diff --git a/cache/browser/35504159817dfba1706512be7e023fba2055af83 b/cache/browser/35504159817dfba1706512be7e023fba2055af83 deleted file mode 100644 index bcbd9ef8..00000000 --- a/cache/browser/35504159817dfba1706512be7e023fba2055af83 +++ /dev/null @@ -1,82 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.5e-05 -body: "html,body,div,span,object,h1,h2,h3,h4,h5,h6,p,blockquote,pre,a,address,code,img,small,strong,dl,dt,dd,ol,ul,li,fieldset,form,label{margin:0;padding:0;border:0;outline:0;font-size:100%;vertical-align:baseline;background:transparent;}body{font-size:14px;font-family:helvetica,arial,sans-serif;letter-spacing:0.2px;}ol,ul{list-style:none;}h2{font-size:27px;}h3{font-size:20px;}h4 span span strong{color:black!important;}a{color:#2279A2;text-decoration:none!important;}a:hover{text-decoration:underline!important;}body{background:#242424 url(img/background.jpg) repeat;}#wrap{width:1075px;margin:auto;}#header{margin-top:40px;position:relative;}#header h1 a{background:url(img/logo.png) no-repeat;width:270px;height:37px;text-indent:-9999px;float:left;}#menu{text-align:right;display:inline-block;position:absolute;right:0;}#menu li{float:left;margin-left:20px;font-size:14px;font-family:tahoma,verdana,helvetica,arial,sans-serif;}#menu li a{color:white;text-decoration:none!important;}.current_page_item a div{background-color:#87b440!important;}#menu li a:hover .menuLine{background-color:#136287;}#menu li .menuLine{color:white;background-color:#20485a;font-size:8px;font-weight:bold;padding:1px 3px 1px 0;font-family:helvetica,arial,sans-serif;}#menu li #active{background-color:#87b440;}#main{clear:both;overflow:hidden;}#main #primary{float:left;width:700px;margin-top:60px;position:relative;}#main #primary h2{color:white;font-weight:400;margin-top:10px;margin-bottom:10px;}#main #primary #morePrev{background-color:#e3e3e3;border:1px solid white;padding:20px;}#main #primary #morePrev #more{float:right;}.topLine{height:10px;width:100%;background-color:#2279a2;}#main #sidebar{float:right;width:300px;margin-top:60px;}#main #sidebar h2{color:white;font-weight:400;margin-top:10px;margin-bottom:10px;}#main #sidebar .widget{margin-bottom:20px;}#main #sidebar .widget ul{background-color:#e3e3e3;padding:20px;border:1px solid white;font-size:12px;}#main #primary .post-item{background:#e3e3e3;margin-bottom:38px;border:1px solid white;overflow:hidden;position:relative;padding:20px;}#main #primary .post-item h2{color:#2c2c2c;margin:0;line-height:1em;}.the-title{font-size:27px;text-align:center;}.post-item img{border:none;}.post-item p.meta{font-size:10px;}.post-item p.comments{position:absolute;bottom:10px;right:10px;}.post-item p{font-size:14px;line-height:20px;margin:20px 0 20px 0;}.post-item blockquote{color:#575757;font-style:italic;}.post-item code{background-color:#000000;border:1px solid #000000;border-radius:6px 6px 6px 6px;color:#D8D8D8;padding:10px;text-shadow:none;}.post-item ul{list-style:circle;}.topLine{height:10px;width:100%;background-color:#2279a2;}#sidebar #search{margin-left:50px;margin-right:0;height:40px;background-color:#e3e3e3;position:relative;border-radius:5px;-moz-border-radius:5px;-webkit-border-radius:5px;margin-bottom:30px!important;}#sidebar #search #searchSubmit{background-image:url('img/searchIcon.png');width:29px;height:23px;background-repeat:no-repeat;position:absolute;right:10px;top:8px;}#sidebar #search input{position:relative;font-size:16px;color:#2c2c2c;padding:10px;border:none;background:none;width:190px;}.widget_twitter .widgettitle{background-image:url('img/twitter.png');background-position:right;background-repeat:no-repeat;}.widgettitle a{text-decoration:none;color:white;}.widget_twitter li{padding:5px 0 5px 0;border-bottom:1px solid #666;border-top:1px solid #eee;}.widget_twitter li:first-child{padding-top:0;border-top:none;}.widget_twitter li:last-child{padding-bottom:0;border-bottom:none;}#recentcomments .widgettitle{background-image:url('img/twitter.png');background-position:right;background-repeat:no-repeat;}#recentcomments li{padding:5px 0 5px 0;border-bottom:1px solid #666;border-top:1px solid #eee;}#recentcomments li:first-child{padding-top:0;border-top:none;}#recentcomments li:last-child{padding-bottom:0;border-bottom:none;}#comments{color:white;margin-bottom:2px;}.comments li{background:#e3e3e3;margin-bottom:1px;border:1px solid white;overflow:hidden;position:relative;padding:10px;}.comments p{margin-bottom:15px;font-size:16px;}#main_comment p{margin-bottom:2px;}#comment-datetime{font-size:10px;}#respond{background:#e3e3e3;margin-top:20px;margin-bottom:28px;border:1px solid white;overflow:hidden;position:relative;padding:20px;}#respond label{width:4em;float:left;text-align:left;margin-right:0.5em;display:block}#respond h3{padding:2px;}#respond p{padding:2px;}#comment-ads{margin-bottom:10px;}#footer{height:100px;}#copyright{color:#FFFFFF;font-size:12px;}" -code: 200 -connect_time: 3.5e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-content/themes/ethicalhack3r/style.css -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:24 GMT - Content-Type: text/css - Transfer-Encoding: chunked - Connection: keep-alive - Last-Modified: Fri, 17 Feb 2012 19:44:20 GMT - ETag: "a425-1af4-4b92e2bb8ad00" - Vary: Accept-Encoding - CF-Cache-Status: HIT - Expires: Mon, 09 Jul 2012 12:15:24 GMT - Cache-Control: public, max-age=14400 - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.5e-05 -pretransfer_time: 3.4e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-content/themes/ethicalhack3r/style.css - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-content/themes/ethicalhack3r/style.css - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.101189 -status_message: -time: 0.116178 diff --git a/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 b/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 deleted file mode 100644 index 4d92d4a4..00000000 --- a/cache/browser/4348a4737f0b95fffd545b87f52a004241bddc30 +++ /dev/null @@ -1,77 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.6e-05 -body: "" -code: 500 -connect_time: 2.6e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-includes/rss-functions.php -headers: | - HTTP/1.1 500 Internal Server Error - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:25 GMT - Content-Type: text/html - Transfer-Encoding: chunked - Connection: keep-alive - Vary: Accept-Encoding - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.6e-05 -pretransfer_time: 2.5e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-includes/rss-functions.php - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-includes/rss-functions.php - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.112819 -status_message: -time: 0.11291 diff --git a/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f b/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f deleted file mode 100644 index aa8a1134..00000000 --- a/cache/browser/5f78f7b0115fd211a249722e8606cad9a884be7f +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.0e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Php Swp\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 3.0e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.php.swp -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:32 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=s0575rmg11ak75rglmjuf3uj7ma9blf4; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:32 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=d649076e121afd4eeb1a938d6c91caefb1341821731; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d649076e121afd4eeb1a938d6c91caefb1341821731; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d649076e121afd4eeb1a938d6c91caefb1341821731; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.9e-05 -pretransfer_time: 2.8e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.php.swp - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.php.swp - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.737602 -status_message: -time: 0.834884 diff --git a/cache/browser/74f38439d29d49d87ef6e32899a38fd783cc5054 b/cache/browser/74f38439d29d49d87ef6e32899a38fd783cc5054 deleted file mode 100644 index e05a6b0f..00000000 --- a/cache/browser/74f38439d29d49d87ef6e32899a38fd783cc5054 +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.1e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Bak\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 3.1e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.bak -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:28 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=itg2lgoc4d364pol3v4p1vcshs73ji7d; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:28 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=d393c5131f93166cbf45af7805bf6f4ec1341821727; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d393c5131f93166cbf45af7805bf6f4ec1341821727; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d393c5131f93166cbf45af7805bf6f4ec1341821727; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.1e-05 -pretransfer_time: 2.9e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.bak - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.bak - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.766856 -status_message: -time: 0.857543 diff --git a/cache/browser/939fd7bc272632ee56c37fb24f8994b29c6bbd47 b/cache/browser/939fd7bc272632ee56c37fb24f8994b29c6bbd47 deleted file mode 100644 index 99826ba2..00000000 --- a/cache/browser/939fd7bc272632ee56c37fb24f8994b29c6bbd47 +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.7e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Php Swo\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 2.7e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.php.swo -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:31 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=btbhn2tn1b8n5rsahvjg31crgbbrg1t2; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:30 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=d853eee8eb6d57ae6059c1d773a495cc11341821729; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d853eee8eb6d57ae6059c1d773a495cc11341821729; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d853eee8eb6d57ae6059c1d773a495cc11341821729; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.7e-05 -pretransfer_time: 2.5e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.php.swo - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.php.swo - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 1.885056 -status_message: -time: 1.959802 diff --git a/cache/browser/9d27e728fa64564f96f85adaf35f7cbbb2904e04 b/cache/browser/9d27e728fa64564f96f85adaf35f7cbbb2904e04 deleted file mode 100644 index 33113cbf..00000000 --- a/cache/browser/9d27e728fa64564f96f85adaf35f7cbbb2904e04 +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.9e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Php Bak\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 2.9e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.php.bak -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:27 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=h7ta2dgci6af79ol49giopm5454f4qsv; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:27 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.9e-05 -pretransfer_time: 2.7e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.php.bak - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.php.bak - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 1.049149 -status_message: -time: 1.158358 diff --git a/cache/browser/a7e216f8d6de722e951cc9105236a7a65d60db26 b/cache/browser/a7e216f8d6de722e951cc9105236a7a65d60db26 deleted file mode 100644 index e3ce0b40..00000000 --- a/cache/browser/a7e216f8d6de722e951cc9105236a7a65d60db26 +++ /dev/null @@ -1,311 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.8e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Save\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 2.8e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.save -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:26 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=0fs72im2dr2p2ptbkfnff0j9ncbs1lm2; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:26 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=dd047d44856522baaa9e972cf95686c131341821726; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - Content-Encoding: gzip - - -http_version: -mock: false -name_lookup_time: 2.7e-05 -pretransfer_time: 2.6e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.save - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.save - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.701932 -status_message: -time: 0.726919 diff --git a/cache/browser/bf09e1dd1fc374faf202d564332d977927c1ca25 b/cache/browser/bf09e1dd1fc374faf202d564332d977927c1ca25 deleted file mode 100644 index bb243e99..00000000 --- a/cache/browser/bf09e1dd1fc374faf202d564332d977927c1ca25 +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.2e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Php~\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 3.1e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.php~ -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:25 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=5kvmusulv0s0ufhg127copgop8i04sks; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:25 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=df3c55835c23bfe5786f7c7261b5269e71341821725; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=df3c55835c23bfe5786f7c7261b5269e71341821725; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=df3c55835c23bfe5786f7c7261b5269e71341821725; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.1e-05 -pretransfer_time: 3.0e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.php~ - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.php~ - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.773069 -status_message: -time: 0.928828 diff --git a/cache/browser/c2655a44d2cf25a7b9107e7983a1da0d9d6bc02a b/cache/browser/c2655a44d2cf25a7b9107e7983a1da0d9d6bc02a deleted file mode 100644 index 23c45df1..00000000 --- a/cache/browser/c2655a44d2cf25a7b9107e7983a1da0d9d6bc02a +++ /dev/null @@ -1,310 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.8e-05 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - Nothing found for Wp-config Php_bak\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n \n\ - \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - " -code: 404 -connect_time: 2.8e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-config.php_bak -headers: | - HTTP/1.1 404 Not Found - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:29 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=f2egkri13avupn6rhlg42gb3s3bbaq8f; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Last-Modified: Mon, 09 Jul 2012 08:15:29 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=d4246d948bbf536e5df63b7ea80b67c9c1341821728; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d4246d948bbf536e5df63b7ea80b67c9c1341821728; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d4246d948bbf536e5df63b7ea80b67c9c1341821728; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.7e-05 -pretransfer_time: 2.6e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: !ruby/object:Proc {} - - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-config.php_bak - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-config.php_bak - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.68455 -status_message: -time: 0.773834 diff --git a/cache/browser/d088c604417091f3f05f5018e3a0ee09aff8a3fc b/cache/browser/d088c604417091f3f05f5018e3a0ee09aff8a3fc deleted file mode 100644 index d7d40321..00000000 --- a/cache/browser/d088c604417091f3f05f5018e3a0ee09aff8a3fc +++ /dev/null @@ -1,159 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 2.6e-05 -body: | - - - - - ethicalhack3r › Log In - - - - - - - - -
-

ethicalhack3r

-
-

- -

-

- -

- > Encryption password! - -

-

- - - -

-
- - -

← Back to ethicalhack3r

-
-
- - - -code: 200 -connect_time: 2.6e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/wp-login.php -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:24 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Set-Cookie: session=fbijij2hvb22muk4s7k22eqqh73fbeui; path=/; HttpOnly - Expires: Wed, 11 Jan 1984 05:00:00 GMT - Cache-Control: no-cache, must-revalidate, max-age=0 - Pragma: no-cache - Last-Modified: Mon, 09 Jul 2012 08:15:24 GMT - Set-Cookie: wordpress_test_cookie=WP+Cookie+check; path=/ - X-Frame-Options: SAMEORIGIN - Vary: Accept-Encoding - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 2.6e-05 -pretransfer_time: 2.5e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /wp-login.php - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/wp-login.php - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.726025 -status_message: -time: 0.731246 diff --git a/cache/browser/e9a03326c5fdf909f33b69ecb341ecd834ba3355 b/cache/browser/e9a03326c5fdf909f33b69ecb341ecd834ba3355 deleted file mode 100644 index e0aa8ad1..00000000 --- a/cache/browser/e9a03326c5fdf909f33b69ecb341ecd834ba3355 +++ /dev/null @@ -1,171 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 3.3e-05 -body: | - - - - - WordPress › ReadMe - - - -

- WordPress -
Version 3.4 -

-

Semantic Personal Publishing Platform

-

First Things First

-

Welcome. WordPress is a very special project to me. Every developer and contributor adds something unique to the mix, and together we create something beautiful that I'm proud to be a part of. Thousands of hours have gone into WordPress, and we're dedicated to making it better every day. Thank you for making it part of your world.

-

— Matt Mullenweg

-

Installation: Famous 5-minute install

-
    -
  1. Unzip the package in an empty directory and upload everything.
  2. -
  3. Open wp-admin/install.php in your browser. It will take you through the process to set up a wp-config.php file with your database connection details. -
      -
    1. If for some reason this doesn't work, don't worry. It doesn't work on all web hosts. Open up wp-config-sample.php with a text editor like WordPad or similar and fill in your database connection details.
    2. -
    3. Save the file as wp-config.php and upload it.
    4. -
    5. Open wp-admin/install.php in your browser.
    6. -
    -
  4. -
  5. Once the configuration file is set up, the installer will set up the tables needed for your blog. If there is an error, double check your wp-config.php file, and try again. If it fails again, please go to the support forums with as much data as you can gather.
  6. -
  7. If you did not enter a password, note the password given to you. If you did not provide a username, it will be admin.
  8. -
  9. The installer should then send you to the login page. Sign in with the username and password you chose during the installation. If a password was generated for you, you can then click on 'Profile' to change the password.
  10. -
-

Updating

-

Using the Automatic Updater

-

If you are updating from version 2.7 or higher, you can use the automatic updater:

-
    -
  1. Open the wp-admin/update-core.php in your browser and follow the instructions.
  2. -
  3. You wanted more, perhaps? That's it!
  4. -
-

Updating Manually

-
    -
  1. Before you update anything, make sure you have backup copies of any files you may have modified such as index.php.
  2. -
  3. Delete your old WordPress files, saving ones you've modified.
  4. -
  5. Upload the new files.
  6. -
  7. Point your browser to /wp-admin/upgrade.php.
  8. -
-

Theme Template Changes

-

If you have customized your theme templates, you may have to make some changes across major versions.

-

Migrating from other systems

-

WordPress can import from a number of systems. First you need to get WordPress installed and working as described above, before using our import tools.

-

System Requirements

- -

System Recommendations

- -

Online Resources

-

If you have any questions that aren't addressed in this document, please take advantage of WordPress' numerous online resources:

-
-
The WordPress Codex
-
The Codex is the encyclopedia of all things WordPress. It is the most comprehensive source of information for WordPress available.
-
The WordPress Blog
-
This is where you'll find the latest updates and news related to WordPress. Recent WordPress news appears in your administrative dashboard by default.
-
WordPress Planet
-
The WordPress Planet is a news aggregator that brings together posts from WordPress blogs around the web.
-
WordPress Support Forums
-
If you've looked everywhere and still can't find an answer, the support forums are very active and have a large community ready to help. To help them help you be sure to use a descriptive thread title and describe your question in as much detail as possible.
-
WordPress IRC Channel
-
There is an online chat channel that is used for discussion among people who use WordPress and occasionally support topics. The above wiki page should point you in the right direction. (irc.freenode.net #wordpress)
-
-

XML-RPC and Atom Interface

-

You can post to your WordPress blog with tools like Windows Live Writer, Ecto, w.bloggar, Radio Userland (which means you can use Radio's email-to-blog feature), NewzCrawler, and other tools that support the blogging APIs! :) You can read more about XML-RPC support on the Codex.

-

Post via Email

-

You can post from an email client! To set this up go to your "Writing" options screen and fill in the connection details for your secret POP3 account. Then you need to set up wp-mail.php to execute periodically to check the mailbox for new posts. You can do it with cron-jobs, or if your host doesn't support it you can look into the various website-monitoring services, and make them check your wp-mail.php URL.

-

Posting is easy: Any email sent to the address you specify will be posted, with the subject as the title. It is best to keep the address discrete. The script will delete emails that are successfully posted.

-

User Roles

-

We introduced a very flexible roles system in version 2.0. You can read more about Roles and Capabilities on the Codex.

-

Final Notes

- -

Share the Love

-

WordPress has no multi-million dollar marketing campaign or celebrity sponsors, but we do have something even better—you. If you enjoy WordPress please consider telling a friend, setting it up for someone less knowledgable than yourself, or writing the author of a media article that overlooks us.

-

WordPress is the official continuation of b2/cafélog, which came from Michel V. The work has been continued by the WordPress developers. If you would like to support WordPress, please consider donating.

-

License

-

WordPress is free software, and is released under the terms of the GPL version 2 or (at your option) any later version. See license.txt.

- - - -code: 200 -connect_time: 3.3e-05 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/readme.html -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:24 GMT - Content-Type: text/html - Transfer-Encoding: chunked - Connection: keep-alive - Last-Modified: Wed, 20 Jun 2012 18:25:15 GMT - ETag: "a0c3-23d7-4c2eb853838c0" - Vary: Accept-Encoding - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=d18c182188e4fd72679bb9e502aadb1681341821724; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - - -http_version: -mock: false -name_lookup_time: 3.2e-05 -pretransfer_time: 3.1e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: /readme.html - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/readme.html - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.112111 -status_message: -time: 0.19096 diff --git a/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 b/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 deleted file mode 100644 index 6d88628d..00000000 --- a/cache/browser/fc7f0fd0a60236dd144b356a12427c8223875a21 +++ /dev/null @@ -1,305 +0,0 @@ ---- &id001 !ruby/object:Typhoeus::Response -app_connect_time: 0.0 -body: "\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - ethicalhack3r\n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n\ - \n \n\ - \n\ - \n\ - \n \n\ - \n\ - \n\ - \n\ - \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

ethicalhack3r

\n\ - \n\ -
\n\ -
\n \n\ -
\n\ -
\n\ -
\n\ -
\n\ -

Recent

\n\ -
\n\ -

DevBug – PHP Static Code Analysis

\n\ -

My final year university dissertation was on the topic of Static Code Analysis, specifically the integration of IDEs (Integrated Development Environments) with Static Code Analysis. The idea was to make Static Code Analysis accesible to the developer, without them having to install and use additional specialist Static Code Analysis software.

\n\ -

Due to my familiarity with PHP and its lack of interpreter taint analysis I decided that I would write a PHP Static Code Analysis application. The PHP Static Code Analysis tool I developed is called DevBug, it is an online PHP Static Code Analysis tool written mostly in JavaScript (jQuery). The Static Code Analysis engine uses the sources, securing functions and sinks data from the awesome RIPS Static Code Analysis tool to identify specific PHP functions that can cause or remediate user input caused vulnerabilities. DevBug uses Taint Analysis to identify tainted variables, follows the tainted variables through the code, untaints the variables if they are secured and finally detects whether or not tainted variables end up in in sensitive sinks.

\n\ -

The IDE used is called CodeMirror that provides a code editing area, syntax highlighting, line numbering and an API. CodeMirror was slightly modified to detect deprecated PHP functions and highlight them.

\n\ -

read more…

\n\ -

\n\ - Posted on 20 May, 2012 by ethicalhack3r

\n\ -

\n\ - 4 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Old School hacking

\n\ -

Back in the late nineties, around 1999, my mother bought me my first computer. Around this time The Matrix movie was released which as a young boy with a new computer had me Yahoo’ing (Google was largely unknown) for the term ‘hacking’. Back then Yahoo! Chat was still around and had a chat room called the ‘Hackers Lounge’, everyone in there was talking about all sorts of cool things you could do with computers that I had never heard of before. With hindsight, most of the people in the chat room were script kiddies who knew how to run a few Windows GUI ‘hacking’ tools and largely acting like they were the kings of the Internet. At the time I wanted to learn about all of the cool things they knew. I started downloading and learning how to use these ‘hacking’ tools by the use of my guinea pig friends and family (my siblings soon grew tired of me remotely opening and closing their CD-ROM drives).

\n\ -

Some of these tools are still actively developed and used today, invaluable to conducting modern Penetration Testing and security audits. For the sake of nostalgia, I present to you some of the coolest most 1337 ‘hacking’ tools that I and others used ‘back in the day’. Warning: Download links not verified.

\n\ -

Legion by Rhino9

\n\ -

Use: Windows Null Session share scanner.
\n\ - Released: 1999
\n\ - Platform: Windows
\n\ - Further Info: http://www.informit.com/articles/article.aspx?p=26263&seqNum=5
\n\ - Download: http://packetstormsecurity.org/files/14711/legion.zip.html

\n\ -

\"Legion

\n\ -

read more…

\n\ -

\n\ - Posted on 9 May, 2012 by ethicalhack3r

\n\ -

\n\ - 10 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

X-Frame-Options

\n\ -

A colleague tweeted a link to a blog post by WhiteHat Security about the X-Frame-Options HTTP header. I had heard of X-Frame-Options before and knew what it did but didn’t really know how it was used so I decided to investigate further.

\n\ -

X-Frame-Options is a HTTP response header that tells the browser what pages are allowed to be loaded in <frame> or <iframe> HTML tags. The header is an extra layer of security that a web application can implement to attempt to mitigate clickjacking (UI redressing).

\n\ -

The X-Frame-Options header may have three different values:

\n\ -

DENY – No pages are allowed to be loaded.
\n\ - SAMEORIGIN – Only pages from the same domain are allowed to be loaded.
\n\ - Allow-From http://www.example.com – Only allow frames from www.example.com.

\n\ -

read more…

\n\ -

\n\ - Posted on 7 April, 2012 by ethicalhack3r

\n\ -

\n\ - 5 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Wireless Man In The Middle (MITM)

\n\ -

This is a recent piece I did for the BBC Inside Out program that originally aired on February 6th. In the video I demonstrate a wireless Main In The Middle (MITM) attack in a coffee shop using a FON+ wireless router, Karma and Jasager. Oh, and they’re the ones who call me an ‘expert’, personally, I hate the term and would never call myself one.

\n\ -

\n\ -

\n\ - Posted on 13 February, 2012 by ethicalhack3r

\n\ -

\n\ - 6 Comments\n\ -

\n\ -
\n \n\ -
\n\ -

Prevention of unwanted telemarketing calls

\n\ -

I am tired of receiving multiple telemarketing calls per day, I’m tired of the Telephone Preference Service (TPS) not having an affect and I’m tired of telecommunication companies charging for prevention features which should be free.

\n\ -

I came across an e-petition that was setup by a Rob Whitelock, it is not perfect in its recommendations but certainly puts the general point across.

\n\ -

e-petitions is an easy way for you to influence government policy in the UK. You can create an e-petition about anything that the government is responsible for and if it gets at least 100,000 signatures, it will be eligible for debate in the House of Commons.

\n\ -

You can help by signing the petition here;
\n\ - http://epetitions.direct.gov.uk/petitions/17324

\n\ -

\n\ - Posted on 20 January, 2012 by ethicalhack3r

\n\ -

\n\ - No Comments\n\ -

\n\ -
\n \n\ -
\n\ - \n\ - Next Page »\n\ -
\n\ -
\n\ -
\n \n\ - \n
\n\ -
\n\ -
\n\ -
Copyright © 2008-2012 Ryan Dewhurst
\n\ -
\n \n\ -
\n \n\ - \n\ - \n \n \n" -code: 200 -connect_time: 0.083137 -curl_error_message: No error -curl_return_code: 0 -effective_url: http://www.ethicalhack3r.co.uk/ -headers: | - HTTP/1.1 200 OK - Server: cloudflare-nginx - Date: Mon, 09 Jul 2012 08:15:23 GMT - Content-Type: text/html; charset=UTF-8 - Transfer-Encoding: chunked - Connection: keep-alive - Expires: Thu, 19 Nov 1981 08:52:00 GMT - X-Pingback: http://www.ethicalhack3r.co.uk/xmlrpc.php - Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0 - Pragma: no-cache - Last-Modified: Mon, 09 Jul 2012 07:25:42 GMT - Vary: Accept-Encoding - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.co.uk - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.ethicalhack3r.co.uk - Set-Cookie: __cfduid=dc3212a602a29949a28842ab47e69526d1341821723; expires=Mon, 23-Dec-2019 23:50:00 GMT; path=/; domain=.www.ethicalhack3r.co.uk - Content-Encoding: gzip - - -http_version: -mock: false -name_lookup_time: 0.002119 -pretransfer_time: 3.4e-05 -request: !ruby/object:Typhoeus::Request - after_complete: - auth_method: - body: - cache_timeout: 600 - connect_timeout: - disable_ssl_peer_verification: true - follow_location: - handled_response: - headers: - user-agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.6; rv:9.0) Gecko/20100101 Firefox/9.0 - User-Agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - max_redirects: - method: :get - on_complete: - params: - parsed_uri: !ruby/object:URI::HTTP - fragment: - host: www.ethicalhack3r.co.uk - opaque: - password: - path: / - port: 80 - query: - registry: - scheme: http - user: - password: - proxy: - proxy_auth_method: - proxy_password: - proxy_type: - proxy_username: - response: *id001 - ssl_cacert: - ssl_capath: - ssl_cert: - ssl_cert_type: - ssl_key: - ssl_key_password: - ssl_key_type: - timeout: - url: http://www.ethicalhack3r.co.uk/ - user_agent: Typhoeus - http://github.com/pauldix/typhoeus/tree/master - username: - verbose: -requested_http_method: -requested_url: -start_time: -start_transfer_time: 0.224407 -status_message: -time: 0.317425