\', SouthernWolf.net, \' - \', , \'
  Login or Register
Site Info
Server TrafficServer Traffic
  • Total: 10,041,283
  • Today: 1,504
Server InfoServer Info
  • Sep 30, 2023
  • 04:33 pm EDT
 
 
NukeSentinel™
This is the list of NukeSentinel(tm) banned IP addresses.

  • 158.178.141.*
  • 172.176.83.*
  • 49.13.18.*
  • 146.70.173.*
  • 104.200.131.*
  • 4.196.165.*
  • 51.75.209.*
  • 146.70.133.*
  • 54.36.175.*
  • 91.132.144.*
  • 179.60.147.*
  • 185.225.28.*
  • 93.35.128.*
  • 54.36.173.*
  • 81.19.135.*
  • 146.59.52.*
  • 51.83.238.*
  • 156.146.57.*
  • 196.196.53.*
  • 212.102.49.*

 
NukeSentinel™
You have been warned!
We have caught 2710 shameful hackers.

 
Modules
 
 

SouthernWolf.net: Hacking



Search on This Topic:   
[ Go to Home | Select a New Topic ]


Page 1 of 10 (58 total stories) [ 1 | 2 | 3 | 4 | 5 | 6 | > | >> ]  

The Exploit Database Score: More about Printer Friendly Send to a Friend Save as PDF 
Hacking

The Exploit Database (EDB) – an ultimate archive of exploits and vulnerable software. A great resource for penetration testers, vulnerability researchers, and security addicts alike. Our aim is to collect exploits from submittals and mailing lists and concentrate them in one, easy to navigate database.

Exploit Database


Comments comments
Posted by Southern on Wednesday, July 23, 2014 @ 23:31:59 EDT (1936 reads)

Expert Hacks Healthcare.gov in 4 Minutes Score: More about Printer Friendly Send to a Friend Save as PDF 
Hacking

Keith Koffler

In what sense is a broken website “fixed” when it’s completely insecure?

Security consultant David Kennedy, who has testified before Congress about the flaws in Healthcare.gov that have made people’s information unsafe, revealed Monday he was able to gain access to the personal records of 70,000 Obamacare enrollees in four minutes.

“It looks like it’s continuing to get worse,” Kennedy said of the website’s security fiasco.

What’s more, it appears he used methods that are available to anyone:

    We didn’t actually hack the website. This is basically from what we could find open on the Internet . . . If hackers actually target their efforts on Healthcare.gov, it’s disastrous what type of information they could actually find on the website.

Kennedy added that the very fact that the website is still so bad it crashed Monday suggests security issues must also be a problem.

White House Dossier


Comments comments
Posted by Southern on Friday, May 23, 2014 @ 23:24:17 EDT (2251 reads)

Security and Hacking Documentation Score: More about Printer Friendly Send to a Friend Save as PDF 
Hacking

If you are interested in learning something about IT Security, Hacking or Vulnerability Exploitation this is the right place to start.

On this page you can find more than 250 sorted papers, 20 conferences and the links to more than 100 books on this topic.

OrkSpace


Comments comments
Posted by Southern on Thursday, June 28, 2012 @ 01:25:40 EDT (2047 reads)

Grandpa the Hacker Score: More about Printer Friendly Send to a Friend Save as PDF Read More... 
Hacking

Grandpa, patriot who goes by 'The Raptor,' claims credit for taking down Al Qaeda websites

Jana Winter

An American hacker, who calls himself “The Raptor” and claims to be a grandfather waging his own war on terror, is taking credit for a series of takedowns of online forums used by Al Qaeda sympathizers, FoxNews.com has learned.

Calling himself a patriot acting on behalf of U.S. troops serving overseas, The Raptor claims to be behind last month’s attack on Al Qaeda’s main online forum, Shamukh Islamic Network, and a handful of other sites and forums, including Ansar al-Mujahideen, where jihadists gather online to issue threats and exhort one another to acts of terror. The sites went down on March 22, and most remained dark for nearly two weeks. As the websites stayed offline, The Raptor taunted his targets on Twitter, daring them to “bring it.”

“Bow. Wave. Exit Stage Right. Curtains. Applause,” he tweeted after Shamukh, the main site used to blast out Al Qaeda content, was taken out of commission, only to return days later with a message blaming the outage on “Enemies of Allah.”

In the online world, where posters and hackers alike take on false personas and play a virtual game of cat and mouse, it is difficult to know if The Raptor is who he says he is, someone simply claiming credit, or if the hack attacks are part of some larger, government-related operation.

“Who is taking it down is an interesting question, but does it matter?” asked Jeff Bardin, cyberterror expert and former Air Force Arabic linguist who is now a principal at the private intelligence firm Treadstone 71.

If experts can’t be sure who is taking the jihadist sites down, it is unlikely the extremists who run them and post on them can, either. But it is all but certain they’ve been stung by the taunts of someone calling himself The Raptor, or as his Twitter handle is spelled, “the3raptor.”

 Read More...
Comments comments
Posted by Southern on Wednesday, May 09, 2012 @ 00:18:57 EDT (1983 reads)

Stratfor Hacked Score: More about Printer Friendly Send to a Friend Save as PDF 
Hacking
Posted by Southern on Friday, January 13, 2012 @ 22:30:19 EST (1859 reads)

Defacements Statistics 2010 Score: More about Printer Friendly Send to a Friend Save as PDF Read More... 
Hacking

 Almost 1,5 million websites defaced, what's happening?

Marcelo Almeida (Vympel), Boris Mutina (Minor)

stats 2010

Last year the Zone-​H archived a sad record num­ber, we archived 1.419.203 web­sites deface­ments.

Why and how this is hap­pen­ing?

If you are look­ing at on the stats, the things remain the same: file inclu­sion, sql injec­tion, web­dav attacks and shares mis­con­fig­u­ra­tion are still at the top ranks of the attack meth­ods used by the defac­ers to gain first access into the server. As an impor­tant fac­tor influ­enc­ing the stats we con­sider the fact that last year brought a very high num­ber of the local linux ker­nel exploits.

Since many years ago, Linux became the most used OS for web­servers and of course the pre­ferred tar­get for the defac­ers. Last year we archived 1.126.987 attacks against web­sites run­ning on the Linux sys­tems. The most used exploit by the defac­ers is the CVE-​2010 – 3301,that was fixed in 2007 and was mys­te­ri­ously rein­tro­duced in 2008, in a large pile of ker­nel ver­sions x86_​64.

 Read More...
Comments comments
Posted by Southern on Thursday, January 12, 2012 @ 14:34:18 EST (2198 reads)



Page 1 of 10 (58 total stories) [ 1 | 2 | 3 | 4 | 5 | 6 | > | >> ]  

Topics
Liberty
 
 
Forums

Logo Design and Raven Nuke themes
Papa Mike Creations is BACK!
Energy equals velocity
Black Vortices
Environment
Starships
Microbes
Inverses
Only Down
Question

 
GCalendar
<< September 2023 >>

S M T W T F S
          12
3456789
10111213141516
17181920212223
24252627282930

 
Proverbs
19:1, Better is the poor that walketh in his integrity, than he that is perverse in his lips, and is a fool.
 
R.O.P.: R.I.P.

Thousands of Deadly Islamic Terror Attacks Since 9/11


Islam spreads like a virus....
more: Islam violence



List of Islamic Terror Attacks For the Past 2 Months
 
Honey Pot
Bots in the pot!
We have [363] bots in the pot!

 
 
Page Generation: 2.53 Seconds

:: fisubice phpbb2 style by Daz :: PHP-Nuke theme by www.nukemods.com ::
:: fisubice Theme Recoded To 100% W3C CSS & HTML 4.01 Transitional & XHTML 1.0 Transitional Compliance by RavenNuke™ TEAM ::

:: W3C CSS Compliance Validation :: W3C HTML 4.01 Transitional Compliance Validation :: W3C XHTML 1.0 Transitional Compliance Validation ::