Metasploitable 2: UnreaIRCD IRC daemon
The Nmap scan of Metasploitable 2 revealed: PORT STATE SERVICE VERSION 6667/tcp open irc Unreal ircd 6697/tcp open irc Unreal ircd UnreaIRCD is an Internet Relay Chat service. This exploit has been...
View ArticleMetasploitable 2: Port 8787 Open and Unknown
The Nmap scan of Metasploitable 2 revealed: PORT STATE SERVICE VERSION 8787/tcp open unknown As we can see this Nmap scan did not recognise the service signature running on port 8787 and so...
View ArticleMetasploitable 2: The Roundup
It has been rather enjoyable and satisfying hacking my way through Metasploitable 2. The process has consolidated some rather disparate knowledge in my brain and I’ve learned loads. I thoroughly...
View ArticleMutillidae II: SQLMAP with WebScarab
Having completed my incursion into Metasploiitable 2 I’m beginning my foray into Mutillidae II. This is my first time using SQLmap and I thought you could simply aim it at a known vulnerable web page...
View Article@BSidesLondon YouTube Vidoes
Videos are being posted on YouTube of the recent BSidesLondon conference, which are well watching. I’m halfway through: Rafal Wojtczuk – Lol Layers on Layers Bypassing Security for Fun and Profit Over...
View ArticleMarkets for Cybercrime Tools and Stolen Data Hackers’ Bazaar
Thought I’d share a PDF on research relating to the characteristics of cyber criminal activity and black (and Grey) markets. This was part of the recommended reading for my Malware course and makes for...
View ArticleBreaking Bad cybercrime
Thought I’d highlight an informative and entertaining blog post written by Dave Waterson using the springboard of the TV crime drama series Breaking Bad to draw comparisons between the underground drug...
View ArticleHacking the Hackers: How FinFisher was Breached
I first came across Gamma International on the Enemies of the Internet website: Gamma International offers advanced spyware, which has repeatedly been discovered in countries who mistreat journalists,...
View ArticleThe odd paucity of Cisco exploit research
It’s a strange thing. I can find voluminous exploit research in books and online on every topic under the sun; on every platform, covering all manner of software and hardware, with the exception of...
View ArticleIs Tcl programming language the best kept secret in hacking?
Actually the Tcl (Tool Command Language) developers website says: Many have called it the “best-kept secret in the software industry”. They also say: Tcl (Tool Command Language) is a very powerful but...
View Article