Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Darknet and Black Hole Monitoring a Journey into Typographic Errors

Darknet and blackhole monitoring presentation given last week here........http://www.circl.lu/assets/files/circl-blackhole-honeynetworkshop2014.pdf

View Article


Image may be NSFW.
Clik here to view.

INVINCEA LAUNCHES RESEARCH EDITION, A FREE MALWARE DISCOVERY AND ANALYSIS...

Provides DF/IR Community With Award-winning Invincea FreeSpace Malware Containment and Detection Solution, Access to Invincea Threat Management Service for Crowdsourced Data Forensics and Analysis, an...

View Article


Image may be NSFW.
Clik here to view.

PonyBotnet (panel)

NOT MY CODE! I am not the author. I've came across this code and created this repo to simplify access to those who want to study it.more here..........https://github.com/stamparm/PonyBotnet_panel

View Article

Image may be NSFW.
Clik here to view.

Yes more on Silverlight- Angling for Silverlight Exploits

Silverlight exploits are the drive-by flavor of the month. Exploit Kit (EK) owners are adding Silverlight to their update releases, and since April 23rd we have observed substantial traffic (often from...

View Article

Image may be NSFW.
Clik here to view.

How I XSS’ed All Of Yahoo’s Services

Hello. Normally I don’t write a write-up for XSS vulnerability; however this XSS was a bit different because it affects 100s of Yahoo! subdomains. After my SQL Injection on the HK sub-domains, I...

View Article


Image may be NSFW.
Clik here to view.

Threat Outbreak Alert: Fake Facebook Software Security Update Email Messages

Email messages that are related to this threat (RuleID9997 and RuleID9997KVR) may contain the following files:tompmcmeekan.ziptompmcmeekan.exetntcarlo.ziptntcarlo.exeThe tompmcmeekan.exe in the...

View Article

Image may be NSFW.
Clik here to view.

Crypto Won't Save You Either

Cryptographer Adi Shamir, the 'S' in RSA, once said that "cryptography is bypassed, not penetrated". In the light of the Snowden revelations about the NSA, various people have proposed the use of...

View Article

Image may be NSFW.
Clik here to view.

Kovter Ransomware Grows

Ransomware is not new to the malware game but there is one especially dirty player that is surfacing more frequently. Damballa’s threat research team has seen infections related to the Kovter malware...

View Article


Image may be NSFW.
Clik here to view.

Paper: Combining Multiple Malware Detection Approaches for Achieving Higher...

As malware poses a major threat on the Internet, malware detectionand mitigation approaches have been developed and used in thebattle against malware. Some malware samples elude these approaches,while...

View Article


Image may be NSFW.
Clik here to view.

News160,000 new samples of malware every day in the first quarter of 2014

Our colleagues at PandaLabs have released the quarterly report for Q1 2014. One of the report’s main conclusions is that malware is still being created in record-breaking amounts.Over this period more...

View Article

Image may be NSFW.
Clik here to view.

Metasploit: ElasticSearch Dynamic Script Arbitrary Java Execution

### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote  Rank =...

View Article

Image may be NSFW.
Clik here to view.

ICANN registrar database hacked

ICANN’s database of registrar contact information has been hacked and user data has been stolen.The organization announced this morning that the database, known as RADAR, has been taken offline while...

View Article

Image may be NSFW.
Clik here to view.

Dosfun4u 1 & 2 Quals CTF DEF CON

The challenge's abstract is succinct but quite accurate:more here..........http://www.synacktiv.com/ressources/defcon-ctf-2014-quals-dosfun4u-writeup.pdf

View Article


Image may be NSFW.
Clik here to view.

Mimikatz Against Virtual Machine Memory Part 1

Pentesting is a funny thing. Someone will drop some new way of doing something and then you get to reflect on all those missed opportunities on previous engagements. I remember when MC showed me all...

View Article

Image may be NSFW.
Clik here to view.

Backdoored Web Application v.1.0.1

In December 2012 I released my Backdoored Web Application (BWA)(http://lists.webappsec.org/pipermail/websecurity_lists.webappsec.org/2012-December/008630.html)- a reference test of backdoors scanners....

View Article


Image may be NSFW.
Clik here to view.

New CryptoLocker Has a Walkabout

Looks like we're seeing a rather small amount of messages this morning appearing to look like utility bills from Energy Australia. The graphics look pretty convincing complete with logo and barcode and...

View Article

Image may be NSFW.
Clik here to view.

The Backdoor Factory Proxy

Patch Binaries via MITM: BackdoorFactory + mitmProxymore here..........https://github.com/secretsquirrel/BDFProxy

View Article


Image may be NSFW.
Clik here to view.

A journey to abused FTP sites (story of: Shells, Malware, Bots, DDoS & Spam)...

If you are having an experience as a system administration in an ISP, IDC or etc internet portal, security issues is part of the job description; you'll deal with IDS alerts, IR cases, and some claims...

View Article

Image may be NSFW.
Clik here to view.

New NIST Guidelines Doc on Mobile Device Forensics

The digital forensic community faces a constant challenge to stay abreast of the latesttechnologies that may be used to expose relevant clues in an investigation. Mobile devices arecommonplace in...

View Article

Image may be NSFW.
Clik here to view.

Another 9002 Trojan Variant

After investigating a newer malicious XLS document presumably targeted at a Chinese national, I noticed some oddly familiar network traffic produced by the backdoor it dropped. It was very clearly a...

View Article
Browsing all 8064 articles
Browse latest View live