Wednesday, 5 June 2013

WiFi Hacking software AirCrack-NG updated after 3 years





<iframe allowtransparency=true frameborder=0 scrolling=no src="http://platform.twitter.com/widgets/tweet_button.1370380126.html#_=1370435040128&count=horizontal&id=twitter-widget-0&lang=en&original_referer=http%3A%2F%2Fthehackernews.com%2F2013%2F06%2Fwifi-hacking-software-aircrack-ng.html&related=TheHackersNews&size=m&text=WiFi%20Hacking%20software%20AirCrack-NG%20updated%20after%203%20years&url=http%3A%2F%2Fthehackernews.com%2F2013%2F06%2Fwifi-hacking-software-aircrack-ng.html&via=TheHackersNews%20%23Security%20%23Infosec" class="twitter-share-button twitter-count-horizontal" title="Twitter Tweet Button" data-twttr-rendered=true style='height:20px; margin-bottom:0px;margin-left:0px;margin-right:0px;margin-top:0px;padding-bottom: 0px;padding-left:0px;padding-right:0px;padding-top:0px;width:110px'> Author: Wang Wei onMonday, June 03, 2013

Follow Us

The Best WiFi hacking suite AirCrack-NG updated to 1.2 Beta 1 after three years from the last release. Aircrack-ng is a set of tools for auditing wireless networks.

New version added a few new tools and scripts (including distributed cracking tool). Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data packets have been captured.

Release Notes:

· Compilation fixes on all supported OSes.

· Makefile improvement and fixes.

· A lot of fixes and improvements on all tools and documentation.

· Fixed licensing issues.

· Fixed endianness and QoS issues.

Download AirCrack-NG for Linux and For Windows

Surveillance malware targets 350 high profile victims in 40 countries

  

A global cyber espionage campaign affecting over 350 high profile victims in 40 countries, appears to be the work of Chinese hackers using a Surveillance malware called "NetTraveler".

Kaspersky Lab’s team of experts published a new research report about NetTraveler, which is a family of malicious programs used by APT cyber crooks. The main targets of the campaign, which has been running since 2004, are Tibetan/Uyghur activists, government institutions, contractors and embassies, as well as the oil and gas industry.
Spear phishing emails were used to trick targets into opening malicious documents. The attackers are using two vulnerabilities in Microsoft Office including Exploit.MSWord.CVE-2010-333, Exploit.Win32.CVE-2012-0158, which have been patched but remain highly-popular on the hacking scene, and have run NetTraveler alongside other malware.

C&C servers are used to install additional malware on infected machines and exfiltrate stolen data and more than 22 gigabytes amount of stolen data stored on NetTraveler’s C&C servers.


According to researchers, the largest number of samples we observed were created between 2010 and 2013. The largest number of infections has been spotted in Mongolia, India and Russia, also in China, South Korea, Germany, the US, Canada, the UK, Austria, Japan, Iran, Pakistan, Spain and Australia.

Researchers believe that hackers team behind this attack are 50 individuals, most of whom speak Chinese natively but also have a decent level of English.

Six victims were also hit by the Red October attackers, whom Kaspersky had profiled last year. Those victims included a military contractor in Russia and an embassy in Iran.

LinkWithin

Related Posts Plugin for WordPress, Blogger...

Popular Post