Fake antivirus – attack of the clones
Experts recently discovered a scam antivirus app on Google Play going by the name of Virus Shield. A distinct feature of this particular app was the fact that users had to pay for it – most fake AV can...
View ArticleTWEETNACL: HOW CR.YP.TO’S DEVELOPERS GOT CARRIED AWAY BY THE CARRY BIT ;-)
When evaluating what crypto library to use for the public-key encryption filter for Skylable SX (which is under development) I came across TweetNaCl. TweetNaCl is a public-domain cryptographic library...
View ArticleDoc: PayPal Manager Admin Account Hijack
This attack required a number of steps and obstacles to overcome in order to hijack another Adminsmerchant account by means of changing their password. PayPal had gone to considerable lengths (moreso...
View ArticlePEframe- Static analysis tool
PEframe is a open source tool to perform static analysis on (portable executable) malware working on Mac OS X, Windows and Linux.more here...........https://github.com/guelfoweb/peframe
View Article500K HTTP Headers
Recently we crawled the Top 500K sites (as ranked by Alexa). Following requests from readers we are making available the HTTP Headers for research purposes. Download Headers (75MB)The publication of...
View ArticleMicrosoft says Tor can't foil NSA surveillance or cyber crooks (No revelation...
HOUSTON: THE TOR NETWORK cannot protect internet users from state sponsored hackers and cyber criminals, according to a Microsoft security expert.Andy Malone, Microsoft most valued professional (MVP)...
View ArticleA Journey Inside the Asprox Modules
Back in November 2013 we had a closer look at the new encryption scheme used by Asprox, a subject expanded by herrcore in January 2014.In "A deeper dive into the Asprox Ecosystem", we analysed the...
View ArticleASSESSMENT: Operation Saffron Rose/Operation Flying Kitten
I think it was a slow news day at FireEye or that they felt they needed media attention and thus was born the “Saffron Rose” campaign report that was released Monday. The report makes the evocative...
View ArticleAirDroid Lock Screen Bypass
I'm running AirDroid v2.1.0 on CleanROM 8.1 Core Edition. On my phone(Galaxy S3), I have a pattern lock screen enabled.Vulnerability: When running AirDroid in the background and the phonelocks, you...
View Article[REVIVE-SA-2014-001] Revive Adserver 3.0.5 fixes CSRF vulnerability
========================================================================Revive Adserver Security Advisory...
View ArticleMac OS X stack_chk_guard not always safe from overwrite
$ sysctl kern.versionkern.version: Darwin Kernel Version 13.1.0: Wed Apr 2 23:52:02 PDT 2014;root:xnu-2422.92.1~2/RELEASE_X86_64$ mkdir stack_guard=0x4141414141414141$ ln -sf ../appledump...
View ArticleWordpress Theme Echea Shell Upload Vulnerability
############################################################################# Title : Wordpress Theme Echea Shell Upload Vulnerability # Author : Aloulou #...
View Articleclusterd-New Features Release
clusterd the open source application server attack toolkit has just released additional features here....https://github.com/hatRiot/clusterd/releases/tag/0.3
View Articlecheck_dhcp - Nagios Plugins
=============================================- Release date: 15.05.2014- Discovered by: Dawid Golunski- Severity: Moderate=============================================I....
View ArticleFrom Fuzzing to 0-day
A couple of days ago, I found an interesting bug during a fuzzing session that led to me creating a 0-day exploit for it. I’ve been asked a few times about the methods I use to find bugs and write...
View ArticleScanJS- Static analysis tool for javascript code based.
ScanJS is a Static analysis tool for javascript code. ScanJS was created as an aid for security review, to help identify security issues in client-side web applications. TheScanjs uses Acorn to convert...
View Article[CVE-2014-3749] Construtiva CIS Manager CMS POST SQLi
Construtiva CIS Manager CMS POST SQLiTL;DR;====== . PRODUCT : Construtiva CIS Manager . TYPE : SQLi http://site/autenticar/lembrarlogin.asp (POST email) . CVE : CVE-2014-3749Software...
View ArticleR7-2014-01, R7-2014-02, R7-2014-03 Disclosures: Exposure of Critical...
This report includes details for three critical information disclosure vulnerabilities. The vulnerabilities were discovered while Matthew Kienow and I were researching information disclosure issues in...
View ArticleHacking the D-Link DSP-W215 Smart Plug
The D-Link DSP-W215 Smart Plug is a wireless home automation device for monitoring and controlling electrical outlets. It isn’t readily available from Amazon or Best Buy yet, but the firmware is up on...
View ArticleFBI Cybercrime Crackdown - Blackshades
t would seem the FBI is cracking down on cybercrime (well script-kiddies at least), with a bunch of international raids carried out in the past few days and more said to come. As of today it seems that...
View Article