Month: August 2012

All is locked


All is locked within the power of our minds……..

Malware Attack on 2nd Largest Liquefied Natural Gas Producer

Reports have surfaced that liquified natural gas (LNG) producer RasGas, based in the Persian Gulf nation of Qatar, has been struck by an unidentified virus, this time shutting down its website and email servers.

The malware, however, did not affect the company’s operational computers that control the production and delivery of gas, an official of the Ras Laffan Liquefied Natural Gas company. The attack reportedly began Aug. 27. The RasGas website was still unavailable on Thursday, three days after the attack.
For the second time in two weeks a virus outbreak has been reported at an energy company in that region. Earlier this week the Saudi Aramco oil company confirmed that its network was hit by a virus two weeks ago, shutting down 30,000 workstations. Neither company identified the virus, but in at least one of the cases it is believed to be malware known as “Shamoon.”
A joint venture between Qatar Petroleum and ExxonMobil, RasGas exports about 36.3 million tons of liquefied natural gas per year. The attacks come as security researchers are tracking a malware campaign directed at unspecified companies in the energy industry. Read More

Oracle releases patches for Java vulnerability CVE-2012-4681

Oracle has released a new patch which kills off a vulnerability in Java 7 that was being exploited by malware developers. “Due to the high severity of these vulnerabilities, Oracle recommends that customers apply this Security Alert as soon as possible,” Eric Maurice, the company’s director of software security assurance.

The out-of-band Security Alert CVE-2012-4681 includes fixes for “three distinct but related vulnerabilities and one security-in-depth issue” affecting Java running within the browser.
Users with vulnerable versions of Java installed can have malware silently planted on their systems just by browsing to a hacked or malicious website unknowingly.Java is a free programming language widely used to enable every day programs and website elements to function, including some games, apps and chat, as well as enterprise apps.
The attacks using this vulnerability so far have been Windows-based, the exploit was demonstrated on other platforms supported by Java 7, including OS X systems where the exploit was successfully run in the latest Safari and Firefox browsers in Mountain Lion.
The Java exploit, originally used for targeted attacks, went public last week and began to spread like wildfire after it was added to the popular BlackHole crimeware kit, making it easily accessible to all types of cybercriminals. The patches are emergency, out-of-schedule updates for Oracle. The company was not planning to release security updates for Java until October. Read More

Pakistan levels the series, beat Australia by 7 wickets in 2nd ODI

A brilliant knock of 97 off 97 balls by Nasir Jamshed comprising of 11 boundaries and 2 sixes helped Pakistan a comfortable win against Australia in the 2nd ODI here in UAE winning by 7 wickets. Azhar Ali contributed 59 off 86. Both teams are now 1-1 in the three ODI series with final match scheduled on 3rd September on Monday.


Earlier, Michael Hussey hit a resolute half-century to defy spinner Saeed Ajmal as Australia scored 248-9 in their 50 overs quota.


The 37-year-old left-hander held the innings with 61 — for his 38th one-day fifty — to help Australia recover from a precarious 87-4 after they won the toss and batted on a firm pitch at the Abu Dhabi Stadium.

Australia scored 73 runs in the last ten overs foiling Ajmal who finished with 4-32 and at one point looked threatening to keep Australia to inside 220. Read More

Sptoolkit – A Simple Phishing Toolkit

The spt project ( sptoolkit ) is an open source phishing education toolkit that aims to help in securing the mind as opposed to securing computers. A simple, targeted link is all it takes to bypass the most advanced security protections. The link is clicked, the deed is done.


spt ( sptoolkit )was developed from the ground up to provide a simple and easy to use framework to identify your weakest links so that you can patch the human vulnerability. If the spt project sounds interesting to you, please consider downloading it for evaluation in your own organization. Feedback is welcomed and always appreciated.
Basic reuirements for sptoolkit
  • Apache,
  • PHP
  • MySQL
Feature list of sptoolkit  Read More

DiskCryptor – Encrypt your partitions

Encrypting your documents protects them from prying eyes if your computer becomes lost or stolen. However, you shouldn’t stop at just encrypting your sensitive documents. A thief can recover passwords and other sensitive information stored by Windows. Even if you password-protect your Windows account, your system files can still be easily accessed, for example, from a Linux-based LiveCD


DiskCryptor – fully open solution to encrypt all partitions, including system. The program is a replacement for proprietary DriveCrypt Plus pack and PGP WDE. The only alternative to DiskCryptor that has comparable features is TrueCrypt. There are other alternatives with similar functionality, but they are fully proprietary ones, which makes them unacceptable to use for protection of confidential data.Originally, DiskCryptor was conceived as a replacement for DriveCrypt Plus Pack and PGP Whole Disk Encryption (WDE). Now, however, the aim of the development of the project is to create the best product in its category.

Safe3 sql injector – Powerful penetration testing tool for SQL Injection

Safe3SI is one of the most powerful and easy usage penetration tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a AI detection engine.


  • Full support for http, https website.
  • Full support for Basic, Digest, NTLM http authentications.
  • Full support for GET, Post, Cookie sql injection.
  • Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, SQLite, Firebird, Sybase and SAP MaxDB database management systems. Read More

Etherwall – prevents Man in The Middle (MITM) Attacks

Etherwall is a free and open source network security tool that prevents Man in The Middle (MITM) through ARP Spoofing/Poisoning attacks. It Also prevent it from various attacks such as Sniffing, Hijacking, Netcut, DHCP Spoofing, DNS Spoofing, WEB Spoofing, and others.



Hideman – Free VPN service with mutliple server locations

Virtual Private Network services are handy when you want to surf internet privately. VPN helps us to protect our surfing habits cached by website. Your internet service provider also not able to know what you are doing on internet. VPN helps you to surf anonymously.
Connections to VPNs are encrypted which means that your data is safe from snooping users in the same network. This means you do not have to fear that someone in a hotel, Internet cafe or airport can steal personal information and data from you.
Hideman provides its customers with VPN and Wi-Fi protection services. VPN is short for “Virtual Private Network,” which basically allows for an encrypted pathway between servers and hardware. As a result, all computers and web presences using a VPN are completely anonymous, ensuring unsurpassed privacy. Hideman offers this service through their special software which can be downloaded for free. In order to utilize the service, the user runs the software and manually establishes a unique IP address and country of origin. Read More

lafuzz – Local File Incursion exploiter

LaFuzz is a exploiter/fuzzer which is specify on Local File Incursion (LFI), but not just to exploit known vulnerabilities; LaFuzz takes a step forward onto exploiting unknown/0-day which is surrounding directory traversal’s vectors.


How to use:
python Read More