Virus developers are taking advantage of the enormous popularity of the Adobe flash player and creating fake Adobe Flash player which installs Trojan horse designed to steal password and personal information. Security experts hunting for solutions as more and more people fell to the trap of upgrading the flash player and ending up in a fake site that will install Trojan horse.

Fake YouTube links; fake CCN alert emails all tries to install the updated flash player to watch the movie. Out of curiosity to view the movie, most users simply press the upgrade button and link them selves to the hackers. Latest incident tricked the user using CNN email alerts regarding an imminent cease-fire in the Israel-Gaza conflict. Last month Koobface virus on facebook sends virus to the friends list asking them to checkout one of the latest movie. Clicking on the link directs the user to download a plug-in to watch the movie. These Trojan horse programs are designed to steal financial passwords and personal details from the victim’s computer and are very dangerous.

Wake up Adobe; we love your player but not these Trojans. Help us to get the genuine updates.

Explore More

Reverse SSH Tunneling (NAT)

Have you ever wanted to ssh to your Linux box that sits behind NAT? Now you can with reverse SSH tunneling. This document will show you step by step how

Shell via LFI

>>>>>>>>>>>>>>> Shell via LFI – proc/self/environ method <<<<<<<<<<<<<<< >>>>>>>>>>>>>>> Author : SirGod <<<<<<<<<<<<<<< >>>>>>>>>>>>>>> www.insecurity-ro.org <<<<<<<<<<<<<<< >>>>>>>>>>>>>>> www.h4cky0u.org <<<<<<<<<<<<<<< >>>>>>>>>>>>>>> [email protected] <<<<<<<<<<<<<<< 1 – Introduction 2 – Finding LFI 3

The Null Byte Exploit

Many web forums have mushroomed on internet and they are setup in a jiffy,so they wont pay much attention to security. An older exploit I m discussing here is The