• Dog tunnel P2P port mapping open source tool

    Goudong is a high-speed P2P port mapping tool, which also supports Socks5 proxy. Open source starts after version 0.5, The UDP bottom layer is rewritten based on the open source library KCP, which greatly improves the efficiency and has obvious advantages in harsh environments. At the same time, non P2P version (Lite version) is provided. The connection process at both ends does not rely on the intermediate server at all. It supports encryption and login authentication, and automatic reconnection. However, it needs to manually ensure that both ends can connect normally (otherwise, please use the default P2P version) function The remote designated port can be mapped to the near end through the doghole for high-speed access characteristic ... read the whole passage
    Author: qxz_xp | Published: November 26, 2015 | Classification: Hacker Tools , Hacker attack and defense | 3 comments
  • Corebot: a highly modular information theft software

    IBM has discovered a new type of data theft malware called Corebot. It is a highly modular malware, and some security detection systems will recognize CoreBot as Dynamer! Ac or Eldorado. It specializes in stealing system, email credentials, and software keys, and even downloading and executing other malicious programs. Once the attacker collects the above sensitive information, it will be sold to criminal organizations. Relatively speaking, what can attract the attention of security researchers is information theft malware, remote access tool (RAT), ransomware read the whole passage
    Author: qxz_xp | Published: September 3, 2015 | Classification: Industry News , Hacker attack and defense | 2 comments
  • Technical Disclosure "QQ Space" Automatically Forwards Bad Information

    We often see that QQ space automatically forwards some bad information with links, even though our QQ password has not been stolen. Recently, through the analysis of a QQ space automatic forwarding link, it was found that the automatic forwarding mechanism carefully constructed the code to obtain the user's QQ number and key value by using the vulnerable page of Tencent website, thus obtaining some sensitive operation permissions of the user. And through this vulnerability, it automatically forwards some bad information to induce users to click, thus leading to large-scale dissemination. Communication phenomenon If one day, you find many Q's read the whole passage
    Author: qxz_xp | Published: August 23, 2015 | Classification: Hacker technology , Hacker attack and defense | 2 comments
  • Router Scan v2.52 Release

    Router Scan is a router security testing tool that can specify IP segments to perform security tests such as brute force cracking on routers, and supports multiple TP-LINK Routers of Huawei, Belkin, D-Link and other major brands are a set of security testing tools developed by Russian security personnel. Support router model Black 2.0 (в разработке) DSL-AC68U EA-N66 RT-AC66R RT-AC87U RT-N11P RT-N66W WL-566gM HG – Cisco: Linksys WRT54G2 – D-Link: DAP-1150 ... read the whole passage
    Author: qxz_xp | Published: July 26, 2015 | Classification: Hacker Tools , Hacker attack and defense | 5 comments
  • Penetration test artifact Burp Suite v1.6.17 cracked version download

    The cracking method provided in this article is for software trial only, please delete it within 24 hours as everyone knows, Burp Suite is a resounding web application penetration test integration platform. From the initial mapping and analysis of the application attack surface to the process of finding and exploiting security vulnerabilities, all tools work together seamlessly to support the overall test program. All tools in the platform share the same robust framework to uniformly handle HTTP requests, persistence, authentication, upstream agents, logging, alarms, and scalability. Burp Suite allows attackers to read the whole passage
    Author: qxz_xp | Published: May 7, 2015 | Classification: Hacker Tools , Hacker attack and defense | 7 comments
  • Overall, 2014 domestic and foreign data leakage events

    Verizon released the 2014 Data Leakage Investigation Report, which reviewed 63737 cyber security incidents and 1367 confirmed data leakage incidents. The report data shows that the information leakage caused by the database is up to 25%. Make an inventory of the data leakage events at home and abroad in 2014, and explore the underlying technical reasons. In fact, there are still many leakage events, which are either under investigation, unconfirmed or undisclosed. It can be predicted that more serious leakage events may occur in 2015. FreeBuf Science Popularization: What is read the whole passage
    Author: qxz_xp | Published: December 22, 2014 | Classification: Industry News , Hacker attack and defense | No comment
  • Uncover: Malware Toolkit for PoS

    In the last two years, PoS malware due to Target, Home Depot The POS attack that Kmart encountered has attracted wide attention. With the arrival of Black Friday shopping season, PoS malware is bound to attract attention. PoS attackers will not only rely on their own malware to attack and steal victim data. They will also use a large number of other tools to achieve their goals. Some are also used by system administrators, such as putty, and some are software in the Sysinternals Suite toolkit provided by Microsoft. Through these workers used by hackers read the whole passage
    Author: qxz_xp | Published: November 24, 2014 | Classification: Industry News , Hacker attack and defense | No comment