LOOT MONEY WITHIN A MONTH

Hello All, I want to tell you about a great site I found. They pay me to read e-mail, visit web sites and much more. It's free to join and easy to sign up! CLICK THIS LINK TO VISIT cashmails.biz

MALWARE ANALYST

The proliferation of malware(Virus, worms, trojan horse, logic bomb etc) in recent years has presented a serious security threat to enterprises, organizations, and individuals due to its inherent capability of causing devastative damage on the cyber infrastructure. This blog is for those who are interested to discuss / share / know about malware, how they works (technical details), how to design malware detection engine, current trends in anti-virus research etc

Monday, June 1, 2009

Cyber Security Act of 2009

The Cyber Security Act of 2009 submitted by US senators John Jay Rockefeller and Olympia Snowe looks like it is geared up to be some poor US policy. Joe Stewart has written up a response to it. Joe makes some very valid observations.

To recap the criticism of the bill, there are two big complaints: First is that it gives the president the power to turn off the Internet in an emergency. Second it requires mandatory licensing for "Infosec professionals." The second point is the one I take the most issue with.

Requiring mandatory licensing for a field as dynamic and changing as ours is just a bad idea. There are already a couple of government entities that require the CISSP as a condition of employment. Side-stepping a long winded rant about the CISSP, it is not an accurate measure of knowledge. There has been a concerted effort to liken our field to others such as electricians and general contractors. The problem is that things are changing so fast, any certification is basically worthless as soon as it is issued.

So if you're a US citizen please write your senators and encourage them to revise this bill.

Friday, August 29, 2008

fake antivirus Antivirus XP

This summary is not available. Please click here to view the post.

Latest Spyware rocks the security field

software name : Power Antivirus 2009 rogue antivirus application
Power Antivirus 2009 is a rogue antivirus applicationOther sites of IP 78.157.143.251 distibuting rogue antivirus Power Antivirurus 2009 :
1. Antispyware2008b.com
2. Antivir–2008.com
3. Directnameservice2008.com
4. Mediatubeforme1.com
5. Onsafepro2008.com
6. Traff-drive.com
7. Viruswebprotect2008.com
8. Antivirus2008proxp.com

Other sites of IP 91.208.0.233 distibuting rogue antivirus Power Antivirurus 2009 :
1. Powerantivirus-2009.com
2. Powerantivirus2009.com
3. Pwrantivirus2009.com
so guys beware of this sites not even oprn this pages in u r systems

Tuesday, August 19, 2008

Top Torrent sites

This summary is not available. Please click here to view the post.

Bluetooth hacking tools

Author:VIVIEK Category: Ethical Hacking tools, Hacking, Mobile Softwares, Symbian
REF URL:-http://viruswriting.co.cc/main/?cat=5

If you are planning to gain a deeper understanding of Bluetooth security, you will need a good set of tools with which to work. By familiarizing yourself with the following tools, you will not only gain a knowledge of the vulnerabilities inherent in Bluetooth-enabled devices, but you will also get a glimpse at how an attacker might exploit them.
This hack highlights the essential tools, mostly for the Linux platform, that can be used to search out and hack Bluetooth-enabled devices.
Discovering Bluetooth Devices
BlueScanner - BlueScanner searches out for Bluetooth-enabled devices. It will try to extract as much information as possible for each newly discovered device. Download BlueScan.
BlueSniff - BlueSniff is a GUI-based utility for finding discoverable and hidden Bluetooth-enabled devices. Download BlueSniff.
BTBrowser - Bluetooth Browser is a J2ME application that can browse and explore the technical specification of surrounding Bluetooth-enabled devices. You can browse device information and all supported profiles and service records of each device. BTBrowser works on phones that supports JSR-82 - the Java Bluetooth specification. Download BTBrowser.
BTCrawler -BTCrawler is a scanner for Windows Mobile based devices. It scans for other devices in range and performs service query. It implements the BlueJacking and BlueSnarfing attacks. Download BTCrawler.
Hacking Bluetooth Devices
BlueBugger -BlueBugger exploits the BlueBug vulnerability. BlueBug is the name of a set of Bluetooth security holes found in some Bluetooth-enabled mobile phones. By exploiting those vulnerabilities, one can gain an unauthorized access to the phone-book, calls lists and other private information. Download BlueBugger.
CIHWB - Can I Hack With Bluetooth (CIHWB) is a Bluetooth security auditing framework for Windows Mobile 2005. Currently it only support some Bluetooth exploits and tools like BlueSnarf, BlueJack, and some DoS attacks. Should work on any PocketPC with the Microsoft Bluetooth stack. Download CIHWB.
make money online
Bluediving - Bluediving is a Bluetooth penetration testing suite. It implements attacks like Bluebug, BlueSnarf, BlueSnarf++, BlueSmack, has features such as Bluetooth address spoofing, an AT and a RFCOMM socket shell and implements tools like carwhisperer, bss, L2CAP packetgenerator, L2CAP connection resetter, RFCOMM scanner and greenplaque scanning mode. Download Bluediving.
Transient Bluetooth Environment Auditor - T-BEAR is a security-auditing platform for Bluetooth-enabled devices. The platform consists of Bluetooth discovery tools, sniffing tools and various cracking tools. Download T-BEAR.
Bluesnarfer - Bluesnarfer will download the phone-book of any mobile device vulnerable to Bluesnarfing. Bluesnarfing is a serious security flow discovered in several Bluetooth-enabled mobile phones. If a mobile phone is vulnerable, it is possible to connect to the phone without alerting the owner, and gain access to restricted portions of the stored data. Download Bluesnarfer.
BTcrack - BTCrack is a Bluetooth Pass phrase (PIN) cracking tool. BTCrack aims to reconstruct the Passkey and the Link key from captured Pairing exchanges. Download BTcrack.
Blooover II - Blooover II is a J2ME-based auditing tool. It is intended to serve as an auditing tool to check whether a mobile phone is vulnerable. Download Blooover II.
BlueTest - BlueTest is a Perl script designed to do data extraction from vulnerable Bluetooth-enabled devices. Download BlueTest.
BTAudit - BTAudit is a set of programs and scripts for auditing Bluetooth-enabled devices. Download BTAuding.
What’s next? Let everyone know to disable Bluetooth until they really need it. Additionally, make sure to update your phone software on a regular basis.

Video Codec Malware Continues

Over the last few days we have been getting a number of new emails with links to a specific fake video codec (which is actually a Trojan) ”get_flash_update.exe“. The attack appears to have infected a number of real and legitimate web-sites to act as malware distribution points.

CNN Spam Alerts: Common PE signature

The CNN Alerts spam campaign continues this morning with new email messages and new malware hidden behind the links. The latest change to the URL scheme they are using behind the “Full Story” link is cnnvid.html, cnnhottopics.html, cnnheadlines.html, cnncurrent.html, cnnplus.html, etc which directs the user to a fake video site.

Saturday, May 31, 2008

New Trojan specializing in bank accounts to steal millions of dollars

December 15, according to foreign reports, the Trojans are becoming more advanced, more professional, more destructive. The latest discovery called "Prg Trojan" the bank Trojans successfully on a global scale theft of a commercial bank customers millions of dollars.
SecureWorksSecureWorks senior security researcher Don Jackson said it would be some senior bank fraud procedures, these procedures I am shocked by the level. JacksonIn June this year, Jackson found that the Trojans had a prototype. However, these Trojans are now forward the development. This is a middleman attack, the identification can be attacked. The Trojans will take a user through all of the steps.
Security experts, and other forms of "Prg Trojan" Trojan different, this new variant of the malicious software is a specialized implementation of bank fraud crimes. This Trojan horse program has emerged for some time. Attackers are debugging the process, in order to do a better job of this process.
Hackers are rushing to the use of the new malicious software attacks on the United States, Britain, Spain and Italy's 20 major banks. Researchers have determined that such banks Trojan variant of the Russian hacker organization UpLevel Germany and the design of relevant personnel. These hackers in Moscow and Mumbai Data Center attacks.
the user's computer was "prg Trojan" Trojan infection, the Trojans will be able to mock the victims of the online banking operations and these data transmission to the control of this process hackersThis Trojan horse of the victims began to conduct banking transactions when reminded hackers, let hackers hijack victims of the communication process, the victims do not have to visit the user name or password can take away the money in the accounts of victims.
. This special variant of the Trojans closed the theft of information that part of activities. Since it closed, we can not see it on the network communications.
This Trojan is also able to simulate percussion keyboard and all the banks in order to visit the website of the bank to avoid the police anti-fraud measures. Security experts predicted that as more and more senior anti-spam technology, the future of this variant of the Trojan program will be mainly based on the networkAttackers will find more advanced ways to install malicious software.

Vigilance: the virus to the Olympic Games as bait to deceive users open an attachment

In recent years, various kinds of virus will be put on the cloak of a gorgeous, some virus is more bait for the dissemination of the Olympic Games. Turin Olympics, worms WORM_BAGLE.EV crazy Olympics tickets sent to the email as bait in an attempt to trick users open an attachment and in strokes. TROJ_MDROPPER this year as the virus found in the annex to word the document, use the Beijing Olympics-related news reports circulated with the large number of Trojan spam, if users inadvertently run the Trojans, will install a backdoor, by hackers Remote controlIn addition to the Olympic Games, many major tournaments because of the many viewers have been using the virus. Security firms advise users: in 2008 the Chinese Olympic year, and then the European Soccer Championships will be held at a higher risk of outbreak of the virus. But as long as anti-virus software to ensure that work in the state, to update the virus, do not visit suspicious sites, do not open the e-mail of dubious origin and lay a good operating system patches, believe that no matter how rampant the virus, we are able to calmly deal with.

A high degree of vigilance control loopholes in the use of Flash page Trojan

A high degree of vigilance control loopholes in the use of Flash page Trojan
Many hackers from sales of the latest flash 0day network Ma, Ma claimed that the rate of more than 70 percent, can lead IE7, not kill, not bombs window cards, the whole patch. Visit with a malicious constructed in the swf pages, will be in the strokes.

Because it is flash plug-in loopholes that could affect the IE browser, may also be affected firefox or other third-party browser, and even affected all flash and related applications, such as QQ online, MSN scene. For example, your friends QQ stolen, unfortunately, the other posing as you and your friends to share chat scene, you may be in the strokes.

The flaw in the Adobe Flash Player 9.0.115 and earlier versions, Adobe has released the updated version 9.0.124, also issued a security bulletin.
Please update as soon as the flash plug-in vulnerability.

http://www.adobe.com/shockwave/download/flash/trigger/en/1/index.html FLASH plug-in update address: http://www.adobe.com/shockwave/download/flash/trigger/en/1/index.html
To many netizens,, flash plug-in is forced to see the plug-in advertising, to be less usefulIn extreme circumstances, can disable the plug-in. IE browser plug-in method to disable flash
firefox browser can use adblock plus plug-in will block all the swf file.

AdobeFlash Player .0.124 0.0Adobe recently released Flash Player .0.124 0.0 version also found new loopholes that could also lead to serious consequences.

LATEST THREADS

SQL injection attacks as a new threat to security challenges of the operating system

SQL injection attacks, using SQL injection of multi-level attack on the operating system can provide an interactive GUI (graphical user interface) to visit.

A European study found that, SQL injection attacks not only to databases and web pages, the impact of the huge storm can also attack as a stepping stone into the operating system.
Portculliscomputer security penetration testing of senior staff Alberto Revelli in London EUSecWest meeting demonstrated a multi-stage attacks, it can be used to attack a fundamental right to the bottom operating system for interactive GUI mode of access.

Revelli was also referred to as "icesurfer", he pointed out that today's database management systems have a number of tools and features component, can directly with the operating system and Internet connection. He said: "This means that if I can be a SQL injection attack a Web application, I will not be confined to store the data in the database, but I can also seek to obtain the DBMS (database management system) is the host of interactive Visit.

He attacks, with SQL injection attacks, IPS, the Web application firewall, and other means of escape, is designed to crack powerful system administrator passwords, Web application attacks as the initial stage. Revelli said that "in these cases, Web applications is the real goal of a stepping stone, which is deployed at the mainframe DBMS." Displayed on the EUSec Before that, he maintained a secret really some of the details.

He said that such attacks allow an attacker to damage the systems running order, and can see the results of attacks. "Under normal circumstances, such attacks would lead to enter the DOS (disk operating system) prompt, it is not very strong. My view is likely to further step, in many cases will be given to the remote database server and desktop graphics Visit.

Revelli, in its presentation will be used in Microsoft's SQL Server as an example, he said, such attacks applies to all the database technology. These weaknesses not only exists in the database software, and Web applications, firewall rule set, a number of other configurations also make it possible for such attacks. "This attack constitutes an integral part of each will use every loophole in different parts of the structure or a wrong configuration.

Once an attacker to access the database of remote access, he can view the documents, seized data, close the database, even more deeply into the network.
Revelli also plans to release this week of his attack tools Sqlninja a new version, he will demonstrate the use of such tools.

Revelli said that to defense against this database / operating system attacks need a combination of a variety of measures, including at least privileges, in-depth defense, and in the design of network security and the page will be kept in mind.

"The key is in assessing a network exposed the risks, we should not only be seen as a SQL injection stored in the database data on the threat, but should be seen as a threat to the entire network."

BE FAST ACESS AND EARN