Monday, July 22, 2013

Hacker Tools showcased - Computer Sweden

In preferred that will be held at the Black Hat conference, several tools that can be used by intruders and security personnel will be demonstrated and also distributed to the visitors. Preferred held by consultants, researchers and vendors, writes IDG News.

Class=”paragraphIntro”> Here is a selection among the tools to be demonstrated.

Cracks encryption
Breach used to extract information from encrypted https communication, such as email addresses.

Overloads
Blood Spear will show an attack tool to be able to get past protection against denial of service attacks. Even a protection product to be able to ward off attacks from the new tool should appear.

Smart phishing
With a tool from Trustwave’s Spider Labs should be possible to create more realistic messages for phishing, known as phishing. It should be done by analyzing data from public sites, such as the use of different parts of speech and sentence length.

Cheat Android
Bluebox to explain how it is possible to trick the Android accepting malware that hides behind to approved apps.

Kidnap phone
Lacoon Mobile Security will show how it is possible to fool security programs and administration tools for mobiles, to install monitoring tool that captures including text messages. There is even going to kidnap a phone, to use it to eavesdrop on the surroundings.

Check Windows
Google will launch Bochspwn tool, already used to find fifty vulnerabilities in the Windows kernel and drivers.

advantage of flash memory
Accuvant Labs will demonstrate how it is possible to take advantage of certain flash memory devices to store malicious files on them and even make them unusable. Two tools will be released. One of hiding files on Android devices and to find those hidden files.

Performed Lichens
White Hat Security to show how it is possible to use JavaScript in web advertisements to transform computers enslaved in the botnet Zoombies.

Goes via Dropbox
Version 2 of the attack tool Drop Mack to appear. It is used to get into the company network via the storage service Dropbox.

Clone rfid tags
Bishop Fox will show how it can be a meter away copy of RFID tags that are used as passes.

No comments:

Post a Comment