TheTAZZone.com |
TheTAZZone.com website is the Information Arm of the TAZ Zones. . |
TAZForum |
TAZForum is a Community run by a Membership Committee of Administrators/Mods/ and regular members. A very relaxed atmosphere, feel free to lounge, relax, and enjoy yourself. |
TheTAZZone.net |
A full links page, and the latest posts. |
The Security Zone |
The newest installation to TheTAZZone is a no-nonsense forum for security enthusiasts and professionals. |
TheTAZZone.org |
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus. |
The Sports Emporium |
Lorem ipsum dolor sit amet, consectetuer adipiscing elit. Duis ligula lorem, consequat eget, tristique nec, auctor quis, purus. Vivamus ut sem. Fusce aliquam nunc vitae purus. |
|
0-Day exploit in Solaris |
Sunday, February 11, 2007 |
If you are one of the ones running solaris, TURN OFF TELNET! There is a 0 day exploit available that even the biggest script kitty could run it. To check out all the relavent details, click here. |
posted by JayMill @ 4:04 AM  |
|
|
REALLY tired of wireless theives? |
|
This man had truly had it with people stealing his internet, so much so that he sealed his house in zinc-coated lead. Aparently no one taught this man how to set up WPA, WPA2, or a MAC filter. Labels: Lead, TAZ, Wireless |
posted by JayMill @ 1:38 AM  |
|
|
Social Engineering |
Friday, February 09, 2007 |
Ever wonder about what exactly Social Engineering is? What qualifies as social engineering, and how could I do it myself(which you should be doing)? You can take a quick look at exactly what qualifies, and a description of each type here.
~JaymillLabels: engineering, Hack, Hacking, social, TAZ |
posted by JayMill @ 7:20 PM  |
|
|
Accessing a Network Through the Side Door |
Thursday, February 08, 2007 |
Nokia has written another article titled Accessing a Network Through the Side Door. In this article he writes about a presentation by a senior Microsoft programmer about computer security. The article includes video, and a good brief of the seminar. It describes an extremely well executed attack that fully exploits a web server, and then moves into the main corporate LAN, including a nice little remote desktop GUI. You can check it out here, and Digg it here.
-JayMillLabels: Accessing, Door, Hack, Hacking, Nokia, Side, TAZ |
posted by JayMill @ 7:55 PM  |
|
|
Canadian Nuclear Power Site Hacked |
|
A Canadian nuclear power plants web page was hacked and an investigation is under way to determine how the attack was executed and by who. The hacker placed pictures of exploding nuclear bombs on every sub-page, but nothing on the main page itself. The attacker also placed a message that read, "Please Don't Put me in Jail....oops, I divided by 0". Canadian officials said no internal information was compromised.
Labels: Attack, Canadian, Hacker, Nuclear, Power |
posted by JayMill @ 6:48 PM  |
|
|
nUbuntu |
|
Are you looking for a better security live CD similar to the auditor package? nUbuntu is here, and its the best in my humble opinion. You can check what programs are installed by clicking here, and by looking here. The first link is to the deb packages installed, and the second is the non deb programs and the general 'about page' on their website. I am also planning on writing a tutorial on many of the nUbuntu features, so check back for more. Labels: auditor, CD, live, LiveCD, nUbuntu, security, TAZ, TAZZone |
posted by JayMill @ 3:42 PM  |
|
|
2007- A Hacking Odyssey |
Wednesday, February 07, 2007 |
Nokia has released the Part one whats going to be a stellar series of hacking tutorials. Part one is titled "Reconnaissance" and is the first step that any hacker should take. It goes on to describe, how to pick a target, and the first steps to take when you have located a target. So feel free to go and check it out here, and feel free DIGG it. Labels: 2007, Hacking, Nokia, Odyssey, TAZ |
posted by JayMill @ 8:09 PM  |
|
|
DNS Root Servers Attacked |
|
Last night there was an Denial of Service attack on 3 of the 13 DNS root servers. There was no noticeable damage done, or drop in performance. What did make this attack special was it was the largest attack on the DNS servers since 2002 and it lasted for about 12 hours. The attackers attempted to hide their identities (most likely using anonymous proxy servers), but some were tracked to South Korea. The investigation is still underway. Labels: Attack, Denial, DNS, DoS, Hack, root, Service |
posted by JayMill @ 5:24 PM  |
|
|
|
|