Author Archive

Investing in Hacking

It’s said that many investors have moved their fortunes from gold to bitcoin and other crypto currencies. Investing in crypto currencies comes with a big risc and we would like to look for alternative segments which also have growth. Security stocks is globally in a growing trend at the stock market and this is something that

Hacking Tool – S3 decloaker

As the first website in the world, we got our hands on a secretly leaked hacking tool - that's still working. Our source says that Amazon knows about it but haven't still prioritized/managed to patch the vulnerability. Remember where you found it first. Only at 

How Gurkirat Singh managed hacking Facebook

Hacking Facebook – Flaw in the recovery process Gurkirat Singh is a security researcher/coder/hacker. In short this is how he managed to hack Facebook (article here). First he get’s an idea, that reseting multiple accounts on the same time could cause facebook to resend reset tokens.. Then he writes a script to crawl* different websites in order to collect facebook accounts Each

How to achieve a briliant phishing attack

Sean Cassidy shows how to achieve a briliant phishing attack on Lastpass by combining multiple security holes. This attack is powerfull because the author made a clear roadmap which checks if LastPass is installed, then logging out the user using a known vulnerability in the browser. The author tricks the user to login on the

Best practices for cloud services

Introduction Today most people have a smart phone, tablet or PC. Some years back we stored our photos on backup media such as CD or DVDs. Today different companies compete about getting access to our files. Most people today doesn’t react when a new “app” is installed and permissions is asked to our pictures, private messages or

Cloaking WordPress with “hide my WP”?

There’s a bunch of companies that provides services for cloaking the user’s website. In the previous articles Web scraping – part 1 and Web scraping – part 2 we learned how easy it was to scan multiple sites for vulnerabilities using footprints. This very exact method is dependent on that out footprints can be found on the site –

Web scraping – part 2

Web scraping In the previous article we identified the footprints to use and now it’s time to start coding. First we need to fetch content from a website. In PHP we can do this using CURL or file_get_contents. Downloading source code from website You’ll need a text editor. For this project I picked sublime. To

Web scraping – part 1

Web scraping When a hacker has identified a vulnerability in a system or platform he can choose to either report it (white hat hacker) or scan more systems with the same security hole. One way to do this is “Web scraping” which means scanning a website for specific areas and/or extracting that information. Web scraping

Protected: Trick to access to thousands of premium products.

There is no excerpt because this is a protected post.

Bypassing windows login screen – with Kon-Boot

  System Requirements: Kon-Boot 1.0 works with the 32-bit Windows versions including XP, Vista and a few Windows Server OS’s. Kon-boot is just one of many great tools out on the Internet. It has the power to remove all passwords by temporary modifying BIOS. Unfortunately it seems like the free version recently got removed from