Accessing a Windows computer without knowing the password is fairly simple with this free tool called Kon-Boot .There are alternatives like Ophcrack etc, but those rely on grabbing the SAM hashes and cracking those. What sets Kon-Boot apart is that is modifies the kernel on-the-fly while booting (everything is done virtually – without any interferences … Read More “Kon-Boot” »
Category: Uncategorized
It is hard to identify files containing Conficker because the executable are packed and encrypted. When Conficker runs in memory it is fully unpacked. Our memory disinfector scans the memory of every running process in the system and terminates Conficker threads without touching the process it runs in. This helps to keep the system services … Read More “Conficker Killer” »
Dan Kaminsky packaged a nice standalone .exe by the researchers with the HoneyNet Project (Tillmann Werner and Felix Leder) , that scans for infected conficker computers on the network. They recently discovered an easy way to identify infected systems remotely. Conficker attempts to patch the MS08-067 vulnerability during infection. A flaw in the patch causes … Read More “Conficker Scanner” »
Ashton Kutcher got an online buzz with his sneak pic of his wife’s ass on twitter http://twitpic.com/2bj58 I guess it’s almost as good as the ones we stole from his phone
damn you’re getting old , we should call you petrified_wood
even though they made shitloads of money off their older versions before a bunch of open source alternatives finallycame, l0pht isgoing back to their roots and releasing a newer version, no word of whatupdates itcontains but check out l0phtcrack.com for more info
New code found for the internet explorer 7 exploit making the rounds http://milw0rm.com/exploits/8077 add your own un-escaped shellcode with this tool ::HERE:: and you’re good to go.
Her Twitter account was owned ::Screenshot:: Just like her gmail and youtube accounts before.