A+ R A-

Network Devices

 

Infamous anti-jihadi hacker The Jester (th3j35t3r) is claiming responsibility for a denial of service attack (DoS) attack that temporarily disabled the WikiLeaks website just hours before the release of thousands of classified documents.

WikiLeaks, the secret-sharing website led by fugitive founder Julian Assange, has been plaguing the U.S. government with repeated postings of leaked materials.

The WikiLeaks Twitter account carried the message, "We are currently under a mass ...

Microsoft issued two critical bulletins Tuesday, correcting two serious vulnerabilities in Outlook Express and Visual Basic that could be exploited remotely to gain accesss to sensitive data.

The software giant issued the patches as part of its regular monthly patch schedule.

MS10-031 repairs a critical vulnerability in Microsoft Visual Basic for Applications (VBA). The tool is used by developers to build third-party tools into processes that run various Microsoft Office applications. The fl

 

Intrusion Detection System (IDS)

 

 

IDS Architecture

Intrusion Detection (ID) is the process of monitoring for and identifying attempted unauthorized system access or manipulation. An ID system gathers and analyzes information from diverse areas within a computer or a network to identify possible security breaches which include both intrusions (attack from outside the organization) and misuse (attack from within the organization).   image         An Intr

Kenny from GSO created this demo of gaining access to a Netgear Router... This is solely for educational purposes and usage.

By enabling the Debug option on Netgear routers, CLI access is available on the outside interface. The first part of this article will show how to remotely enable the debug feature. The second part will show what can be done once debug is enabled.

 

Old news for many...

Now for Part 2 of Kenny's Hacking Netgear router demo, but before we get to the part where we show what we can do, we need to know one thing. What is Busybox? In short, it is 'The Swiss Army Knife of Embedded Linux'. BusyBox combines tiny versions of many common UNIX utilities into a single small executable. It provides replacements for most of the utilities you usually find in GNU fileutils, shellutils, etc. The utilities in BusyBox generally have fewer options than their full-featured GNU cousins; however, the options that are included provide the expected functionality and behave very much like their GNU counterparts.

Get email updates