Operation Intifada By Anonymous (DDOS attack on Israel Gov)


The latest target of Operation Anonymous, which following the dissolution of LulzSec is the last substantial non-amorphous hacker collective left out there, could lead to some substantial geopolitical fallout. That is because the target of the just announced upcoming DDOS attack is none other than the Israeli Parliament, the Knesset, and while Israel has allegedly been happy to dispense hack attacks in the past, the onslaught on the Iranian nuclear power plant courtesy of the Stuxnet virus coming to mind, we doubt it will as happy to be seen on the receiving end of decentralized computer warfare. Either way, with the world focusing on Greece tomorrow, this development, and specifically what form of retaliation Israel adopts, will be yet another important factor to keep track of over the next 24 hours. 
-Source Zerohedge


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Vulnerability in Standford University & China-airlines Website found by Minhal

Vulnerability in Standford University & China-airlines Website found by Minhal Mehdi. He found XSS Vulnerablity Found in China-airline's website and Multiple vulnerabilities Found in Standford University's website. 


Standford University:-





China-Airlines:-


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Pine Hill Waldorf School Webiste Hacked By Striker (ICA)


Pine Hill Waldorf School of USA Webiste Hacked By Striker (ICA)

Hacked Site:- 

The Hacker Also Gave a Message to the Admin of the site and that is:- 

"Reason for Attack is Treat Indians equal to all Americans they may have left our country but wee are still here for them reduce the admission cost for Indians and equal respect for them or you will get fucked again "

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Lahore HIigh Court's Website of Pakistan is Vulnerable and it's DB has been Exposed by Zero


The official website of Lahore High Court of Pakistan Govt. is vulnerable to SQL-i. This Vulnerability has been found by Zero. Also he hacked and Exposed the Data Base. 

Vulnerable Site:-
Vulnerable Link:-


Data Base Link:-

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Anonymous takes down Tunisian government site (AntiSec Continues)


Albeit LulzSec calling it quits, the hacking saga continues. Hacker group Anonymous claimed responsibility of taking down Tunisian government's official website moments ago. The seized domain now displays text posted by Anonymous, along with a masked image that signifies the hacker collective. The display post alleged that the Tunisian government "ignored demands from Anonymous" to withdraw from their "quest for internet censorship." The hacking group claimed that "more and more have joined Anon, only to prove that for each fallen Anon there are many."
The note declared that in the "heights of #ANTISEC, people from all over the world will join united against corrupt governments throughout the world including Government of Tunisia and fight for freedom." Apparently the hacker group is driving home a point by taking down the government site, as stated in the display note. "We will not stop until internet censorship is a word in the history books," asserted Anonymous.
They called upon the people of Tunisia to continue "fighting for truth" and "know that ANTISEC is on their side." The 'protest' note also said, "We believe freedom of speech and freedom of knowledge is a basic human right."
Anonymous declared that the internet is "the last frontier" and that they "will not let corrupt governments spoil that."

The closing statement of the release said "We are Anonymous, We are LulzSec, We are People from around the world who are stepping in the name of freedom."

President Abidine Ben Ali of Tunisia had gained notoriety by filtering and blocking various Internet sites, including social networking sites Facebook and YouTube. Though the Internet restrictions have been lessened considerably following the president's ouster, sites which criticize Tunisia's human rights record still remain blocked in the country, including Amnesty International (www.amnesty.org), Freedom House (www.freedomhouse.org) and Reporters Without Borders (www.rsf.org and www.rsf.fr).

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

2 Indian Guys Busted for online Bank Hacking Case


The Cyber Crime Police, Cyberabad, arrested two persons, including a Nigerian national, Nebeolisa Olisaeloka Sunday alias Mike, 31 and an Indian student, Bharath Bhushan, 24, in Delhi for siphoning off Rs 1.82 lakh from a Hyderabad-based person's bank account, which occurred on May 13 at ICICI Bank, Madhapur. The police seized net cash of $5,100, Rs 4,000 (Indian currency), MTS data card (9136966232), two laptops, a Rolex watch, four cellphones and other documents from their possession. The Cyber Crime Police, Cyberabad received a complaint from a private employee, N Venkata Raghu Vara Prasad, 32 stating that someone had hacked his bank account and siphoned off Rs 1,82,565. The culprits had debited the amount and transferred the same to eBay vide bill Nos 000225488530 and 00022548979 and purchased some articles.
After correspondence with the bank, he approached the Cyber Crime Police and lodged a complaint. Accordingly, police registered a case and began investigation.

-News Source TOI

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

XSSF Cross-Site Scripting Framework v.2.0


The Cross-Site Scripting Framework (XSSF) is a security tool designed to turn the XSS vulnerability exploitation task into a much easier work. The XSSF project aims to demonstrate the real dangers of XSS vulnerabilities, vulgarizing their exploitation. This project is created solely for education, penetration testing and lawful research purposes.
 
New Features of XSSF Cross-Site Scripting Framework v.2.0:-

Fixed URI size issue on XSSF ask request
Fixed relative URI issue for HTTPS tunnel mode
Added missing error message when module fail to run
Bad copy paste of other module
and more
 
Download XSSF Cross-Site Scripting Framework v.2.0 here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...