• Subscribe to the low volume list for updates.

Blog

SSH failed logins for past month

This graph shows the failed logins into one of our servers for the past month. As you can see they get hammered - just like most servers on the Internet. I will look at doing some more with the stats to get more of a trend over time, perhaps full automating and building some graphical […]
Read More

SQLmap added to our free sql injection service

HackerTarget.com are happy to announce a new addition to our free vulnerability scanning services. Sqlmap has recently been released in version 7.0RC1, this is one of the most powerful sql injection tools available with a wide array of functions for sql injection detection and exploitation. We have added it to our basic sql injection tool […]
Read More

‘Golden Cash’ botnet-leasing network uncovered

Sometimes reading the news is like reading science fiction. However, this is real and shows how far the criminal underground is progressing when it comes to monetisation of compromised machines. It all starts with malicious scripts being injected into poorly secured and managed web servers. Researchers at security firm Finjan said on Wednesday that they […]
Read More

Amazon Cloud Service Brute Force

OSSEC is an excellent open source host based intrusion detection system. Works on Windows and Linux and detects security anomalies within the system. Such as brute force ssh attacks from the Amazon Cloud. It seems that like any web hosting service the Amazon Clould Web Services are open to exploitation. Of course in this post […]
Read More

Open Source Technology

Our scanning platform here at HackerTarget.com is comprised of a number of geographically diverse hosts at world class Data Centers in Europe and the USA. Depending on our current load and scanner requirements we have the capability of using our high end Dell Poweredge Dedicated server or one of a handful of VPS servers. The […]
Read More

Offsite backups – Are your backups secure?

As we often mention here at HackerTarget.com real security is made up of a number of different processes, policies and technologies. If one part of the security picture is missing then your data is vulnerable. Where do you keep your backups? Are they in a secure location? While this example is a fairly rare occurrence, […]
Read More

SQL Injection to compromise 10000 web sites

A tool discovered by Sans Security Handlers has shed some light on how 10000 web sites were compromised earlier this year. An automated SQL injection attack that utilized google searches against ASP pages that contained potential sql injection points is at the core of the attack. While we had a general idea about what they […]
Read More

rkhunter & chkrootkit: wise crackers only

A good summary of the two top root kit hunters for linux hosts. Rkhunter and chkrootkit are tools to check for signs of a rootkit. They will inspect the system they’re running on and report anomalies either through the shell or via email. Although an attacker able to install a rootkit is likely also able […]
Read More

Security from the Cloud – Whitepaper

A new release from HackerTarget.com a whitepaper "Security from the Cloud" focusing on the reasons why vulnerability scanning out of the cloud makes so much sense. Check it out. This white paper describes advantages of using a remote Vulnerability Scanning Service that is contained within the  "Cloud”. A service that is available from anywhere by […]
Read More