Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

AlienVault 4.5.0 authenticated sql injection

The following request is vulnerable to a SQL injection attack from authenticated users, adminnot requiredclick here....https://gist.github.com/brandonprry/9874177

View Article


Caution: Malware pre-installed!

China’s leading TV station, CCTV, has a long-standing tradition of marking World Consumer Rights Day on March 15 with its ‘315 Evening Party’. The annual show makes a song and dance about consumer...

View Article


w3af 1.6 release

1.6 release:        * Improved performance: your scans will run faster        * Now you'll be able to easily integrate w3af into otherprojects with a simple "import w3af"        * Better documentation...

View Article

EMC CTA v10.0 unauthenticated XXE with root perms

The linked gist below details an unauthenticated XXE vulnerability thatallows an attacker to read /etc/shadow within EMC CTA v10.0.https://gist.github.com/brandonprry/9895721

View Article

Wilcard DNS, Content Poisoning, XSS and Certificate Pinning

Hi everyone, this time I'm going o talk about an interesting vulnerability that I reported to Google and Facebook a couple of months ago. I had some spare time last October and I started testing for...

View Article


Paper: On the Practical Exploitability of Dual EC in TLS Implementations

read the paper in its entirety here...http://dualec.org/DualECTLS.pdf

View Article

ABaDooRand - Anti-backdoor pseudo-random and quite true-random numbers for...

ABaDooRand is a library that produces anti-backdoor pseudo-random numbers, thus, cryptographically secure PRNG (CSPRNG) and RNG (CSRNG). Since PRISM and Snowden 2013-2014 revelations, we by principle...

View Article

How a hacked password can unlock a Tesla car

A luxury Tesla Model S car, which (when maxed out with options and bells-and-whistles) is worth over $100,000.You wouldn’t really expect the only thing to prevent a thief from unlocking it to be a...

View Article


Old School Code Injection in an ATM .dll

During our last ATM review engagement, we found some interesting executable files that were run by Windows Services under Local System account. These binaries had weak file permissions that allowed us...

View Article


Video: Dissecting the Target breach

Cyphort research team found and dissected the malware accused of stealing 110 million credit card records from Target. Join Nick as he explains the interstices of how this malware works. We'll step...

View Article

Android.MisoSMS : Its back! Now with XTEA

FireEye labs recently found a more advanced variant of Android.MisoSMS, the SMS-stealing malware that we uncovered last December — yet another sign of cybercriminals’ growing interest in hijacking...

View Article

How to: Shellcode to reverse bind a shell with netcat

Imagine you found a vulnerability in a web server and decided to take over that machine to do your dirty deeds, what do you do? Well, for starters, you have to figure out how to exploit the...

View Article

Getting my feet wet with invasive attacks, part 1: Target recon

click here to read more....http://siliconexposed.blogspot.gr/2014/03/getting-my-feet-wet-with-invasive.html

View Article


Retrieving NTDS.dit without a Shell on the DC

t has been increasingly common for organizations to prevent external or outbound connections from their domain controllers. I have seen some use the Windows Firewall, others use non-routable IP...

View Article

The weird and wonderful world of DNS LOC records

A cornerstone of CloudFlare's infrastructure is our ability to serve DNS requests quickly and handle DNS attacks. To do both those things we wrote out own authoratitive DNS server called RRDNS in Go....

View Article


WinRar File extension spoofing ( 0DAY )

Winrar is one of the most common application for compressing and decompressing data.The application is capble of compressing data as rar or as zip format.This Article is going to present a new...

View Article

Coremex Innovates Search Engine Hijacking

alware that targets search engine results is nothing new. Malicious browser extensions are also familiar (which typically contribute to stuff such as Facebook scam campaigns). But very recently, we've...

View Article


This is interesting....Defcoin- The Official Hacker Crypto Currency

DEFCOIN is a shameless clone of Bitcoin using scrypt as a proof-of-work algorithm.click here for more.....http://defcoin.org/

View Article

Targeted Attacks and Ukraine

Lets start by stating that we know this blog post is dated April 1st. However, this is not an April Fools joke.In 2013, a series of attacks against European governments was observed by Kaspersky Lab....

View Article

Oldboot.B: the hiding tricks used by bootkit on Android

About one month ago, we found the first Bootkit Trojan on the Android platform in the worldwide — Oldboot.A. By flashing a malicious boot.img into an Android phone, the Oldboot.A Trojan starts to run...

View Article
Browsing all 8064 articles
Browse latest View live