Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Android Koler trojan: C&C part

As promised, I’m writing a new post about Koler. This time I’ll talk about the communication between the mobile phone and the external domain because the malware makes use of a minimal C&C...

View Article


Image may be NSFW.
Clik here to view.

Apple Releases Security Updates for OS X, Safari, iOS devices, and Apple TV

Apple has released security updates for Mac OS X, Safari, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow attackers to execute arbitrary code with system...

View Article


Image may be NSFW.
Clik here to view.

IDGuard v0.60

We just released a new version of IDGuard, our platform for preventing network-layer fingerprinting on the network.Description:    Network-Wide Fingerprinting Prevention at the SwitchPlatform(s):...

View Article

Image may be NSFW.
Clik here to view.

Isolated Heap for Internet Explorer Helps Mitigate UAF Exploits

In the recent Microsoft security bulletin for Internet Explorer, we found an interesting improvement for mitigating UAF (User After Free) vulnerability exploits.  The improvement, which we will name as...

View Article

Image may be NSFW.
Clik here to view.

Cookie Overdose

One of our customers recently reported that some parts of his site were not properly crawled by our scanner (Acunetix Web Vulnerability Scanner). Upon investigation, I found the cause of the...

View Article


Image may be NSFW.
Clik here to view.

BlackArch Linux: New ISOs and more

Today, we released new BlackArch Linux ISOs including more than 1000tools and lots of improvements. Also, the armv6h and armv7h repositoriesare filled with about 1000 tools.A short ChangeLog:    -...

View Article

Image may be NSFW.
Clik here to view.

Project Saltstrap and Instance-Tor

We're releasing a first piece of un1c0rn's project :1. Saltstrap https://github.com/ProjectUn1c0rn/SaltStrap - It allows you to use Saltstack masterless - It syncs the sls and files from a predefined...

View Article

Image may be NSFW.
Clik here to view.

Disarming Enhanced Mitigation Experience Toolkit

With the emergence of recent Internet Explorer Vulnerabilities, we’ve been seeing a trend of EMET recommendations as a path to increasing application security. A layered defense is always helpful as it...

View Article


Image may be NSFW.
Clik here to view.

I Was Wrong - Proving LZ4 Exploitable With Less Than 4MB

But Not In the Way You Might ThinkFor the uninitiated, I recently uncovered a vulnerability in LZ4 during triage with the Linux kernel team on a separate but very similar issue in LZO. Ludwig Strigeus...

View Article


Image may be NSFW.
Clik here to view.

NdH2k14 choucroute CTF write up

Last weekend, I was at the Nuit du Hack, which is a security event near Disneyland Paris mixing conferences, workshops, and much more, including some wargames and CTF.This article is about the...

View Article

Image may be NSFW.
Clik here to view.

OpenSSL CCS Attack

As you might see from my posts frequency, last months have been pretty busy to me. My hacking team and I are working really hard and we are achieving incredibly results which makes me happy but really...

View Article

Image may be NSFW.
Clik here to view.

7 Things You Should Know About Tor

Updated: July 1st at 6:30PM to add information about traffic correlation attacks.We posted last week about the Tor Challenge and why everyone should use Tor. Since we started our Tor Challenge two...

View Article

Image may be NSFW.
Clik here to view.

BitAuth, for Decentralized Authentication

Today, BitPay is excited to announce our proposal for a new passwordless authentication protocol, based on the same cryptography used in the Bitcoin protocol. By eliminating server-side storage of...

View Article


Image may be NSFW.
Clik here to view.

Global internet service and communications providers file complaint to end...

Seven internet service and communications providers from around the world filed a legal complaint today, calling for an end to GCHQ’s attacking and exploitation of network infrastructure in order to...

View Article

Image may be NSFW.
Clik here to view.

A New Model to Protect the Endpoint, Part 2: Attack Chain Weaving

In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model...

View Article


Image may be NSFW.
Clik here to view.

Brazilian ‘Boleto’ Bandits Bilk Billions

With the eyes of the world trained on Brazil for the 2014 FIFA World Cup, it seems a fitting time to spotlight a growing form of computer fraud that’s giving Brazilian banks and consumers a run for...

View Article

Image may be NSFW.
Clik here to view.

Geodo: New Cridex Version Combines Data Stealer and Email Worm

Recent efforts by our Research Lab has revealed new activity related to Cridex. As you may recall, Cridex is a data stealer also referred to as Feodo, and Bugat. The new Cridex version we are seeing...

View Article


Image may be NSFW.
Clik here to view.

Burp Suite Tutorial – Web Application Penetration Testing

One of my favorite tools to use on a Web Application Penetration Test is Burp Suite from Portswigger. The following is a step-by-step Burp Suite Tutorial. I will demnonstrate how to properly configure...

View Article

Image may be NSFW.
Clik here to view.

HotelHippo Insecure, so I’ve herd

I recently had the pleasure of booking a night away from it all at a nice little hotel in the Lake District. As I’m sure most people with an interest in security do, I couldn’t help but shudder at the...

View Article

Image may be NSFW.
Clik here to view.

CosmicDuke: Cosmu With a Twist of MiniDuke

The backdoor known as "MiniDuke" was identified in Feburary 2013, discovered in a series of attacks against NATO and European government agencies. During MiniDuke analysis in April 2014, we determined...

View Article
Browsing all 8064 articles
Browse latest View live