Breaking MSFT Kerberos With Responder
I've been working on a way to get MS Kerberos v5 hashes via the Browser protocol automatically with no user interaction on a given network.read...
View ArticleFireEye Releases Annual Mandiant Threat Report on Advanced Targeted Attacks
Advanced Attackers go Undetected for a Median of 229 Days; Only One-Third of Organizations Identify Breaches on Their Ownmore...
View ArticleWild at Heart: Were Intelligence Agencies Using Heartbleed in November 2013?
Yesterday afternoon, Ars Technica published a story reporting two possible logs of Heartbleed attacks occurring in the wild, months before Monday's public disclosure of the vulnerability. It would be...
View ArticleAPT Attributions and DNS Profiling
It is always a challenging task for malware analysts in attribution of malware attackers. Most of the researchers extract the technological artifacts from the malware binaries and perform data mining...
View Articleanalysis of openssl freelist reuse
About two days ago, I was poking around with OpenSSL to find a way to mitigate Heartbleed. I soon discovered that in its default config, OpenSSL ships with exploit mitigation countermeasures, and when...
View ArticleOWASP ZAP 2.3.0 Release
OWASP ZAP 2.3.0 is now available : http://code.google.com/p/zaproxy/wiki/Downloads?tm=2There are a large number of changes in this release, so this post will just give a high level overview of some of...
View ArticleNew tool: sn00p - Automation framework for security tests
Today, nullsecurity just released a new tool: sn00p. It is available onnullsecurity.net and in BlackArch Linux (http://www.blackarch.org/).It is recommended to read the man page before using it.[...
View ArticleMalwarelyse.me Graphical Malware Analysis with D3js in your Browser
I'm Michael from Austria and would like to introduce a new project to you.It is called Malwarelyse.me and provides Graphical Malware Analysis withD3js in your Browser.Here is the link to the teaser:...
View Articleheartleech
Demonstrates the "heartbleed" problem using full OpenSSL stack, and how simple pattern-matching isn't sufficient to detect this attack. It evades the pattern matching in IDS (Snort and EmergingThreat...
View Articleidb - iOS Blackbox Pentesting slides from Source Boston
More than ever, mobile apps are used to manage and store sensitive data by both corporations and individuals. In this talk, we review common iOS mobile app flaws involving data storage, inter-process...
View ArticleCoding Malware for Fun and Not for Profit (Because that would be illegal)
A while ago some of you may remember me saying that I was so bored of there being no decent malware to reverse, that I might as well write some. Well, I decided to give it a go and I've spent some of...
View ArticleHow we got read access on Google’s production servers
To stay on top on the latest security alerts we often spend time on bug bounties and CTF’s. When we were discussing the challenge for the weekend, Mathias got an interesting idea: What target can we...
View ArticleThe Heartbleed Challenge
Can you steal the keys from this server?more here......https://www.cloudflarechallenge.com/heartbleed
View ArticleThe Other Side of Heartbleed - Client Vulnerabilities
We're getting reports of client applications that are vulnerable to the heartbleed issue. Just as with server applications, these client applications are dependant on vulnerable versions of...
View ArticleBloody Cert Certified
Oh, Information Disclosure vulnerabilities. Truly the Rodney Dangerfield of vulns, people never quite know what their impact is going to be. With Memory Corruption, we’ve basically accepted that a...
View ArticleWindows Domain Credentials Phishing Tool
While performing a Pen test for a client i needed to catch a domain user name and password, there are several ways to gain users passwords and it really depends on a lot of factors on how to get it in...
View ArticleAdobe Reader for Android exposes insecure Javascript interfaces
------------------------------------------------------------------------Adobe Reader for Android exposes insecure Javascript...
View ArticleCommunizm : the Ramdo/Redyms Affiliate
Targeted by the last MSRT from Microsoft, Ramdo is an evolution of Redyms. Being deployed in Affiliate mode you may have seen it in different Exploit Kit (here : mainly in Magnitude and Fiesta but also...
View ArticleWindows Incident Response- TTPs
Within the DFIR and threat intel communities, there has been considerable talk about "TTPs" - tactics, techniques and procedures used by targeted threat actors. The most challenging aspect of this...
View ArticleCryptam Malware Document Analizer + imphash
The web and suite versions of the Cryptam document malware analysis system now calculate the imphash of embedded/dropped executables when possible and store this value within the dropped file info for...
View Article