Site Menu

null.gif Home
null.gif MembersShow/Hide content
null.gif NewsShow/Hide content
null.gif DownloadsShow/Hide content
null.gif ContentShow/Hide content
null.gif SiteShow/Hide content
null.gif DrugsShow/Hide content
null.gif Physics
null.gif Nature
null.gif Poetry
null.gif Chess
null.gif Website
null.gif Internet
null.gif Tanakh

Site Info

Last SeenLast Seen
Server TrafficServer Traffic
  • Total: 8,502,086
  • Today: 1,297
Server InfoServer Info
  • Dec 08, 2019
  • 07:40 pm EST
 

NukeSentinel™

This is the list of NukeSentinel(tm) banned IP addresses.

  • 77.83.87.*
    • Abuse-Script
  • 91.188.246.*
    • Abuse-Script
  • 91.243.92.*
    • Abuse-Script
  • 192.186.180.*
    • Abuse-Script
  • 69.58.0.*
    • Abuse-Script
  • 23.95.188.*
    • Abuse-Script
  • 91.200.80.*
    • Abuse-Script
  • 37.114.156.*
    • Abuse-Filter
  • 23.95.117.*
    • Abuse-Script
  • 23.94.162.*
    • Abuse-Script
  • 23.95.200.*
    • Abuse-Script
  • 198.20.163.*
    • Abuse-Script
  • 69.58.6.*
    • Abuse-Script
  • 185.46.85.*
    • Abuse-Script
  • 193.9.158.*
    • Abuse-Script
  • 188.68.1.*
    • Abuse-Script
  • 192.186.134.*
    • Abuse-Script
  • 107.152.129.*
    • Abuse-Script
  • 192.186.174.*
    • Abuse-Script
  • 192.198.127.*
    • Abuse-Script

Trophy

Thank you, Navy SEALs

NukeSentinel™

You have been warned!
We have caught 2082 shameful hackers.

SouthernWolf.net: Hacking

Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 1 of 10 (58 total stories) [ 1 | 2 | 3 | 4 | 5 | 6 | > | >> ]   

The Exploit Database Score: More about Printer Friendly Send to a Friend Save as PDF

The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.

Exploit Database

Comments
Hacking
Posted by Southern on Thursday, July 24, 2014 @ 00:31:59 EDT (1591 reads) 

Expert Hacks Healthcare.gov in 4 Minutes Score: More about Printer Friendly Send to a Friend Save as PDF

Keith Koffler

In what sense is a broken website “fixed” when it’s completely insecure?

Security consultant David Kennedy, who has testified before Congress about the flaws in Healthcare.gov that have made people’s information unsafe, revealed Monday he was able to gain access to the personal records of 70,000 Obamacare enrollees in four minutes.

“It looks like it’s continuing to get worse,” Kennedy said of the website’s security fiasco.

What’s more, it appears he used methods that are available to anyone:

    We didn’t actually hack the website. This is basically from what we could find open on the Internet . . . If hackers actually target their efforts on Healthcare.gov, it’s disastrous what type of information they could actually find on the website.

Kennedy added that the very fact that the website is still so bad it crashed Monday suggests security issues must also be a problem.

White House Dossier

Comments
Hacking
Posted by Southern on Saturday, May 24, 2014 @ 00:24:17 EDT (1903 reads) 

Security and Hacking Documentation Score: More about Printer Friendly Send to a Friend Save as PDF

If you are interested in learning something about IT Security, Hacking or Vulnerability Exploitation this is the right place to start.

On this page you can find more than 250 sorted papers, 20 conferences and the links to more than 100 books on this topic.

OrkSpace

Comments
Hacking
Posted by Southern on Thursday, June 28, 2012 @ 02:25:40 EDT (1754 reads) 

Grandpa the Hacker Score: More about Printer Friendly Send to a Friend Save as PDF Read More...

Grandpa, patriot who goes by 'The Raptor,' claims credit for taking down Al Qaeda websites

Jana Winter

An American hacker, who calls himself “The Raptor” and claims to be a grandfather waging his own war on terror, is taking credit for a series of takedowns of online forums used by Al Qaeda sympathizers, FoxNews.com has learned.

Calling himself a patriot acting on behalf of U.S. troops serving overseas, The Raptor claims to be behind last month’s attack on Al Qaeda’s main online forum, Shamukh Islamic Network, and a handful of other sites and forums, including Ansar al-Mujahideen, where jihadists gather online to issue threats and exhort one another to acts of terror. The sites went down on March 22, and most remained dark for nearly two weeks. As the websites stayed offline, The Raptor taunted his targets on Twitter, daring them to “bring it.”

“Bow. Wave. Exit Stage Right. Curtains. Applause,” he tweeted after Shamukh, the main site used to blast out Al Qaeda content, was taken out of commission, only to return days later with a message blaming the outage on “Enemies of Allah.”

In the online world, where posters and hackers alike take on false personas and play a virtual game of cat and mouse, it is difficult to know if The Raptor is who he says he is, someone simply claiming credit, or if the hack attacks are part of some larger, government-related operation.

“Who is taking it down is an interesting question, but does it matter?” asked Jeff Bardin, cyberterror expert and former Air Force Arabic linguist who is now a principal at the private intelligence firm Treadstone 71.

If experts can’t be sure who is taking the jihadist sites down, it is unlikely the extremists who run them and post on them can, either. But it is all but certain they’ve been stung by the taunts of someone calling himself The Raptor, or as his Twitter handle is spelled, “the3raptor.”

Comments
Hacking
Posted by Southern on Wednesday, May 09, 2012 @ 01:18:57 EDT (1557 reads) 

Stratfor Hacked Score: More about Printer Friendly Send to a Friend Save as PDF
Hacking
Posted by Southern on Friday, January 13, 2012 @ 23:30:19 EST (1588 reads) 

Defacements Statistics 2010 Score: More about Printer Friendly Send to a Friend Save as PDF Read More...

 Almost 1,5 million websites defaced, what's happening?

Marcelo Almeida (Vympel), Boris Mutina (Minor)

stats 2010

Last year the Zone-​H archived a sad record num­ber, we archived 1.419.203 web­sites deface­ments.

Why and how this is hap­pen­ing?

If you are look­ing at on the stats, the things remain the same: file inclu­sion, sql injec­tion, web­dav attacks and shares mis­con­fig­u­ra­tion are still at the top ranks of the attack meth­ods used by the defac­ers to gain first access into the server. As an impor­tant fac­tor influ­enc­ing the stats we con­sider the fact that last year brought a very high num­ber of the local linux ker­nel exploits.

Since many years ago, Linux became the most used OS for web­servers and of course the pre­ferred tar­get for the defac­ers. Last year we archived 1.126.987 attacks against web­sites run­ning on the Linux sys­tems. The most used exploit by the defac­ers is the CVE-​2010 – 3301,that was fixed in 2007 and was mys­te­ri­ously rein­tro­duced in 2008, in a large pile of ker­nel ver­sions x86_​64.

Comments
Hacking
Posted by Southern on Thursday, January 12, 2012 @ 15:34:18 EST (1830 reads) 



Page 1 of 10 (58 total stories) [ 1 | 2 | 3 | 4 | 5 | 6 | > | >> ]   

Topics

Forums

Babes


© ThemeFreaks

GCalendar

<< December 2019 >>

S M T W T F S
1234567
891011121314
15161718192021
22232425262728
293031       

bookmark site


Bookmark Us
Bookmark Us

Set as Homepage
Set as Homepage


Support RavenNuke™

RavenNuke(tm) v2.40.01

Proverbs

20:7, The just man walketh in his integrity: his children are blessed after him.

R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months

Support Our Troops

Support Our Troops


© ThemeFreaks

Honey Pot

Bots in the pot!
We have [254] bots in the pot!

Page Generation: 0.88 Seconds