Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Using KitKat verified boot

Android 4.4 introduced a number of security enhancements, most notably SELinux in enforcing mode. One security feature that initially got some press attention, because it was presumably aiming to 'end...

View Article


Image may be NSFW.
Clik here to view.

Metadata Information Disclosure Vulnerability in OrbiTeam BSCW

Advisory: Metadata Information Disclosure in OrbiTeam BSCWRedTeam Pentesting discovered an information disclosure vulnerability inOrbiTeam's BSCW collaboration software. An unauthenticated attacker...

View Article


Image may be NSFW.
Clik here to view.

300k servers vulnerable to Heartbleed one month later

It's been a month since the Heartbleed bug was announced, so I thought I'd rescan the Internet (port 443) to see how many systems remain vulnerable. Whereas my previous scan a month ago found 600,000...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerability

CVE-2014-1849 Foscam Dynamic DNS predictable credentials vulnerabilityDate Published: 05-08-2014Class: Design errorRemotely Exploitable: yesVulnerability Description:Foscam IP camera vendor provides a...

View Article

Image may be NSFW.
Clik here to view.

VM Turbo Operations Manager 4.5.x Directory Traversal Vulnerability

Product: VM Turbo Operations ManagerVendor: VM TurboVulnerable Version(s): 4.5.x earlierTested Version: 4.0Advisory Publication: April 11, 2014Vendor Notification: April 11, 2014Public Disclosure: May...

View Article


Image may be NSFW.
Clik here to view.

Enquete yS 1.0 SQLi Vulnerability

# Enquete yS - Full v. 1.0 POST SQL Injection in Panel Admin# Risk: High# CWE number: CWE-89# Author: Hugo Santiago dos Santos# Contact: hugo.s@linuxmail.com# Date: 08/05/2014# Vendor Homepage:...

View Article

Image may be NSFW.
Clik here to view.

Openfiler 2.99.1 XSS Vuln

# Exploit Title: Multiple persistent XSS in Openfiler# Exploit author: Dolev Farhi @f1nhack# Date 07/05/2014# Vendor homepage: http://www.openfiler.com# Affected Software version: 2.99.1# Alerted...

View Article

Image may be NSFW.
Clik here to view.

Openfiler 2.99.1 Arbitrary Code Execution Vuln

# Exploit Title: Arbitrary Code Execution in Openfiler# Exploit author: Dolev Farhi @f1nhack# Date 07/05/2014# Vendor homepage: http://www.openfiler.com# Affected Software version: 2.99.1# Alerted...

View Article


Image may be NSFW.
Clik here to view.

Beginners error: Synaptics touchpad driver delivered via Windows Update...

The WHQL-signed(!) Synaptics touchpad driver delivered via Windows Updateexecutes a rogue program C:\Program.exe with system privileges after itsinstallation.The observed offending command line is...

View Article


Image may be NSFW.
Clik here to view.

Pervasive vulnerabilities in offensive mindset - haughty hubris

hacking is addictive! ... and leads to poor judgement at all scales.the first step is admitting you have problem."hi, my name is [REDACTED] and i want to HACK...

View Article

Image may be NSFW.
Clik here to view.

Sophisticated Viknok Malware Proves That Click-fraud Is Still a Moneymaker...

Symantec has spotted a recent surge of infections of Trojan.Viknok, which can gain elevated operating system privileges in order to add compromised computers to a botnet. Trojan.Viknok, first observed...

View Article

Image may be NSFW.
Clik here to view.

Chromium's Frame Viewer visualises what happens in the browser on a per-frame...

For a web application to respond smoothly to user touch input the application needs to receive input events in JavaScript, react to them, and then allow time for the browser to render any changes made...

View Article

Image may be NSFW.
Clik here to view.

Subverting without EIP

Few months ago I did some research regarding the vulnerability in Internet explorer demonstrated by VUPEN team in 2013 Pwn2Own competition. I had always this view in my mind that it would be possible...

View Article


Image may be NSFW.
Clik here to view.

Android Users Beware — ‘Mandiant’-Branded Malware Identified

FireEye Labs recently identified malware for Android devices that masquerades as a Mandiant product. The malware can lock Android devices and displays a lock screen that uses the Mandiant brand.more...

View Article

Image may be NSFW.
Clik here to view.

SSH key cloning problem in OnApp templates

OnApp sells a "complete IaaS platform" for hosting providers to offer virtual servers. Their platform ships with templates (disk images) for many different operating systems, which it automatically...

View Article


Image may be NSFW.
Clik here to view.

Sandstorm personal cloud platform- Take control of your web

When you use a web app today, you usually connect to its developers' servers. This is backwards, and leaves them in control. Sandstorm makes it easy to run web apps on your own server. Bring their apps...

View Article

Image may be NSFW.
Clik here to view.

Metasploit: Adobe Flash Player Shader Buffer Overflow Vuln

### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote  Rank =...

View Article


Image may be NSFW.
Clik here to view.

Plesk 10 & 11 SSO XXE/XSS

This blog post is about complete failure that resulted in a win. In IRC I noticed people chatting about the offensive-security.com bugbounty. As they are the provider of what are meant to be some of...

View Article

Image may be NSFW.
Clik here to view.

Paper: SQL Injection in Insert, Update and Delete Statements

IntroductionMost of the time when we talk about SQL injection we extract data by using the unionkeyword, error based, blind boolean and time based injection methods. All this comesunder a place where...

View Article

Image may be NSFW.
Clik here to view.

Hacked Wordpress Sites Lead to Exkits, CryptoWall

Because ransomware attacks are so disruptive and damaging, we make tracking them a priority. "CryptoWall" is one of the attacks we're tracking, and I wanted to highlight one aspect of the network...

View Article
Browsing all 8064 articles
Browse latest View live