Darknet and Black Hole Monitoring a Journey into Typographic Errors
Darknet and blackhole monitoring presentation given last week here........http://www.circl.lu/assets/files/circl-blackhole-honeynetworkshop2014.pdf
View ArticleINVINCEA LAUNCHES RESEARCH EDITION, A FREE MALWARE DISCOVERY AND ANALYSIS...
Provides DF/IR Community With Award-winning Invincea FreeSpace Malware Containment and Detection Solution, Access to Invincea Threat Management Service for Crowdsourced Data Forensics and Analysis, an...
View ArticlePonyBotnet (panel)
NOT MY CODE! I am not the author. I've came across this code and created this repo to simplify access to those who want to study it.more here..........https://github.com/stamparm/PonyBotnet_panel
View ArticleYes more on Silverlight- Angling for Silverlight Exploits
Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have observed substantial traffic (often from...
View ArticleHow I XSS’ed All Of Yahoo’s Services
Hello. Normally I don’t write a write-up for XSS vulnerability; however this XSS was a bit different because it affects 100s of Yahoo! subdomains. After my SQL Injection on the HK sub-domains, I...
View ArticleThreat Outbreak Alert: Fake Facebook Software Security Update Email Messages
Email messages that are related to this threat (RuleID9997 and RuleID9997KVR) may contain the following files:tompmcmeekan.ziptompmcmeekan.exetntcarlo.ziptntcarlo.exeThe tompmcmeekan.exe in the...
View ArticleCrypto Won't Save You Either
Cryptographer Adi Shamir, the 'S' in RSA, once said that "cryptography is bypassed, not penetrated". In the light of the Snowden revelations about the NSA, various people have proposed the use of...
View ArticleKovter Ransomware Grows
Ransomware is not new to the malware game but there is one especially dirty player that is surfacing more frequently. Damballa’s threat research team has seen infections related to the Kovter malware...
View ArticlePaper: Combining Multiple Malware Detection Approaches for Achieving Higher...
As malware poses a major threat on the Internet, malware detectionand mitigation approaches have been developed and used in thebattle against malware. Some malware samples elude these approaches,while...
View ArticleNews160,000 new samples of malware every day in the first quarter of 2014
Our colleagues at PandaLabs have released the quarterly report for Q1 2014. One of the report’s main conclusions is that malware is still being created in record-breaking amounts.Over this period more...
View ArticleMetasploit: ElasticSearch Dynamic Script Arbitrary Java Execution
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View ArticleICANN registrar database hacked
ICANN’s database of registrar contact information has been hacked and user data has been stolen.The organization announced this morning that the database, known as RADAR, has been taken offline while...
View ArticleDosfun4u 1 & 2 Quals CTF DEF CON
The challenge's abstract is succinct but quite accurate:more here..........http://www.synacktiv.com/ressources/defcon-ctf-2014-quals-dosfun4u-writeup.pdf
View ArticleMimikatz Against Virtual Machine Memory Part 1
Pentesting is a funny thing. Someone will drop some new way of doing something and then you get to reflect on all those missed opportunities on previous engagements. I remember when MC showed me all...
View ArticleBackdoored Web Application v.1.0.1
In December 2012 I released my Backdoored Web Application (BWA)(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2012-December/008630.html)- a reference test of backdoors scanners....
View ArticleNew CryptoLocker Has a Walkabout
Looks like we're seeing a rather small amount of messages this morning appearing to look like utility bills from Energy Australia. The graphics look pretty convincing complete with logo and barcode and...
View ArticleThe Backdoor Factory Proxy
Patch Binaries via MITM: BackdoorFactory + mitmProxymore here..........https://github.com/secretsquirrel/BDFProxy
View ArticleA journey to abused FTP sites (story of: Shells, Malware, Bots, DDoS & Spam)...
If you are having an experience as a system administration in an ISP, IDC or etc internet portal, security issues is part of the job description; you'll deal with IDS alerts, IR cases, and some claims...
View ArticleNew NIST Guidelines Doc on Mobile Device Forensics
The digital forensic community faces a constant challenge to stay abreast of the latesttechnologies that may be used to expose relevant clues in an investigation. Mobile devices arecommonplace in...
View ArticleAnother 9002 Trojan Variant
After investigating a newer malicious XLS document presumably targeted at a Chinese national, I noticed some oddly familiar network traffic produced by the backdoor it dropped. It was very clearly a...
View Article