Follow us on Twitter!
Capitalism is an Island of wealth in a sea of poverty
Sunday, October 04, 2015
HellBoundHackers Main:
HellBoundHackers Find:
HellBoundHackers Information:
HellBoundHackers Exploit:
HellBoundHackers Programming:
HellBoundHackers Think:
HellBoundHackers Track:
HellBoundHackers Patch:
HellBoundHackers Other:
HellBoundHackers Need Help?
Members Online
Total Online: 19
Guests Online: 14
TeamSpeak Online : 5 Members Online: 5

Registered Members: 90392
Newest Member: enumhack
Latest Articles
Welcome to HellBound Hackers

Welcome to HellBound Hackers. The hands-on approach to computer security.
Learn how hackers break in, and how to keep them out.
Please register to benefit from extra features and our simulated security challenges.

Latest Features:

Latest Challenges:

Stegano 27 by Euforia33.
Stegano 26 by Euforia33.
Stegano 25 by Euforia33.
Application 17 by 4rm4g3dd0n.


: : Website News : :

Forward Secrecy & Strict Transport Security

Today we implemented Forward Secrecy in order to improve the security and privacy of HBH. Forward Secrecy "should" make it "impossible" to eavesdrop on data being transmitted from your browser to HBH's servers. We also have Strict Transport Security enabled.

You can check the report on our SSL here. The SSL report is provided by Qualys SSL Labs

Also we have updated PHP so a few page may be offline, if you find any please report them here.

We have also updated the Development page so you can all see what we are working on and things we would like to do. Feel free to post your thoughts on the current projects.

Also we have updated the Change Log to reflect these changes.

Points for Creating Challenges & Points for Hall of Fame entries have been returned to the accounts that lost them.

Ranking System Changes

Since the points reset, We have had a lot of complaints about administrators being in the top ten on the rankings page. The current Admin staff have been here for a while and had already completed the challenges BUT to keep everyone happy, Administrators will no longer be included in the points rankings and will be unranked in their profiles.

On another note Real 15 IS up and running fine.

UPDATE: Real 9 an 10 are also now back up.


Changes to HBH

All Members Read This!

There has been a few changes to HBH over the past few weeks. Here are a list of changes and some reason why:

We have removed the old database tables and reset the points. This is due to old and corrupted accounts and no way for other members to get on the score board, Points cannot and will not be reinstated. We have also removed user accounts that haven\'t logged in in over a year.

We have two new staff members Euforia33 & rex_mundi they have been a great help to HBH over the years!

We also have improved the forum and replaced some old code which should make things faster.


HBH Staff

PHP Upgrade and New Challenges

Due to the recent upgrade in the PHP on the server, Some pages may not display properly and a few challenges will be offline. Basic 26, Real 7, 9 Will be Offline till I get them recoded.

Realistic 17 is back up and running.

On the other hand, The Application page is completely redone to make it easier to submit your answers.

I\'m going to upload a few new challenges to keep everyone occupied while I work on the site.

Any bugs you see please submit them, Any Vulnerabilities Pm me them directly.

UPDATE: Application 17 by 4rm4g3dd0n released today.

UPDATED UPDATE: Stegano 25, 26 and 27 by Euforia33 released also!

UPDATED UPDATE UPDATE: Mordak has bought HBH a proper SSL Cert.

UPDATED UPDATED UPDATE UPDATE: HBH Change log is now active.


New Challenge Released Today

New Stegano challenge released today! Stegano 24 by shadowls.
This is a tough one, Took a while to figure it.
So have fun. More on the way.

Also bugs fixed in Javascript 5, Real 5 and Tracking 2.
Update: Pentest Challenges are back online. Real 7 & 9 are down till further notice Along with Real 17. All other challenges are fixed.

If you have any problems submit them as a bug.

Exclusive Membership is working again.


: : Computer News : :

AVG says it can sell your browsing data in updated privacy policy

AVG has updated its privacy policys language, and in the amended document, the security firm admits that it can "make money from [its] free offerings with non-personal data." These "non-personal" info include your devices brand, language and apps in use, among other things. The company is adamant that it does not sell anything with identifying information, and the data that it does collect is anonymized and stored without anything that can link it back to you. According to the updated policy, AVG can collect data you yourself provide -- plus, it can use cookies to track your searches and your activities on websites, apps and other products. It can then use those details to "build anonymous data profiles" or create statistical information, which it can then sell.

A spokesperson from the company said that AVG updated the language to be more transparent and make sure people know that it can make money off its free products using their information. The new rules will take effect on October 15th, 2015 and by continuing to use AVG after that, you already agree to the collection -- unless you take the steps to opt out. The spokesperson said that "users who do not want [the security firm] to use non-personal data in this way will be able to turn it off."

Router maker D-Link accidentally publishes private cryptography keys

In a slip that could prove costly to manufacturers and users, the D-Link cryptography keys used to certify that software is trustworthy – and not malware – were accidentally published, according to Dutch security firm Fox-IT.

The keys were made available through the companies open-source firmware package, and were not discovered for seven months. Their release could make it easier for hackers to disrupt Windows and Apple computers.

The mistake was discovered by a reader for a Dutch technology website, Tweakers, who purchased a D-Link security camera and downloaded the firmware from the manufacturer. The reader found not only the private keys, but also the passphrases needed to sign into the software. Tweakers handed the problem over to Dutch security firm Fox-IT, which confirmed the findings.

I think this was a mistake by whoever packaged the source code for publishing. The code signing certificate was only present in one of the source code packages with a specific version, Fox-IT researcher Yonathan Klijnsma told security news site Threatpost.

BT Launches Ethical Hacking Service

BT has announced the global launch of BT Assure Ethical Hacking for Finance, a new security service designed to test the exposure of financial services organizations to cyber-attacks.

The wealth of valuable and sensitive personal data held by financial organizations, such as retail and investor banks and insurance companies, makes them among the most attractive targets for malicious hackers and cyber-criminals. This risk has intensified in recent years as more and more retail financial services move online and electronic trading is one the rise.

Assure Ethical Hacking for Finance uses mature methodologies that mimic those of black hats or malicious attackers to provide a range of tests targeted at the various entry points to a banks IT systems as well as perceived weak points of an organization. These include phishing scams, mobile devices and hardware from laptops to printers, internal and external networks, databases and complex enterprise resource planning systems. BT not only tests and verifies systems that can access the network but also checks for risks of human failure, for example by using social engineering to test how employees apply the policies in place.

The new service draws on the ethical hacking expertise gained by working closely with large financial institutions in the U.S. for nearly two decades. Within the confines of strict rules of engagement, BTs ethical hackers have been able to perform database dumps of tens of thousands of social security and credit card numbers; intercept and modify mobile cheque deposit data; reverse engineer proprietary encryption streams; generate enormous, valid gift cards with payment details from other test accounts; create admin accounts by having an employee simply open an email; escape remote access sessions and get shell access to systems, including subsequent establishment of tunnels into the company; transfer funds between unauthorized test accounts or harvest complete account data for all users by attacking machine-to-machine communications.

The ultimate objective is to identify vulnerabilities that would impact an organizations primary business processes and thus its brand and reputation.

The new Assure Ethical Hacking for Finance will enable BT to use CREST ( certified Simulated Targeted Attack and Response (STAR) services to help financial services firms to develop the most robust security solutions, ensuring sensitive customer data remains secure. BT was in 2014 one of the first companies in the world accredited by CREST to provide STAR services.

Working alongside the Bank of England (BoE), UK Government and industry, CREST developed the STAR framework to deliver controlled bespoke, intelligence-led cyber security testing. STAR incorporates advanced penetration testing and threat intelligence services to more accurately replicate cyber security threats to critical assets.

Mark Hughes, president of BT Security, said: The prospect of accessing confidential financial information is a powerful lure for hackers so few companies attract as much online criminal attention as banks. Apart from direct financial loss, a serious hack could lead to irreparable reputational damage. While much of the concern focuses on retail-banking activities, the threat is just as important for investment banks or for wholesale, where banks provide services like currency conversion and large trade transactions for major corporate customers. We encourage all financial institutions to put themselves through a rigorous series of cyber-security simulations, whereby our ethical hacking consultants push the cyber defences of financial institutions to the limit.

BT has a strong, award-winning, global team of security specialists, including ethical hacking consultants, who provide a standardized method to test systems by imitating hacker attacks, reporting identified vulnerabilities and providing clear remediation steps that customers can use to quickly patch applications and affected systems.