Microsoft Security Update for Disabling RC4 in .NET TLS
Microsoft is announcing the availability of an update for Microsoft .NET Framework that disables RC4 in Transport Layer Security (TLS) through the modification of the system registry. Use of RC4 in TLS...
View ArticleHackers chop at Ancestry.com’s family tree with gnarly DDOS attack- this is...
Ancestory.com was breached by a mysterious and massive DDOS attack that completely shut down the popular website for nearly 24 hours.The attack flooded Ancestry‘s servers with bogus traffic that...
View ArticleAt least 32,000 servers broadcast admin passwords in the clear, advisory warns
An alarming number of servers containing motherboards manufactured by Supermicro continue to expose administrator passwords despite the release of an update that patches the critical vulnerability, an...
View ArticleModern Honey Network
Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management.more...
View ArticleLOVE is not A8 D4 58 C4: A Study in XOR
Many thanks to Mr.Sketchymoose for giving me this blog post idea. Its a pretty basic concept but people generally use tools to figure it out. However, I thought it would be better to show how these...
View ArticleCase Study: Complexities of “simple” malware
You know when you pull a string on a sweater and it just keeps going and going? You wonder when or if it will ever stop? From time to time, that’s how malware can feel. Even if you’re not a website...
View ArticleDarkness Still Lurks
Darkness, a.k.a. Optima, is a bot that majors in performing distributed denial-of-service (DDoS) attacks. This botnet is an old one that has been in the Russian cybercrime underground market for a long...
View ArticlePaper: Path Conditions and Principal Matching: A New Approach to Access Control
Traditional authorization policies are user-centric, in the sense that authorization is defined, ultimately, in terms of user identities. We believe that this user-centric approach is inappropriate for...
View ArticleMetasploit: AlienVault OSSIM av-centerd Command Injection
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rexml/document'class Metasploit3 <...
View ArticleDyreza - The Banking Trojan is Back
Researchers recently discovered a new banking Trojan that, like the recently fallen ZeuS botnet, is also capable of bypassing SSL. Some speculation even suggests that this baddy is filling the empty...
View ArticleAPT Kill chain - Part 4 : Initial compromise
This blog post is part of a series on APT killchain. In the previous step, we've seen how the attacker used reconnaissance techniques to collect data on its target. Now we will focus on the initial...
View ArticleCVE-2014-4014: Linux Kernel Local Privilege Escalation "exploitation"
The CLONE_NEWUSER namespace was introduced in Linux 2.6.23 and completed in Linux 3.8 (and starting from 3.8, unprivileged processes can create user namespaces). It is used to isolate the user and...
View ArticleIsolated Heap & Friends - Object Allocation Hardening in Web Browsers
In a recent Microsoft Patch Tuesday, Internet Explorer recently introduced a new heap protection aimed at making the exploitation of use-after-free vulnerabilities more difficult. This blog post...
View Article#9 Blitzanalysis: Embassy of Greece Beijing - Compromise
t's friday afternoon, I had a bit of free time and stumbled across this tweet by PhysicalDrive0 (thx!) two hours ago and thought to give it a try to finally add a new article to this Blog (first of...
View ArticleWhat You Must Know About OS Fingerprinting
For those of us in the information technology field, there are two reasons why we should understand operating system fingerprinting.The first reason is to better design and implement security controls...
View ArticleAmerican Express customers receiving new breach notifications
Customers of American Express are starting to get a new round of breach notification letters. This time, the letters (mostly identical in wording) are due to two separate incidents, but the full impact...
View ArticleXSS on Epson site
Epson site-*******************************************************************************************************************Advisory: pos.epson.com – Cross-Site Script Vulnerability (XSS) Advisory...
View ArticleXSS on Panasonic site
*******************************************************************************************************************Advisory: security.panasonic.com – Cross-Site Script Vulnerability...
View ArticlePlayDrone- A Google Play Crawler
Although millions of users download and use third-partyAndroid applications from the Google Play store, littlein formation is known on an aggregated level about theseapplications. We have built...
View ArticlelibFNR - A reference implementation library for FNR encryption scheme
FNR represents "Flexible Naor and Reingold"FNR is a small domain block cipher to encrypt small domainobjects ( < 128 bits ) like IPv4, MAC, Credit Card numbers etc.more...
View Article