by admin
Friday, April 24th, 2009 at 11:34 pm
Like Kon-boot we talked about in our last post vbootkit 2.0 is an updated code from 2007 that hasnt hit the internet yet , but is pretty much the same idea, modify the bootmgr and you essentially can modify the security checks on the fly to let you do anything you wanted on the system as any user without knowing the password read more from there authors site ::HERE::
by admin
Monday, March 30th, 2009 at 7:15 pm
It is hard to identify files containing Conficker because the executable are packed and encrypted. When Conficker runs in memory it is fully unpacked. Our memory disinfector scans the memory of every running process in the system and terminates Conficker threads without touching the process it runs in. This helps to keep the system services running.
The tool itself and the source code can be downloaded here:
And here is a tool to remove the registry entries
regnfile.exe 599 K
More info can be found here
by admin
Monday, March 30th, 2009 at 5:27 am
Dan Kaminsky packaged a nice standalone .exe by the researchers with the HoneyNet Project (Tillmann Werner and Felix Leder) , that scans for infected conficker computers on the network. They recently discovered an easy way to identify infected systems remotely. Conficker attempts to patch the MS08-067 vulnerability during infection. A flaw in the patch causes the machine to respond differently than both an unpatched system and an officially patched system. Their scanner uses this knowledge to scan and identify the infected computers. McAfee, nCircle, Nmap, Qualys, and Tenable (Nessus) and most have already incorporated, or are about to incorporate, Conficker sigs for their scanners, but for now you can get
Dan’s .exe ::Here::
More info on the python script ::HERE::
by admin
Sunday, March 22nd, 2009 at 9:45 am
Ashton Kutcher got an online buzz with his sneak pic of his wife’s ass on twitter
http://twitpic.com/2bj58 I guess it’s almost as good as the ones we stole from his phone 

by admin
Tuesday, March 10th, 2009 at 4:33 pm
damn you’re getting old , we should call you petrified_wood

by admin
Sunday, March 1st, 2009 at 12:21 am
even though they made shitloads of money off their older versions before a bunch of open source alternatives finallycame, l0pht isgoing back to their roots and releasing a newer version, no word of whatupdates itcontains but check out l0phtcrack.com for more info
by admin
Friday, February 20th, 2009 at 6:52 pm
New code found for the internet explorer 7 exploit making the rounds http://milw0rm.com/exploits/8077 add your own un-escaped shellcode with this tool ::HERE:: and you’re good to go.