Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

OpenSSL bug CVE-2014-0160 affects way more programs than just Tor.....POC...

A new OpenSSL vulnerability on 1.0.1 through 1.0.1f is out today, which can be used to reveal up to 64kB of memory to a connected client or server.If you're using an older OpenSSL version, you're...

View Article


Slides: Finding and Reverse Engineering Backdoors in Consumer Firmware

Just got back from the EELive conference in San Jose – great talks, great people, and way better weather than we had back here on the east coast.For those interested, the slides for my talk, “Finding...

View Article


Technical Analysis of CVE-2014-1761 RTF Vulnerability

Recently, Microsoft announced that an RTF sample exploiting CVE-2014-1761 is in the wild. The sample has just become publicly known. I spent some time analyzing the vulnerability and this blog...

View Article

Whatsapp Forensic/Stealer (Android) POC Paper

This question made me write this simple POC tutorial to hack/steal whatsapp chatsfrom any android mobile (in intial level), so as we know whatsapp is one of the veryfamous chat messenger used in mobile...

View Article

Building a Decoder for the CVE-2014-0502 Shellcode

In late February of this year multiple security companies (FireEye, AlientVault, SecPod, Symantec, plus many more) were reporting on a Flash zero-day vulnerability (CVE-2014-0502) being exploited in...

View Article


The #1 New Paid Security App In The Play Store Costs $4, Has Over 10,000...

Computer security is important, even if the computer in question fits in your hand. There should be no doubt about that fact. However, you should be just as wary of security software as any other app....

View Article

MS14-019 – Fixing a binary hijacking via .cmd or .bat file

Command (.cmd) and batch (.bat) files can be directly provided as input to the CreateProcess as if it is an executable. CreateProcess uses the cmd.exe automatically to run the input .cmd or .bat.Today,...

View Article

masscan- scan the whole internet for the Hearbleed vulnerability in under 6...

click here.......https://github.com/robertdavidgraham/masscan/commit/23497c448b0a1c7058e8443e5202e7bffcab4795

View Article


Cyber Threats against the Aviation Industry

The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of on-board systems,...

View Article


Advanced Persistent Threats and the rise of the app stores

Once upon a time, the battle between malware writers and antimalware (AM) protection writers was all about doing business in volume. In the old days of the untargeted attack, if the victim had...

View Article

Metasploit Module for HeartBleed bug

### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliary  include...

View Article

Some Links to recent Heartbleed browser-addons

https://addons.mozilla.org/de/firefox/addon/foxbleed/(http://breaking.systems/blog/2014/04/foxbleed-check-your-frequently-visited-websites-en-passant)andhttps://chrome.google.com/webstore/detail/chrome...

View Article

Syscan 2014 - Deep-Submicron Backdoors (And one more thing...)

The people from COSEINC know how to throw conferences, but Syscan 2014 can easily be their best... ever! The quality of the talks were outstanding and it's hard to pick up one or two, it was like a...

View Article


Secure Usage of Android Webview:

The WebView class is one of the most powerful classes and it renders web pages like a normal browser. Applications can interact with WebView by adding a hook, monitoring changes being made, add...

View Article

Capturing Ghosts: Using inotify to defeat an Android DRM system

Apart from our typical application penetration testing engagements, clients sometimes come to us looking to test the resiliancy of various security mechanisms they want to apply to their applications....

View Article


Paper: A LARGE-SCALE EVALUATION OF HIGH-IMPACT PASSWORD STRENGTH METERS

access the full paper here.....http://users.encs.concordia.ca/~mmannan/student-resources/Thesis-MASc-Carnavalet-2014.pdf

View Article

When two-factor authentication is not enough

TL;DR: This is the story of a failed attempt to steal FastMail’s domains.We don’t publish all attempts on our security, but this one stands out for how much effort was put into the attack, and how far...

View Article


Global Phishing Survey 2H2013: Trends and Domain Name Use

Criminals always look for the latest angles – the best resources to use, the best places tofind victims, and the best ways to avoid detection. By analyzing the phishing that tookplace in the second...

View Article

Financial cyber threats in 2013. Part 2: malware

According to the information collected from the protection sub-systems of Kaspersky Lab products, 2013 saw a dramatic increase in the number of finance-related attacks, be it phishing or attacks...

View Article

Paper: ECE544NA Final Project: Malicious Code Execution Detection Using...

In this project, Bottleneck Stacked Autoencoder, adeep learning method, is used to model the normal program(application) behavior and to detect abnormal behavior in termsof the system call usage. The...

View Article
Browsing all 8064 articles
Browse latest View live