Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

WahmShoppes eStore Cross Site Scripting / SQL Injection

#+++++++++++++++++++++++++++++++++++++++++++++++++++++++++# Title : multiple Vulnerability in "WahmShoppes eStore"# Author : alieye# vendor : http://www.wahmshoppes.com/# Contact : cseye_ut@yahoo.com#...

View Article


Image may be NSFW.
Clik here to view.

On 6/5, 65 Things We Know About NSA Surveillance That We Didn’t Know a Year Ago

t’s been one year since the Guardian first published the Foreign Intelligence Surveillance Court order, leaked by former NSA contractor Edward Snowden, that demonstrated that the NSA was conducting...

View Article


Image may be NSFW.
Clik here to view.

Paper: AMAL: High-Fidelity, Behavior-based Automated Malware Analysis and...

This paper introduces AMAL, an operational automated and behaviorbased malware analysis and labeling (classification and clustering)system that addresses many concerns and shortcomings of...

View Article

Image may be NSFW.
Clik here to view.

The danger of the latest NTP attacks

Who would have imagined that Network Time Protocol (NTP) — such an innocuous protocol designed to synchronise the clock on your laptop, smartphone, tablet, and network infrastructure devices — could be...

View Article

Image may be NSFW.
Clik here to view.

How I discovered CCS Injection Vulnerability (CVE-2014-0224)

Hello. My name is Masashi Kikuchi. Here is my story how I find the CCS Injection Vulnerability. (CVE-2014-0224)more...

View Article


Image may be NSFW.
Clik here to view.

Analyzing Android ‘Simplocker’ ransomware

Recently we came across the sample of a new ransonware ‘Simplocker’ for Android. The ransomware encrypts the files present on SD card and later it demands ransom from victim to decrypt the files.File...

View Article

Image may be NSFW.
Clik here to view.

From Patch to Crash, the story of MS13-089

TL;DR:In this post I discuss the journey that we took in triggering MS13-089 aka The Graphics Device Interface Integer Overflow and how we developed a Proof of Concept that then triggers a Heap...

View Article

Image may be NSFW.
Clik here to view.

An Analysis of PlugX Using Process Dumps from High-Resolution Malware Analysis

Targeted attacks and so-called APTs (advanced persistent threats) come in many forms and colors. Very often, in-house malware analysis teams want to go beyond the detection information offered by...

View Article


Image may be NSFW.
Clik here to view.

SSHCure: SSH Intrusion Detection Using NetFlow and IPFIX

SSHCure is an Intrusion Detection System for SSH, developed at the University of Twente. It allows analysing large amounts of flow data and is the first IDS capable of identifying actual compromises....

View Article


Image may be NSFW.
Clik here to view.

A Study in Bots: LoBOTomy

In my last post, I covered the Madness Pro botnet in detail, but analyzing what makes this bot tick is only one side of the research.  In this post, we give Madness Pro a lobotomy, detailing various...

View Article

Image may be NSFW.
Clik here to view.

Trend Micro OfficeScan – A chain of bugs

Analyzing the security of security software is one of my favorite research areas: it is always ironic to see software originally meant to protect your systems open a gaping door for the attackers....

View Article

Image may be NSFW.
Clik here to view.

RpcView

A free and powerful tool to explore all RPC functionalities present on a Microsoft systemmore here.......http://rpcview.org/index.html

View Article

Image may be NSFW.
Clik here to view.

SEC Consult SA-20140606-0 :: Multiple critical vulnerabilities in WebTitan

SEC Consult Vulnerability Lab Security Advisory < 20140606-0 >=======================================================================              title: Multiple critical vulnerabilities...

View Article


Image may be NSFW.
Clik here to view.

[Onapsis Security Advisories] Multiple Hard-coded Usernames in SAP Components

Onapsis Security Advisories:Multiple Hard-coded Usernames (CWE-798) havebeen found and patched in a variety of SAP components.Summaries of the advisories with links to full versions follow:1....

View Article

Image may be NSFW.
Clik here to view.

[Onapsis Security Advisory 2014-020] SAP SLD Information Tampering

Onapsis Security Advisory 2014-020: SAP SLD Information Tampering1. Impact on Business===================== By exploiting this vulnerability, a remote unauthenticated attackermight be able tomodify...

View Article


Image may be NSFW.
Clik here to view.

security incident on forum.eset.com

we have been informed by our third-party forum provider that user login details of ESET Security Forum members have been compromisedmore...

View Article

Image may be NSFW.
Clik here to view.

Paper: An Opportunity In Crisis- Reverse engineering of a Mac OS X malware...

This paper discusses reverse engineering of a Mac OS X malware commonly knownas Crisis or DaVinci. It shows that sophisticated Mac OS X malware, having featuresthat rival those usually seen only in...

View Article


Image may be NSFW.
Clik here to view.

Paper: Illuminating The Etumbot APT Backdoor

Etumbot is a backdoor used in targeted attacks since at least March 2011. Indicators suggest that Etumbot is associated with the Numbered Panda group, also known as IXEHSE, DynCalc, and APT12....

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-0515 (Flash 13.0.0.182 and earlier) integrating Exploit Kits

Discovered by Kaspersky in April in watering hole attack, soon after used in operation targeting Banking information in Japan/Korea by Symantec, reached Exploit DB at begining of may, then in...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-3740 - SpiceWorks Cross-site scripting

|Exploit Title: Multiple Stored XSS vulnerabilities in SpiceWorks Ticketing systemCVE: CVE-2014-3740Vendor: SpiceWorksProduct: SpiceWorks IT ticketing systemAffected versions: any version...

View Article
Browsing all 8064 articles
Browse latest View live