Managing and Exploring Malware Samples with Viper
Keeping track of all the samples on your plate can become cumbersome and at times, next to impossible; that's where projects like Viper come in. Viper is "a framework to store, classify and investigate...
View ArticlePDF: Sold Down the River
A world-wide scan of the Intelligent Platform Management Interface (IPMI) protocolidentified over 230,000 Baseboard Management Controllers (BMCs) exposed to theinternet, of which upwards of 90% could...
View ArticleBTA
BTA is an open-source Active Directory security audit framework. Its goal is to help auditors harvest the information they need to answer such questions as:Who has rights over a given object (computer,...
View ArticleBlack marketed Windows banking & POS Trojan Minerva turns in-the-wild
The path from the creation of malicious program to its delivery onto victims’ computers is long nowadays and involves many different players with the same goal – to make a financial gain. Malware...
View ArticlePaper: An Argumentation-Based Framework to Address the Attribution Problem in...
Attributing a cyber-operation through the use of multiple pieces of technical evidence (i.e., malware reverse-engineering and source tracking) and conventional intelligence sources (i.e., human or...
View ArticleHooker: Automated Dynamic Analysis of Android Applications
Hooker is an opensource project for dynamic analysis of Android applications. This project provides various tools and applications that can be use to automaticaly intercept and modify any API calls...
View ArticlePDF: Description of "Russian AES" in English
Low-Weight and Hi-End:Draft Russian Encryption StandardWe give a brief analysis for the current demands in standardized encryptionalgorithms and present a draft of a new block cipher which in the...
View ArticlePaper: Decodability Attack against the Fuzzy Commitment Scheme with Public...
The fuzzy commitment scheme is a cryptographic primitive that can be used to protect biometric templates when stored. If multiple records of the scheme protecting templates extracted from the same...
View ArticlePaper: On the Feasibility of Software Attacks on Commodity Virtual Machine...
The security of virtual machine monitors (VMMs) is a challengingand active field of research. In particular, due to the increasingsignificance of hardware virtualization in cloud solutions, it...
View Article[RT-SA-2014-006] Directory Traversal in DevExpress ASP.NET File Manager
Advisory: Directory Traversal in DevExpress ASP.NET File ManagerDuring a penetration test RedTeam Pentesting discovered a directorytraversal vulnerability in DevExpress' ASP.NET File Manager and...
View ArticleSSL/TLS MITM vulnerability (CVE-2014-0224)
Matt Caswell of the OpenSSL development team.SSL_MODE_RELEASE_BUFFERS session injection or denial of service...
View ArticleHacking Soraya Panel - Free Bot? Free Bots!
Some security agencies have been raving about a revolutionary new bot that combines point-of-sales card grabbing (ram scraping) with form grabbing. The bot is actually not very interesting and pretty...
View ArticleEarly ChangeCipherSpec Attack (05 Jun 2014)
OpenSSL 1.0.1h (and others) were released today with a scary looking security advisiory and that's always an event worth looking into. (Hopefully people are practiced at updating OpenSSL now!)Update:...
View ArticleHow flawed firmware can really give your DAG some replication headaches
Generally it's a good idea to keep firmware up to date for components like storage controllers. But just like you would never put an Exchange 2013 cumulative update into production without testing, you...
View ArticleThe Power of Cookbooks - generic HTTPS Analysis
Besides Hybrid Code Analysis, one of the top features of Joe Sandbox is the Cookbook technology. Cookbooks? Sounds like cooking. That is correct, Cookbooks lets one "cook" the malware. To be more...
View ArticleReset the Net
f we properly encrypt our sites and devices, we can make mass surveillance much more difficult. We’ll be serving pages only over SSL for all *.wordpress.com subdomains by the end of the year.more...
View ArticleDNSCrypt user interface for OSX New Release
Mac OSX application to control the DNSCrypt Proxy has a new release 1.0.2more info can be found here........https://github.com/alterstep/dnscrypt-osxclient
View ArticleMicrosoft Security Bulletin Advance Notification for June 2014
********************************************************************Microsoft Security Bulletin Advance Notification for June 2014Issued: June 5,...
View ArticleABZ Srl CMS SQL Injection
[+] Exploit Title: (ABZ Srl) Cms SQL Injection[+] Exploit Author: Medrik[+] Found Date: 13-03-2014[+] Vendor Homepage: http://www.abzsrl.com/[+] Google Dork: intext:"powered by ABZ Srl"...
View ArticleBSI Advance Hotel Booking System Persistent XSS Vulnerability
[+] Exploit Title: BSI Advance Hotel Booking System Persistent XSS Vulnerability[+] Exploit Author: Angelo Ruwantha[+] Vendor : http://www.bestsoftinc.com/php-advance-hotel-booking-system.html[+]...
View Article