Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Kerio Control 8.3.1 Blind SQL Injection

Document Title:======================Kerio Control <= 8.3.1 Boolean-based blind SQL InjectionPrimary Informations:======================Product Name: Kerio ControlSoftware Description: Kerio Control...

View Article


Image may be NSFW.
Clik here to view.

Zurmo CRM - Persistent XSS Vulnerability

# Affected software: Zurmo CRM# Zurmo is an Open Source Customer Relationship Management (CRM)application that is# mobile, social, and gamified. We use a test-driven methodology forbuilding every part...

View Article


Image may be NSFW.
Clik here to view.

LZO, on integer overflows and auditing

Despite years of open source fans claiming that “many eyes make all bugs shallow” there are far too few security researchers actually auditing these projects. And even fewer making their work public....

View Article

Image may be NSFW.
Clik here to view.

Analysis of a New Banking Trojan Spammed by Cutwail

The Cutwail spambot has a long history of sending spam with attached malicious files such as Zbot, Blackhole Exploit Kit and Cryptolocker. Another trick in Cutwail’s portfolio is to use links pointing...

View Article

Image may be NSFW.
Clik here to view.

It’s all a question of time – AES timing attacks on OpenSSL

Advanced Encryption Standard (AES) is the mostly widely used symmetric block cipher today. Its use is mandatory in several US government and industry applications. Among the commercial standards AES is...

View Article


Image may be NSFW.
Clik here to view.

Exploring the Java vulnerability (CVE-2013-2465) used in the Fiesta EK

While going through our daily analysis this month, we came across several Fiesta Exploit Kit attacks. Although this EK first emerged in August 2013, the authors have constantly updated their...

View Article

Image may be NSFW.
Clik here to view.

Obfuscation in Android malware, and how to fight back

Axelle Apvrille and Ruchna Nigam take an in-depth look at obfuscation techniques encountered while analysing Android malware - including both use of off-the-shelf products and custom obfuscation...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-3153 Exploit

This awesome vulnerability, that affect pretty much all Linux kernels from the last five years, was found by Comex about a month ago. It is also the vulnerability that is used in TowelRoot by GeoHot,...

View Article


Image may be NSFW.
Clik here to view.

hdd_firmware_tools

This repository contains tools for HDD firmware extraction.more here.........https://github.com/eurecom-s3/hdd_firmware_toolsand here...........http://www.s3.eurecom.fr/~zaddach/docs/Recon14_HDD.pdf

View Article


Image may be NSFW.
Clik here to view.

Miniduke is back: Nemesis Gemina and the Botgen Studio

A 2014 update on one of the world’s most unusual APT operations here.....http://www.securelist.com/en/blog/208214341/Miniduke_is_back_Nemesis_Gemina_and_the_Botgen_Studio

View Article

Image may be NSFW.
Clik here to view.

Breaking Spotify DRM with PANDA

Disclaimer: Although I think DRM is both stupid and evil, I don't advocate pirating music. Therefore, this post will stop short of providing a turnkey solution for ripping Spotify music, but it will...

View Article

Image may be NSFW.
Clik here to view.

Dailymotion Compromised to Send Users to Exploit Kit

On June 28, the popular video sharing website Dailymotion was compromised to redirect users to the Sweet Orange Exploit Kit. This exploit kit takes advantage of vulnerabilities in Java, Internet...

View Article

Image may be NSFW.
Clik here to view.

Feed2JS/MagpieRSS 0day vulnerability (not really, it is actually...

Feed2JS is a tool for user-friendly(developer-wise) embedding the RSS feeds on the pages without messing with XML.I’ve found out today that it’s vulnerable to local file disclosure (all your...

View Article


Image may be NSFW.
Clik here to view.

Jamming XKeyScore

Back in the day there was talk about "jamming echelon" by adding keywords to email that the echelon system was supposedly looking for. We can do the same thing for XKeyScore: jam the system with more...

View Article

Image may be NSFW.
Clik here to view.

Reading the XKeyScore-rules source

Today's story is about "XKeyScore source code" leak. As an expert, I'm going to read through the code line-by-line and comment on it.more...

View Article


Image may be NSFW.
Clik here to view.

The Microsoft Web Protection Library (WPL)

The Microsoft Web Protection Library (WPL) is a set of .NET assemblies which will help you protect your web sites, current, future and past.more here..........http://wpl.codeplex.com/

View Article

Image may be NSFW.
Clik here to view.

Introducing the BPF Tools

In a recent article I described the basic concepts behind the use of Berkeley Packet Filter (aka BSD Packet filter or BPF) bytecode for high performance packet filtering, and the xt_bpf iptables...

View Article


Image may be NSFW.
Clik here to view.

Hack Bank

POC to demostrates how to hack a bank account using C#more here.......https://github.com/JhetoX/HackBankAccount

View Article

Image may be NSFW.
Clik here to view.

MPRESS Packer dumper

This is a MPRESS dumper utility as described in my Shakacon'14 presentation.(http://reverse.put.as/2014/06/26/shakacon-6-presentation-fuck-you-hacking-team-from-portugal-with-love/)At the moment it...

View Article

Image may be NSFW.
Clik here to view.

phpinfo() Type Confusion Infoleak Vulnerability and SSL Private Keys

In the last weeks we have spend some time looking into the PHP source code again, because we were working on new versions of Suhosin, our security extension for PHP. During this time we have discovered...

View Article
Browsing all 8064 articles
Browse latest View live