Pangolin 3.2.5 Released (SQL-i Testing Tool)


Pangolin is a penetration testing, SQL Injection test tool on database security. It finds SQL Injection vulnerabitlities.Its goal is to detect and take advantage of SQL injection vulnerabilities on web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user"s specific DBMS tables/columns, run his own SQL statement, read specific files on the file system and more.
Supported Database:-
Access,DB2,Informix,Microsoft SQL Server 2000,Microsoft SQL Server 2005,Microsoft SQL Server 2008,MySQL,Oracle,PostgreSQL,Sqlite3,Sybase.
Features:-
  • HTTPS support
  • Pre-Login
  • Proxy
  • Specify any HTTP headers(User-agent, Cookie, Referer and so on)
  • Bypass firewall setting
  • Auto-analyzing keyword
  • Detailed check options
  • Injection-points management
  • Injection Digger
  • Data dumper
New Features of Pangolin 3.2.5:-
  • Auto analyzing keywords before injecte with cookie.
  • Support manually select keywords.
  • Release "oracle_data.php" to customize "Remote Data URL" when injecte Oracle.
To download Pangolin Click Here 


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

WorldCall Telecom Limited (Pakistan) Hacked By bLaCk t3arS


Official website of WorldCall Telecom No. 1 telecom company is Pakistan is vulnerable to SQL-i. This vulnerability has been found by bLaCk t3arS and he also hacked the Database of that website. The hacker exposed secrete credentials like DB name, tables, columns, online user details with user-name, email-id, login IP address. Also the adim details get exposed.

Website:-

Screen shot Submitted By the Hacker:-

To see the hacked DB and leaked informations click Here


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

20 websites of US Hacked By ZHC To Enlight The 9/11 Case


20 websites of US hacked and defaced by Zcompany Hacking Crew (ZHC) to spread message. 
 

Hacked Sites:-
National Achievers Congress
http://nationalachieverscongress.org/

Home Security Systems Online

http://homesecuritysystemsonline.org/

Home Burglar Alarms
http://home-burglar-alarms.org/

Couture Roulette Institute for Women to learn about FASHION
http://coutureroulette.com/

The Ultimate Source For Your Dog' Health Problem

http://healthydogexposed.com/

Melvi Lie The Famous Graphic Designer's Official Web
http://melvylieadvertising.com/

Music on Demand Online
http://musicondemandonline.com/

OPI Gel Nail Polish
http://opigelnailpolish.net/

Make Parents and Children Relationships Strong
http://parentschildrenrelationships.com/

Secrets of Fashionable Shoes
http://secretoffashionableshoes.com/

Secrets of Fashionable Shoes
http://secretsoffashionableshoes.com/

Sovy Lie A know Fashion Stylist and Petite Expert
http://sovylie.com/
http://theshoegirlonline.com/
http://theshoeladyonline.com/
http://stylishpetiteworkshop.com/


All The Information and Research Articles on Tropical Fish
http://thanksforallthefish.org/

A Website to know about the signs of Diabetes
http://thesignsofdiabetes.com/

Stylist and Petite Workshop 2011
http://whichbodyshapeareyou.org/

A Mobile Application to read and write Hiragana

http://hiraganagarden.com/

Online Stories by Different Writers
http://sakaithomas.com/


Mirror Links:-
http://zone-h.org/mirror/id/14929360
http://zone-h.org/mirror/id/14929369
http://zone-h.org/mirror/id/14929368
http://zone-h.org/mirror/id/14929367
http://zone-h.org/mirror/id/14929366
http://zone-h.org/mirror/id/14929365
http://zone-h.org/mirror/id/14929364
http://zone-h.org/mirror/id/14929363
http://zone-h.org/mirror/id/14929362
http://zone-h.org/mirror/id/14929361
http://zone-h.org/mirror/id/14929379
http://zone-h.org/mirror/id/14929378
http://zone-h.org/mirror/id/14929377
http://zone-h.org/mirror/id/14929376
http://zone-h.org/mirror/id/14929375
http://zone-h.org/mirror/id/14929374
http://zone-h.org/mirror/id/14929373
http://zone-h.org/mirror/id/14929372
http://zone-h.org/mirror/id/14929371
http://zone-h.org/mirror/id/14929370


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Next Generation Mobile Security Solution For Android By Trend Micro Mobile Security


Trend Micro, Inc. (tyo:4704) a global cloud security leader and long-time innovator in mobile security, today announced the latest addition to Trend Micro's Mobile arsenal, Trend Micro(TM) Mobile Security Personal Edition, a solution designed to protect both Android smartphones and tablets that includes a free app scanner, lost device protection and enhanced security to block threats while surfing the Web, calling or texting.
In January 2011, Trend Micro introduced Trend Micro(TM) Mobile Security for Android(TM) during CES in Las Vegas, NV. Early features included:
  • Safe surfing
  • Parental controls
  • Download protection
  • Call and text filtering

As Android devices gain in popularity so does its use from cybercriminals. Trend Micro's threat researchers have tracked new threats targeting Android devices growing at 800% since February 2011. In this version, which also follows the release of Trend Micro's Enterprise solution, Trend Micro Mobile Security 7, a consumer's mobile devices will be better protected based on the new data that has been discovered over the last six months. New and enhanced features include:
New App Scanner: Designed to block infected apps from installing and stealing your personal information
New Lost Device Protection: From a personal online portal, you can locate a lost device, trigger an alarm, remotely lock it or even wipe it clean to protect your personal information.
Enhanced Surf, Call, and Text Security: Designed to block online threats like banking scams, blocks unwanted calls and text messages and designed to block inappropriate websites to protect your children. "We believe mobile users need to be protected against malicious applications. To help protect as many people as possible and stifle criminal attempts to steal personal and financial information we are offering our anti-malware scanner for free." said Carol Carpenter, General Manager, Consumer Business at Trend Micro.
Additional enhancements offer a secure Web-based portal that enables users to remotely find a lost device on a Google map and set off an alarm, even if the device is set to silent. If the device can't be found it can be locked from the portal and if all else fails the user can wipe the contents by triggering a factory reset. As a safeguard, if the SIM card is removed the device is also automatically locked. The Web-based portal provides an easy user experience for those who may be in a state of panic over the whereabouts of their device. They just need to remember http://www.TrendMicro.com/ilostmyandroid .
With the sheer amount of personal information now being stored and transacted via these devices it is imperative that misplaced devices be recoverable or the sensitive information deleted. Not only do these devices allow a 3rd party to run up phone and data bills, but they could potentially grant access to online banking, social networking and in some cases even provide access to home automation systems including doors and alarms.
"With over 200,000 devices currently protected with prior or Beta versions of the solution, and Trend Micro's history of protecting mobile platforms since the middle of last decade. We are confident in our ability to provide a range of solutions that enable people to live out their digital lives in a safe and secure fashion." concluded Ms Carpenter.
Trend Micro Mobile Security Personal Edition also gives users the ability to protect their web surfing, calls and texts. Leveraging the power of the Trend Micro(TM) Smart Protection Network infrastructure, which blocks over 5 billion threats daily, all websites visited on the device browser are checked against the same reputation databases that protect Trend Micro's global customer base. Parents can set web surfing policies to block inappropriate content. And calls and text message scan be blocked to avoid time wasting, costly and unwanted contact. Trend Micro Mobile Security Personal Edition is available via the Android Market and major retail stores. While the app scanner is free, the premium services, including Lost Device Protection and Surf, Call, Text Security are available for USD$29.99 for a 1 year license.


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Cyber Security Certification Program By Loyola University Marylandi

Loyola University Marylandi launching Cyber Security Certification Program in January, 2012. The Cybersecurity Certificate program is a part-time, one-year, graduate credit program open to any business professional seeking management-level certification and desiring to learn more about information assurance in the broader field of cybersecurity. The typical candidates are those whose current or future professional responsibilities require them to ensure the security of data in such areas as banking, finance, technology, engineering, human resources, and other fields. The program is designed to enhance the skills of working professionals through exposure to multiple technologies utilized in cybersecurity and information assurance; to develop leadership and enterprise-wide strategic thinking in cybersecurity policy development and procedures; and to produce graduates equipped with both the theoretical and hands-on experience required to be knowledgeable and proficient in cybersecurity at all management levels.
Learning outcomes for the program include the ability to select and implement security protocols in computer networks for local, national, and multinational organizations; the ability to describe underlying theories and strategies for securing computer networks; and the ability to develop and articulate strategic plans and policies for securing data and computer networks from inside and outside threats.
FORMAT:-
The 15-credit program is offered part-time on weekday evenings in sequential order over one year (spring, summer, and fall semesters). Classes will be held at the Columbia Graduate Center. Some courses are hands-on with labs to facilitate the delivery.
CURRICULUM:-
The certificate is a five course (15 credit) sequence offered at the graduate level. In accordance with AACSB and Loyola academic policies, within three years of completion, as many as 12 credits may be transferred into Loyola’s Professional MBA program as electives. Students currently enrolled in Loyola’s Professional MBA program may take courses offered within the certificate as electives that can be later applied to the certificate program. The Professional MBA has separate entrance requirements.
For more information click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Dubai Electricity and Water Authority (DEWA) Obtained The Highest ISO Certification in Information Security


Dubai Electricity and Water Authority (DEWA) has made a new success by obtaining the highest ISO certification (ISO 27001:2005) in Information Security.
This certification is ranked as the highest standard of quality Information Security and Protection all over the world. For the third time in a row, DEWA's Information Technology Division has passed processes of assessment, auditing and monitoring conducted by Lloyd's Register Quality Assurance Limited (LRQA).
On this occasion, Saeed Mohammed Al Tayer, MD '&' CEO of DEWA said: "DEWA is committed to implementing the vision of His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President and Prime Minister of UAE and Ruler of Dubai. The vision stresses the necessity of combining efforts of all the departments so as to achieve Dubai's strategic plan of sustainable development through attracting the most state-of-the-art technologies and solutions and combining them into its various electronic operations." "To pursue its vision as "A Recognized World-Class Utility" and to support the electronic integration in all its services, DEWA relies on implementing the most up-to-date criteria necessary to keep abreast of developments in the field of e-services, especially Information Security. This world approved system manages Information Security related to Information Technology and Risk Management in connection with the procedures of safeguarding data and assets, which in turn sheds light on its compliance with enforcing quality so as to achieve the highest criteria in its various operations," he further added.
Al Tayer pointed out: "DEWA has passed the third assessment which reflects its commitment to the best world criteria in the field of Information Security System related to Information Technology and Risk Management in connection with the procedures of safeguarding data and assets, which constitutes the basic drive of DEWA's relentless pursuit to ensure its standing and keep pace with the latest developments in the criteria of (ISO27001). DEWA's IT Division utilizes the most up-to-date technologies to manage and operate all the services and systems of IT and Infrastructure, which serve DEWA's needs." WAM/SS/AM 

-News Source (WAM, Dubai)


SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

THC-HYDRA ver7.0 (Network Logon Cracker)


THC-HYDRA is a very fast network logon cracker which support many different services. This tool is a proof of concept code, to give researchers and security consultants the possibility to show how easy it would be to gain unauthorized access from remote to a system. It was tested to compile cleanly on Linux, Windows/Cygwin, Solaris, FreeBSD and OSX.

Official change log for THC-HYDRA v7.0:-

  • New main engine for hydra: better performance, flexibility and stability
  • New option -u – loop around users, not passwords
  • Option -e now also works with -x and -C
  • Added RDP module, domain can be passed as argument
  • Added other_domain option to smb module to test trusted domains
  • Small enhancement for http and http-proxy module for standard ignoring servers
  • Lots of bugfixes, especially with many tasks, multiple targets and restore file
  • Fixes for a few http-form issues
  • Fix smb module NTLM hash use
  • Fixed Firebird module deprecated API call
  • Fixed for dpl4hydra to work on old sed implementations (OS/X …)
  • Fixed makefile to install dpl4hydra (thx @sitecrea)
  • Fixed local buffer overflow in debug output function (required -d to be used)
  • Fixed xhydra running warnings and correct quit action event
 To download THC-HYDRA ver7.0 Click Here

SHARE OUR NEWS DIRECTLY ON SOCIAL NETWORKS:-

Related Posts Plugin for WordPress, Blogger...