Home Install Usage Learn E.Book MAP

Tuesday, November 15, 2011

Can You Crack It? A Challenge



hacking-challenge
Cyber security and defense is now an important field of interest because of rising hacking attacks on small networks and enterprise networks. Even government organizations are not secure, with hacker groups like Anonymous, Lulzsec and others having been and remaining a threat. So the point of consideration is that an organization should have enough security researchers, penetration testers and the solution to fight against these hacking attacks.

Ethical hackers or penetration testers would be a first level of defense for a network and a web application because they attack like a black hat hacker attack, they find the vulnerabilities (weaknesses) of a network. So how can an organization judge the skills of a penetration tester? There are different ways. Well we want to challenge your skills as a cracker and a ethical hacker, via the challenge Can You Crack It? As this is the title of this article, you must have had an idea that this article would show you a challenge.
We challenge your skills, so if you want to judge your own skills and abilities then try to crack it. We have a plan and you'll need to crack this code available on this website:
So I hope that you will accept my challenge and hopefully you will be the one who cracks it.
Source:  Ethical Hacking

Monday, November 14, 2011

An Active Record in Locating and Finding Vulnerabilities

With over 14 years of security and penetration testing services and an active record in locating and finding vulnerabilities in major software, we are dedicated to helping companies become more secure. Our clients include several “Fortune 500″ companies and various US Government agencies, all which enjoy the highest standards in Penetration Testing services and cyber security. With ample experience in networking security, wireless security, blackbox testing, physical security and social engineering our team is your full service security provider.

 
Date D A V Description
Plat. Author
2011-07-02 - Verified HP Data Protector 6.11 Remote Buffer Overflow + DEP Bypass 1704 windows muts and dookie
2010-07-06 - Verified Sun Java Web Server 7.0 u7 Admin Interface DoS 1672 windows muts
2009-09-01 - Verified Microsoft IIS 5.0 FTP Server Remote Stack Overflow Exploit (win2k sp4) 2417 windows muts
2008-12-10 - Verified MS Internet Explorer XML Parsing Buffer Overflow Exploit (vista) 0day 665 windows muts
2008-04-18 - Verified DivX Player 6.6.0 SRT File SEH Buffer Overflow Exploit 412 windows muts
2008-04-02 - Verified Novel eDirectory HTTP Denial of Service Exploit 378 windows muts
2008-04-02 - Verified Mcafee EPO 4.0 FrameworkService.exe Remote Denial of Service Exploit 451 windows muts
2008-04-02 - Verified HP OpenView NNM 7.5.1 OVAS.exe SEH PRE AUTH Overflow Exploit 734 windows muts
2008-03-26 - Verified PacketTrap Networks pt360 2.0.39 TFTPD Remote DoS Exploit 391 windows muts
2008-03-26 - Verified Quick TFTP Pro 2.1 Remote SEH Overflow Exploit (0day) 519 windows muts
2008-03-26 Download Vulnerable Application Verified TFTP Server for Windows 1.4 ST Buffer Overflow Exploit (0day) 1039 windows muts
2007-12-12 - Verified HP OpenView Network Node Manager 07.50 CGI Remote BoF Exploit 407 windows muts
2007-11-26 - Verified Apple QuickTime 7.2/7.3 RTSP Response Universal Exploit (IE7/FF/Opera) 446 windows muts
2007-10-27 - Verified IBM Tivoli Storage Manager 5.3 Express CAD Service BoF Exploit 443 windows muts
2007-06-03 - Verified IBM Tivoli Provisioning Manager PRE AUTH Remote Exploit 508 windows muts
2007-04-09 - Verified MS Windows .HLP File Local HEAP Overflow PoC 0day 481 windows muts
2007-04-09 - Verified Microsoft Office Word 2007 Multiple Vulnerabilities 561 windows muts
2007-03-31 - Verified IBM Lotus Domino Server 6.5 PRE AUTH Remote Exploit 705 windows muts
2007-03-21 Download Vulnerable Application Verified Mercur Messaging 2005 <= SP4 IMAP Remote Exploit (egghunter mod) 448 windows muts
2006-10-01 - Verified McAfee ePo 3.5.0 / ProtectionPilot 1.1.0 (Source) Remote Exploit 661 windows muts

2006-08-26 - Verified MDaemon POP3 Server < 9.06 (USER) Remote Heap Overflow Exploit 721 windows muts
2006-07-05 - Verified WinRAR <= 3.60 beta 6 (SFX Path) Local Stack Overflow Exploit 520 windows muts
2005-12-20 Download Vulnerable Application Verified Eudora Qualcomm WorldMail 3.0 (IMAPd) Remote Overflow Exploit 829 windows muts
2005-12-19 - Verified MailEnable Enterprise Edition 1.1 (EXAMINE) Buffer Overflow Exploit 437 windows muts
2005-05-01 Download Vulnerable Application Verified GlobalScape Secure FTP Server 3.0 Buffer Overflow Exploit 489 windows muts
2004-11-29 - Verified Mercury Mail 4.01 (Pegasus) IMAP Buffer Overflow Exploit 439 windows muts
2004-11-18 Download Vulnerable Application Verified SLMail 5.5 POP3 PASS Buffer Overflow Exploit 1075 windows muts
2004-10-26 - Verified BaSoMail Multiple Buffer Overflow Denial of Service Exploit 434 windows muts
2004-10-26 Download Vulnerable Application Verified MailCarrier 2.51 SMTP EHLO / HELO Buffer Overflow Exploit 647 windows muts
2004-10-21 - Verified Ability Server 2.34 FTP STOR Buffer Overflow 944 windows muts
Source: Exploits Database
Related Posts Plugin for WordPress, Blogger...