Coming Soon to IEF: Recover Documents, Corporate Email, IM and OS Artifacts
With the release of our next version of Internet Evidence Finder (IEF), we will be introducing a new business application and operating system artifacts module that enables the recovery of a host of...
View ArticlePunking Pet Peeves with PowerShell
Yesterday, Rob discussed Collecting Workstation / Software Inventory Several Ways, including PowerShell. I don't spend nearly as much time as I used to going hands-on with systems, but everytime I need...
View ArticleUnpacking the Local-App-Wizard packer
On this glorious Saturday night we’re going to go over how to unpack the ‘Local-App-Wizard’ packer.The way the packer works is by creating a suspended process of itself, hollowing it out / allocating...
View ArticleThreat analysis: Zendran ELF DDoS scheme (lightaidra ircd base) - Part 1:...
There are a lot of DDoS attacks performed each day. Our systems are also being abused by these, and maybe some of you have the same shares too. MalwareMustDie analysis is focusing on malware, and...
View ArticleThreat analysis: Zendran ELF DDoS scheme (lightaidra ircd base) | Part 2: CnC...
As mentioned on MalwareMustDie, a trojan downloader got in one of my honeypots. It is the Lightaidra one, a simple coded bot to infect machines like routers. It scans networks and tries to login with...
View ArticleInformation Exposure (Username/password for the user interface as well as...
========================================Inokii Security AdvisoryInokii-ID: 2014-01========================================Affected Product:ARRIS / Motorola SURFboard SBG6580 Series Wi-Fi Cable Modem...
View ArticleiOS 7.1.1 Jailbreak
Today we have shared with the world that we developed a new jailbreak for iOS 7.1.1 by releasing a picture of a jailbroken yellow iPhone 5c at iOS 7.1.1. This jailbreak is a completely reimplemented...
View ArticleIE11 Sandbox Escapes
For those interested, some example source code for fixed IE11 sandbox escapes here....https://github.com/tyranid/IE11SandboxEscapes
View ArticleNew Anti-Analysis Tricks In Andromeda 2.08
Andromeda is an infamous modular botnet that has been around for several years now. It is very popular in the underground cybercrime market, with many different variants that use different RC4 keys in...
View ArticleMr Silverlight Drive-by Meet Volatility Timelines
I recently had the opportunity to attend the Volatility Windows Malware and Memory Forensics Training. Prior to the training, I used memory forensics (and thus Volatility) in different capacities but...
View ArticleIn Letter to Obama, Cisco CEO Complains About NSA Allegations
Warning of an erosion of confidence in the products of the U.S. technology industry, John Chambers, the CEO of networking giant Cisco Systems, has asked President Obama to intervene to curtail the...
View ArticleXOOPS Glossaire 1.0 SQL Injection Vuln
Xoops Module (Glossaire v1.0) - Sql Injection Vulnerabilty===================================================================####################################################################.:....
View ArticleCRMAPP SQL Injection Vuln
Crm Application - Time-Based Blind Injection===================================================================####################################################################.:. Author :...
View ArticleWiser 2.10 Backup Disclosure Vuln
iser 2.10 [SIP SERVER] - Backup download vulnerability===================================================================####################################################################.:. Author...
View ArticlePHP-Nuke Web Links SQL Injection Vuln
PHP-Nuke module(Web Links) - Sql Injection Vulnerabilty===================================================================####################################################################.:. Author...
View ArticleSMART iPBX SQL injection Vuln
SMART iPBX - Multiple Sql Injection===================================================================####################################################################.:. Author :...
View ArticleSIP Server By Kerne.org SQL Injection / Backup Disclosure Vulns
SIP Server by Kerne.org - Multiple Vulnerabilties===================================================================####################################################################.:. Author...
View ArticlePaper: Distributed architectures and algorithms for network security
As our society becomes more dependent on networked information systems, it isalso becoming increasingly vulnerable to their misuse. The large amount ofsensitive information transmitted over computer...
View ArticleJustice Department charges China with cyber-spying crimes on U.S. firms...
The Justice Department has filed criminal charges against several Chinese government officials, accusing them of stealing American trade secrets through cyber espionage, according to U.S. officials...
View ArticleWorldwide Operation Against Cybercriminals
During two days of operations taking place in 16 countries worldwide, coordinated by Eurojust in The Hague and supported by the European Cybercrime Centre (EC3) at Europol, creators, sellers and users...
View Article