OpenSSL bug CVE-2014-0160 affects way more programs than just Tor.....POC...
A new OpenSSL vulnerability on 1.0.1 through 1.0.1f is out today, which can be used to reveal up to 64kB of memory to a connected client or server.If you're using an older OpenSSL version, you're...
View ArticleSlides: Finding and Reverse Engineering Backdoors in Consumer Firmware
Just got back from the EELive conference in San Jose – great talks, great people, and way better weather than we had back here on the east coast.For those interested, the slides for my talk, “Finding...
View ArticleTechnical Analysis of CVE-2014-1761 RTF Vulnerability
Recently, Microsoft announced that an RTF sample exploiting CVE-2014-1761 is in the wild. The sample has just become publicly known. I spent some time analyzing the vulnerability and this blog...
View ArticleWhatsapp Forensic/Stealer (Android) POC Paper
This question made me write this simple POC tutorial to hack/steal whatsapp chatsfrom any android mobile (in intial level), so as we know whatsapp is one of the veryfamous chat messenger used in mobile...
View ArticleBuilding a Decoder for the CVE-2014-0502 Shellcode
In late February of this year multiple security companies (FireEye, AlientVault, SecPod, Symantec, plus many more) were reporting on a Flash zero-day vulnerability (CVE-2014-0502) being exploited in...
View ArticleThe #1 New Paid Security App In The Play Store Costs $4, Has Over 10,000...
Computer security is important, even if the computer in question fits in your hand. There should be no doubt about that fact. However, you should be just as wary of security software as any other app....
View ArticleMS14-019 – Fixing a binary hijacking via .cmd or .bat file
Command (.cmd) and batch (.bat) files can be directly provided as input to the CreateProcess as if it is an executable. CreateProcess uses the cmd.exe automatically to run the input .cmd or .bat.Today,...
View Articlemasscan- scan the whole internet for the Hearbleed vulnerability in under 6...
click here.......https://github.com/robertdavidgraham/masscan/commit/23497c448b0a1c7058e8443e5202e7bffcab4795
View ArticleCyber Threats against the Aviation Industry
The recent incident to the Malaysia Airlines Flight MH370 is fueling the discussion of whether would be possible to hack into an airplane and gain complete control control of on-board systems,...
View ArticleAdvanced Persistent Threats and the rise of the app stores
Once upon a time, the battle between malware writers and antimalware (AM) protection writers was all about doing business in volume. In the old days of the untargeted attack, if the victim had...
View ArticleMetasploit Module for HeartBleed bug
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliary include...
View ArticleSome Links to recent Heartbleed browser-addons
https://addons.mozilla.org/de/firefox/addon/foxbleed/(http://breaking.systems/blog/2014/04/foxbleed-check-your-frequently-visited-websites-en-passant)andhttps://chrome.google.com/webstore/detail/chrome...
View ArticleSyscan 2014 - Deep-Submicron Backdoors (And one more thing...)
The people from COSEINC know how to throw conferences, but Syscan 2014 can easily be their best... ever! The quality of the talks were outstanding and it's hard to pick up one or two, it was like a...
View ArticleSecure Usage of Android Webview:
The WebView class is one of the most powerful classes and it renders web pages like a normal browser. Applications can interact with WebView by adding a hook, monitoring changes being made, add...
View ArticleCapturing Ghosts: Using inotify to defeat an Android DRM system
Apart from our typical application penetration testing engagements, clients sometimes come to us looking to test the resiliancy of various security mechanisms they want to apply to their applications....
View ArticlePaper: A LARGE-SCALE EVALUATION OF HIGH-IMPACT PASSWORD STRENGTH METERS
access the full paper here.....http://users.encs.concordia.ca/~mmannan/student-resources/Thesis-MASc-Carnavalet-2014.pdf
View ArticleWhen two-factor authentication is not enough
TL;DR: This is the story of a failed attempt to steal FastMail’s domains.We don’t publish all attempts on our security, but this one stands out for how much effort was put into the attack, and how far...
View ArticleGlobal Phishing Survey 2H2013: Trends and Domain Name Use
Criminals always look for the latest angles – the best resources to use, the best places tofind victims, and the best ways to avoid detection. By analyzing the phishing that tookplace in the second...
View ArticleFinancial cyber threats in 2013. Part 2: malware
According to the information collected from the protection sub-systems of Kaspersky Lab products, 2013 saw a dramatic increase in the number of finance-related attacks, be it phishing or attacks...
View ArticlePaper: ECE544NA Final Project: Malicious Code Execution Detection Using...
In this project, Bottleneck Stacked Autoencoder, adeep learning method, is used to model the normal program(application) behavior and to detect abnormal behavior in termsof the system call usage. The...
View Article