Using KitKat verified boot
Android 4.4 introduced a number of security enhancements, most notably SELinux in enforcing mode. One security feature that initially got some press attention, because it was presumably aiming to 'end...
View ArticleMetadata Information Disclosure Vulnerability in OrbiTeam BSCW
Advisory: Metadata Information Disclosure in OrbiTeam BSCWRedTeam Pentesting discovered an information disclosure vulnerability inOrbiTeam's BSCW collaboration software. An unauthenticated attacker...
View Article300k servers vulnerable to Heartbleed one month later
It's been a month since the Heartbleed bug was announced, so I thought I'd rescan the Internet (port 443) to see how many systems remain vulnerable. Whereas my previous scan a month ago found 600,000...
View ArticleCVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerability
CVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerabilityDate Published: 05-08-2014Class: Design errorRemotely Exploitable: yesVulnerability Description:Foscam IP camera vendor provides a...
View ArticleVM Turbo Operations Manager 4.5.x Directory Traversal Vulnerability
Product: VM Turbo Operations ManagerVendor: VM TurboVulnerable Version(s): 4.5.x earlierTested Version: 4.0Advisory Publication: April 11, 2014Vendor Notification: April 11, 2014Public Disclosure: May...
View ArticleEnquete yS 1.0 SQLi Vulnerability
# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin# Risk: High# CWE number: CWE-89# Author: Hugo Santiago dos Santos# Contact: hugo.s@linuxmail.com# Date: 08/05/2014# Vendor Homepage:...
View ArticleOpenfiler 2.99.1 XSS Vuln
# Exploit Title: Multiple persistent XSS in Openfiler# Exploit author: Dolev Farhi @f1nhack# Date 07/05/2014# Vendor homepage: http://www.openfiler.com# Affected Software version: 2.99.1# Alerted...
View ArticleOpenfiler 2.99.1 Arbitrary Code Execution Vuln
# Exploit Title: Arbitrary Code Execution in Openfiler# Exploit author: Dolev Farhi @f1nhack# Date 07/05/2014# Vendor homepage: http://www.openfiler.com# Affected Software version: 2.99.1# Alerted...
View ArticleBeginners error: Synaptics touchpad driver delivered via Windows Update...
The WHQL-signed(!) Synaptics touchpad driver delivered via Windows Updateexecutes a rogue program C:\Program.exe with system privileges after itsinstallation.The observed offending command line is...
View ArticlePervasive vulnerabilities in offensive mindset - haughty hubris
hacking is addictive! ... and leads to poor judgement at all scales.the first step is admitting you have problem."hi, my name is [REDACTED] and i want to HACK...
View ArticleSophisticated Viknok Malware Proves That Click-fraud Is Still a Moneymaker...
Symantec has spotted a recent surge of infections of Trojan.Viknok, which can gain elevated operating system privileges in order to add compromised computers to a botnet. Trojan.Viknok, first observed...
View ArticleChromium's Frame Viewer visualises what happens in the browser on a per-frame...
For a web application to respond smoothly to user touch input the application needs to receive input events in JavaScript, react to them, and then allow time for the browser to render any changes made...
View ArticleSubverting without EIP
Few months ago I did some research regarding the vulnerability in Internet explorer demonstrated by VUPEN team in 2013 Pwn2Own competition. I had always this view in my mind that it would be possible...
View ArticleAndroid Users Beware — ‘Mandiant’-Branded Malware Identified
FireEye Labs recently identified malware for Android devices that masquerades as a Mandiant product. The malware can lock Android devices and displays a lock screen that uses the Mandiant brand.more...
View ArticleSSH key cloning problem in OnApp templates
OnApp sells a "complete IaaS platform" for hosting providers to offer virtual servers. Their platform ships with templates (disk images) for many different operating systems, which it automatically...
View ArticleSandstorm personal cloud platform- Take control of your web
When you use a web app today, you usually connect to its developers' servers. This is backwards, and leaves them in control. Sandstorm makes it easy to run web apps on your own server. Bring their apps...
View ArticleMetasploit: Adobe Flash Player Shader Buffer Overflow Vuln
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View ArticlePlesk 10 & 11 SSO XXE/XSS
This blog post is about complete failure that resulted in a win. In IRC I noticed people chatting about the offensive-security.com bugbounty. As they are the provider of what are meant to be some of...
View ArticlePaper: SQL Injection in Insert, Update and Delete Statements
IntroductionMost of the time when we talk about SQL injection we extract data by using the unionkeyword, error based, blind boolean and time based injection methods. All this comesunder a place where...
View ArticleHacked Wordpress Sites Lead to Exkits, CryptoWall
Because ransomware attacks are so disruptive and damaging, we make tracking them a priority. "CryptoWall" is one of the attacks we're tracking, and I wanted to highlight one aspect of the network...
View Article