The Hacker Tools

8 High-Impact Hacking Tools to Come out of Black Hat USA

8 High-Impact Hacking Tools to Come out of Black Hat USA

High-impact tools for white hats that will be revealed and released next month at Black Hat USA in Las Vegas. 1) GitPwnd: GitPwnd evades detection by inserting attackers into common dev workflows; 2) Sandsifter: This toolset is meant to help white hats probe the weaknesses of processors; 3) AVPASS: It can effectively spy on Android anti-malware detection models and manipulate malicious apps' APKs...

ISS World: The Roving Spyware Roadshow for Dictatorships and Democracies

ISS World: The Roving Spyware Roadshow for Dictatorships and Democracies

Since it debuted in 2002 with less than 50 attendees, the Intelligence Support Systems World Conference has expanded to bring thousands of prominent spies, police, hackers and powerful bureaucrats together to spend money on some of the latest and greatest in retail spying kits. The conference’s stop in the UAE capital of Dubai, ISS World Middle East, took place over three days in early March....

Using Hacking Tools without Opening Ports on Router NAT Firewall

Using Hacking Tools without Opening Ports on Router NAT Firewall

We can expose a local server behind a NAT or firewall to the Internet by essentially bypassing restrictions on machines behind strict Firewall rules and NAT restrictions. Here's a list of the best websites to create secure tunnels for use with pentesting tools and various networking tasks by creating accounts with these services that use a disposable email account to help secure your anonymity....

The Ethereum Network: DDoS-ing Itself

The Ethereum Network: DDoS-ing Itself

On Monday, a much-hyped startup called Bancor, which wants to do away with cryptocurrency exchanges using smart tokens, managed to raise $153 million in Ether in just three hours. This was the largest Initial Coin Offering. However, the huge number of transactions being carried out as people rushed to buy Bancor tokens caused the Ethereum network to grind to a halt. In other words, the popularity...

New Research Looks at How Scammers Turn Fake News into Profit

New Research Looks at How Scammers Turn Fake News into Profit

Like many forms of online crime, scam artists have turned fake news into a purchasable service on the web. Researchers from Trend Micro catalogued the services on offer in Chinese-, Russian- and English-language dark-web cybercrime forums and online “grey” markets, where they are offered alongside “black hat” Search Engine Optimization tools; services that promise to generate social media...

FBI Hacks a Dark Web Shopper Plotting a Mail Bomb Hit: Here's How

FBI Hacks a Dark Web Shopper Plotting a Mail Bomb Hit: Here's How

These days, feds rely on various hacking methods to uncover those buying and selling illegal goods, whether drugs or weapons, on the anonymizing Tor network. In one startling Georgia-based case, involving a man who pled guilty to trying to acquire a mail bomb on a Tor-hosted market, an undercover cop was contacted by two monikers belonging to the accused, Clinton Scott Bass, over an unnamed dark...

Google News Has Been Hijacked by Spam Ads from Drugs and Dating Site

Google News Has Been Hijacked by Spam Ads from Drugs and Dating Site

Legitimate news sites listed on Google News have been hacked, replacing articles with spam ads for drugs and dating sites. The spam injection occurred on Monday 12 June and affected all users on news.google.com's Health section. Article search results were edited and replaced with headlines selling Viagra and other drugs on Canadian pharmacy websites, as well as posts advertising free...

A 12-Month Campaign of Fake News to Influence Elections Costs $400,000

A 12-Month Campaign of Fake News to Influence Elections Costs $400,000

A 77-page report released today by cyber-security firm Trend Micro explores the underground landscape of fake news including those of the Chinese, Russian, Middle Eastern, etc. The report explores several websites where customers can purchase services ranging from "discrediting journalists" to "promoting street protests," and from "stuffing online polls" to "manipulating a decisive course of...

Hackers Now Use Protection Strategies for Attack

Hackers Now Use Protection Strategies for Attack

Malicious hackers are always looking to advance their capabilities. Instead of leveraging known system vulnerabilities, though, some attackers are now seeking to use the very protection measures organizations deploy to block malicious activity against them. Let's take a look at a few sneaky techniques being employed by today's hackers: 1) Turning employee training on its head: One of the main...

A UK Company Makes it Easier for Private Companies to 'Hack Back'

A UK Company Makes it Easier for Private Companies to 'Hack Back'

For a fee, one organization will provide a system that detects and can hit back at hackers with its own arsenal of attacks. Pervade Software, a legitimate and public facing information security business based out of Cardiff, Wales, sells a platform designed for private companies to retaliate against hackers with DDoS and other digital attacks. The company's products are a sign of an industry...

8 Easy Ways to Hack End-User Devices

8 Easy Ways to Hack End-User Devices

Mostly, users are not aware of the many ways their devices are at risk. Here's a look at the easiest and most effective ways for cybercriminals to attack end-user devices: 1) Phishing: Simplest means to an end for cybercriminals looking for easy targets; 2) Wireless hijacking or interception: Occurs when a cybercriminal injects malicious payloads into an end-user device, or compromises their...

Tor Browser 7.0 Implements Multiprocess Mode, Content Sandbox and Much More

Tor Browser 7.0 Implements Multiprocess Mode, Content Sandbox and Much More

The Tor Project Team has announced the release of Tor Browser 7.0, it comes with multiprocess mode, content sandbox, and Unix domain sockets. According to the development team, it also improved performance. The Tor network implements an anonymous communication system that leverages on more than 7,000 relays set up by volunteers worldwide. The project aims to protect user’s anonymity online by...

TOP 10 Deep Web Search Engines Giving Deeper information Than Google and Bing

TOP 10 Deep Web Search Engines Giving Deeper information Than Google and Bing

When we need to search something, then Google or Bing will the first thing hit in mind suddenly. But Google and Bing will not give all the Hidden information which is served under the Deep web. “Deep web” also known as “invisible web”, the term refers to a vast repository of underlying content, such as documents in online databases that general-purpose web crawlers cannot reach. The...

Computer Security Pros: Hacking the Hackers

Computer Security Pros: Hacking the Hackers

A malicious hacker (named Rick) previously had been attacking Roger A. Grimes (Columnist, CSO). Roger had sent him an email the day before letting him know that he knew all the details regarding the hacker. But hacker still persisted. The next night, Roger could tell by the sluggishness of his internet connectivity that the threatened DDoS attack was starting to happen. So, Roger hacked into...

  • More at CSO
  • |
  • |
Google will Pay You $200,000 if You Can Hack Android

Google will Pay You $200,000 if You Can Hack Android

In the past year, Google said it had received more than 450 vulnerability reports from researchers, with the average pay-out per expert jumping by over 50%. The total amount of rewards issued doubled to a massive $1.1 million. It is clear white-hat hacking comes with some perks. Due to this, Google said it had decided to increase the top-line pay-outs of its "Security Rewards" program. In a fresh...

Dark Web Users of a Child Porn Website Traced After Visiting File Sharing Site

Dark Web Users of a Child Porn Website Traced After Visiting File Sharing Site

The U.S. Department of Homeland Security has identified dark web users after they downloaded media through a file sharing services. According to court filings, the suspects shared links to password-protected child pornography media on the Ziifile file sharing service available in the Internet. The court order doesn’t explicitly report the name of the child porn website that was referred by the...

Read about the latest cyber and network security tools

This category provides expertly curated news on the futuristic, in-use and old-school hacker tools. The prime objective of news disseminated under this category is to educate ethical hackers and cyber defense teams about the network security tools and other IT security tools they can use to secure organizational networks and the hacking tools used by the cyber criminals to conduct cyber attacks and raid organizational networks. The news cards published under this category provide an in-depth analysis of these tools and toolkits used in various attacks by the hackers explaining the why and how these tools were used and in what circumstances they prove beneficial for the hackers. Awareness about the arsenal of the enemy is the key to gauging his strength. No professional hacker can afford to miss the news updates under this category. Additionally, the new tools for ethical hackers and cyber defense teams are also discussed under this category.