the PBX and can make thousands of calls in a matter of minutes. Protect yourself. Some were Asterisk and some were SIP-based VoIP PBX. Itappears that the hack has nothing to do with any sort of Asterisk vulnerability, but with insecure passwords set for extensions.

Src: junctionnetworks.com

Judge orders defendant to decrypt PGP-protected laptop

March 23rd, 2009 by admin in News

A federal judge has ordered a criminal defendant to decrypt his hard drive by typing in his PGP passphrase so prosecutors can view the unencrypted files, a ruling that raises serious concerns about self-incrimination in an electronic age.

In an abrupt reversal, U.S. District Judge William Sessions in Vermont ruled that Sebastien Boucher, who a border guard claims had child porn on his Alienware laptop, does not have a Fifth Amendment right to keep the files encrypted.

Src: Cnet

Miley Twitter Acct Hacked

February 16th, 2009 by Dev Team in News

I dont know why this is big news , like she ever used a password that wouldn’t have been cracked using a dictionary file? But none the less ,much like her gmail and youtube accounts Miley Cyrus Twitter account has been hacked. Of course if Twitter got it right the first time or after their other publicized hack and had limited account login attempts, they probably wouldn’t have succeeded.
miley

Change Vista Password From Install DVD

February 14th, 2009 by admin in News, Password Info, windows


Please take note that this handy tip is intended to recover/regain a forgotten Vista Administrator password. It is not intended to illegally hacking into a Vista system that’s not owning by users who refer this guide!! It is also intended to inform Vista users about the method by which anyone can access their private accounts by cracking passwords….Thus anyone can hack into administrator account and bypass guest user restrictions…. Lets start… Steps to hack Windows Vista Administrator account password: (more…)

Twitter Hacked

January 6th, 2009 by admin in News

Someone hacked into Twitter’s internal admin tools and compromising 33 high profile accounts, including President Elect Barack Obama,Fox News,and Britney Spears.

Here is Twitter’s official explanation.

The password was obtained by a bruteforce method using a wordlist only because Twitter didnt have lockout mechanism for their admin login, and the cracker was able to keep trying new passwords until he got into an admin account of Crystal,who’d chosen the weak password “happiness.”

« Previous ArticleNext Article »