Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Breaking MSFT Kerberos With Responder

I've been working on a way to get MS Kerberos v5 hashes via the Browser protocol automatically with no user interaction on a given network.read...

View Article


FireEye Releases Annual Mandiant Threat Report on Advanced Targeted Attacks

Advanced Attackers go Undetected for a Median of 229 Days; Only One-Third of Organizations Identify Breaches on Their Ownmore...

View Article


Wild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013?

Yesterday afternoon, Ars Technica published a story reporting two possible logs of Heartbleed attacks occurring in the wild, months before Monday's public disclosure of the vulnerability. It would be...

View Article

APT Attributions and DNS Profiling

It is always a challenging task for malware analysts in attribution of malware attackers. Most of the researchers extract the technological artifacts from the malware binaries and perform data mining...

View Article

analysis of openssl freelist reuse

About two days ago, I was poking around with OpenSSL to find a way to mitigate Heartbleed. I soon discovered that in its default config, OpenSSL ships with exploit mitigation countermeasures, and when...

View Article


OWASP ZAP 2.3.0 Release

OWASP ZAP 2.3.0 is now available : http://code.google.com/p/zaproxy/wiki/Downloads?tm=2There are a large number of changes in this release, so this post will just give a high level overview of some of...

View Article

New tool: sn00p - Automation framework for security tests

Today, nullsecurity just released a new tool: sn00p. It is available onnullsecurity.net and in BlackArch Linux (http://www.blackarch.org/).It is recommended to read the man page before using it.[...

View Article

Malwarelyse.me Graphical Malware Analysis with D3js in your Browser

I'm Michael from Austria and would like to introduce a new project to you.It is called Malwarelyse.me and provides Graphical Malware Analysis withD3js in your Browser.Here is the link to the teaser:...

View Article


heartleech

Demonstrates the "heartbleed" problem using full OpenSSL stack, and how simple pattern-matching isn't sufficient to detect this attack. It evades the pattern matching in IDS (Snort and EmergingThreat...

View Article


idb - iOS Blackbox Pentesting slides from Source Boston

More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process...

View Article

Coding Malware for Fun and Not for Profit (Because that would be illegal)

A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of...

View Article

How we got read access on Google’s production servers

To stay on top on the latest security alerts we often spend time on bug bounties and CTF’s. When we were discussing the challenge for the weekend, Mathias got an interesting idea: What target can we...

View Article

The Heartbleed Challenge

Can you steal the keys from this server?more here......https://www.cloudflarechallenge.com/heartbleed

View Article


The Other Side of Heartbleed - Client Vulnerabilities

We're getting reports of client applications that are vulnerable to the heartbleed issue.  Just as with server applications, these client applications are dependant on vulnerable versions of...

View Article

Bloody Cert Certified

Oh, Information Disclosure vulnerabilities.  Truly the Rodney Dangerfield of vulns, people never quite know what their impact is going to be.  With Memory Corruption, we’ve basically accepted that a...

View Article


Windows Domain Credentials Phishing Tool

While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in...

View Article

Adobe Reader for Android exposes insecure Javascript interfaces

------------------------------------------------------------------------Adobe Reader for Android exposes insecure Javascript...

View Article


Communizm : the Ramdo/Redyms Affiliate

Targeted by the last MSRT from Microsoft, Ramdo is an evolution of Redyms. Being deployed in Affiliate mode you may have seen it in different Exploit Kit (here : mainly in Magnitude and Fiesta but also...

View Article

Windows Incident Response- TTPs

Within the DFIR and threat intel communities, there has been considerable talk about "TTPs" - tactics, techniques and procedures used by targeted threat actors.  The most challenging aspect of this...

View Article

Cryptam Malware Document Analizer + imphash

The web and suite versions of the Cryptam document malware analysis system now calculate the imphash of embedded/dropped executables when possible and store this value within the dropped file info for...

View Article
Browsing all 8064 articles
Browse latest View live