AlienVault 4.5.0 authenticated sql injection
The following request is vulnerable to a SQL injection attack from authenticated users, adminnot requiredclick here....https://gist.github.com/brandonprry/9874177
View ArticleCaution: Malware pre-installed!
China’s leading TV station, CCTV, has a long-standing tradition of marking World Consumer Rights Day on March 15 with its ‘315 Evening Party’. The annual show makes a song and dance about consumer...
View Articlew3af 1.6 release
1.6 release: * Improved performance: your scans will run faster * Now you'll be able to easily integrate w3af into otherprojects with a simple "import w3af" * Better documentation...
View ArticleEMC CTA v10.0 unauthenticated XXE with root perms
The linked gist below details an unauthenticated XXE vulnerability thatallows an attacker to read /etc/shadow within EMC CTA v10.0.https://gist.github.com/brandonprry/9895721
View ArticleWilcard DNS, Content Poisoning, XSS and Certificate Pinning
Hi everyone, this time I'm going o talk about an interesting vulnerability that I reported to Google and Facebook a couple of months ago. I had some spare time last October and I started testing for...
View ArticlePaper: On the Practical Exploitability of Dual EC in TLS Implementations
read the paper in its entirety here...http://dualec.org/DualECTLS.pdf
View ArticleABaDooRand - Anti-backdoor pseudo-random and quite true-random numbers for...
ABaDooRand is a library that produces anti-backdoor pseudo-random numbers, thus, cryptographically secure PRNG (CSPRNG) and RNG (CSRNG). Since PRISM and Snowden 2013-2014 revelations, we by principle...
View ArticleHow a hacked password can unlock a Tesla car
A luxury Tesla Model S car, which (when maxed out with options and bells-and-whistles) is worth over $100,000.You wouldn’t really expect the only thing to prevent a thief from unlocking it to be a...
View ArticleOld School Code Injection in an ATM .dll
During our last ATM review engagement, we found some interesting executable files that were run by Windows Services under Local System account. These binaries had weak file permissions that allowed us...
View ArticleVideo: Dissecting the Target breach
Cyphort research team found and dissected the malware accused of stealing 110 million credit card records from Target. Join Nick as he explains the interstices of how this malware works. We'll step...
View ArticleAndroid.MisoSMS : Its back! Now with XTEA
FireEye labs recently found a more advanced variant of Android.MisoSMS, the SMS-stealing malware that we uncovered last December — yet another sign of cybercriminals’ growing interest in hijacking...
View ArticleHow to: Shellcode to reverse bind a shell with netcat
Imagine you found a vulnerability in a web server and decided to take over that machine to do your dirty deeds, what do you do? Well, for starters, you have to figure out how to exploit the...
View ArticleGetting my feet wet with invasive attacks, part 1: Target recon
click here to read more....http://siliconexposed.blogspot.gr/2014/03/getting-my-feet-wet-with-invasive.html
View ArticleRetrieving NTDS.dit without a Shell on the DC
t has been increasingly common for organizations to prevent external or outbound connections from their domain controllers. I have seen some use the Windows Firewall, others use non-routable IP...
View ArticleThe weird and wonderful world of DNS LOC records
A cornerstone of CloudFlare's infrastructure is our ability to serve DNS requests quickly and handle DNS attacks. To do both those things we wrote out own authoratitive DNS server called RRDNS in Go....
View ArticleWinRar File extension spoofing ( 0DAY )
Winrar is one of the most common application for compressing and decompressing data.The application is capble of compressing data as rar or as zip format.This Article is going to present a new...
View ArticleCoremex Innovates Search Engine Hijacking
alware that targets search engine results is nothing new. Malicious browser extensions are also familiar (which typically contribute to stuff such as Facebook scam campaigns). But very recently, we've...
View ArticleThis is interesting....Defcoin- The Official Hacker Crypto Currency
DEFCOIN is a shameless clone of Bitcoin using scrypt as a proof-of-work algorithm.click here for more.....http://defcoin.org/
View ArticleTargeted Attacks and Ukraine
Lets start by stating that we know this blog post is dated April 1st. However, this is not an April Fools joke.In 2013, a series of attacks against European governments was observed by Kaspersky Lab....
View ArticleOldboot.B: the hiding tricks used by bootkit on Android
About one month ago, we found the first Bootkit Trojan on the Android platform in the worldwide — Oldboot.A. By flashing a malicious boot.img into an Android phone, the Oldboot.A Trojan starts to run...
View Article