Android Koler trojan: C&C part
As promised, I’m writing a new post about Koler. This time I’ll talk about the communication between the mobile phone and the external domain because the malware makes use of a minimal C&C...
View ArticleApple Releases Security Updates for OS X, Safari, iOS devices, and Apple TV
Apple has released security updates for Mac OS X, Safari, iOS devices, and Apple TV to address multiple vulnerabilities, some of which could allow attackers to execute arbitrary code with system...
View ArticleIDGuard v0.60
We just released a new version of IDGuard, our platform for preventing network-layer fingerprinting on the network.Description: Network-Wide Fingerprinting Prevention at the SwitchPlatform(s):...
View ArticleIsolated Heap for Internet Explorer Helps Mitigate UAF Exploits
In the recent Microsoft security bulletin for Internet Explorer, we found an interesting improvement for mitigating UAF (User After Free) vulnerability exploits. The improvement, which we will name as...
View ArticleCookie Overdose
One of our customers recently reported that some parts of his site were not properly crawled by our scanner (Acunetix Web Vulnerability Scanner). Upon investigation, I found the cause of the...
View ArticleBlackArch Linux: New ISOs and more
Today, we released new BlackArch Linux ISOs including more than 1000tools and lots of improvements. Also, the armv6h and armv7h repositoriesare filled with about 1000 tools.A short ChangeLog: -...
View ArticleProject Saltstrap and Instance-Tor
We're releasing a first piece of un1c0rn's project :1. Saltstrap https://github.com/ProjectUn1c0rn/SaltStrap - It allows you to use Saltstack masterless - It syncs the sls and files from a predefined...
View ArticleDisarming Enhanced Mitigation Experience Toolkit
With the emergence of recent Internet Explorer Vulnerabilities, we’ve been seeing a trend of EMET recommendations as a path to increasing application security. A layered defense is always helpful as it...
View ArticleI Was Wrong - Proving LZ4 Exploitable With Less Than 4MB
But Not In the Way You Might ThinkFor the uninitiated, I recently uncovered a vulnerability in LZ4 during triage with the Linux kernel team on a separate but very similar issue in LZO. Ludwig Strigeus...
View ArticleNdH2k14 choucroute CTF write up
Last weekend, I was at the Nuit du Hack, which is a security event near Disneyland Paris mixing conferences, workshops, and much more, including some wargames and CTF.This article is about the...
View ArticleOpenSSL CCS Attack
As you might see from my posts frequency, last months have been pretty busy to me. My hacking team and I are working really hard and we are achieving incredibly results which makes me happy but really...
View Article7 Things You Should Know About Tor
Updated: July 1st at 6:30PM to add information about traffic correlation attacks.We posted last week about the Tor Challenge and why everyone should use Tor. Since we started our Tor Challenge two...
View ArticleBitAuth, for Decentralized Authentication
Today, BitPay is excited to announce our proposal for a new passwordless authentication protocol, based on the same cryptography used in the Bitcoin protocol. By eliminating server-side storage of...
View ArticleGlobal internet service and communications providers file complaint to end...
Seven internet service and communications providers from around the world filed a legal complaint today, calling for an end to GCHQ’s attacking and exploitation of network infrastructure in order to...
View ArticleA New Model to Protect the Endpoint, Part 2: Attack Chain Weaving
In my last post, I talked about the need for a paradigm shift from point-in-time detection technologies to a new model that combines a continuous approach with a big data architecture. This new model...
View ArticleBrazilian ‘Boleto’ Bandits Bilk Billions
With the eyes of the world trained on Brazil for the 2014 FIFA World Cup, it seems a fitting time to spotlight a growing form of computer fraud that’s giving Brazilian banks and consumers a run for...
View ArticleGeodo: New Cridex Version Combines Data Stealer and Email Worm
Recent efforts by our Research Lab has revealed new activity related to Cridex. As you may recall, Cridex is a data stealer also referred to as Feodo, and Bugat. The new Cridex version we are seeing...
View ArticleBurp Suite Tutorial – Web Application Penetration Testing
One of my favorite tools to use on a Web Application Penetration Test is Burp Suite from Portswigger. The following is a step-by-step Burp Suite Tutorial. I will demnonstrate how to properly configure...
View ArticleHotelHippo Insecure, so I’ve herd
I recently had the pleasure of booking a night away from it all at a nice little hotel in the Lake District. As I’m sure most people with an interest in security do, I couldn’t help but shudder at the...
View ArticleCosmicDuke: Cosmu With a Twist of MiniDuke
The backdoor known as "MiniDuke" was identified in Feburary 2013, discovered in a series of attacks against NATO and European government agencies. During MiniDuke analysis in April 2014, we determined...
View Article