Just got a tip about this search engine – SHODAN. SHODAN is basically a banner grabbing search engine: It scans the Internet for machines running services on common ports, contacts these and stores the banners that it gets in return. It makes these banners publicly searchable. Banners are not sensitive information, but they often contain… Read more »
Monthly Archives:: November 2010
Cool video showing how W32.Stuxnet is capable of reprogramming a PLC to behave unexpectedly:
Susan Crawford has some very interesting thoughts in a recent blog post about how certain agencies seem to be lobbying for increased funding to “cyber war capabilities” and increased Internet control by feeding the mainstream media with news. FTA: [...] the agencies that are most interested in forwarding cyberattack abilities, surveillance, guaranteed back doors for encrypted… Read more »
I’m currently reading the book “The Black Swan” by Nassim Nicholas Taleb, and it’s been a while since I have been this captured by a book. Taleb convincingly argues that we all (humans, that is) are failing to recognize the great events that change history – aka the “black swans”. He is exploring these highly… Read more »
Finally found a good Common Vulnerability and Exposures (CVE) database: http://www.cvedetails.com/. There are several (seemingly) similar databases that pretty much lists up all vulnerabilities that are included in CVE, but these guys takes it one step further with plenty of drill-down options and easy searches. Among its features, the site has graphs of types and… Read more »
Interresting story from Symantec about a new critical 0-day vulnerability that affects IE6-8. The interresting part about it is really that Symantec was able to capture the command sequence of a live hacker in action, performing a sequence of commands at the victim computer through encrypted .gif files. Nice find.