Kerio Control 8.3.1 Blind SQL Injection
Document Title:======================Kerio Control <= 8.3.1 Boolean-based blind SQL InjectionPrimary Informations:======================Product Name: Kerio ControlSoftware Description: Kerio Control...
View ArticleZurmo CRM - Persistent XSS Vulnerability
# Affected software: Zurmo CRM# Zurmo is an Open Source Customer Relationship Management (CRM)application that is# mobile, social, and gamified. We use a test-driven methodology forbuilding every part...
View ArticleLZO, on integer overflows and auditing
Despite years of open source fans claiming that “many eyes make all bugs shallow” there are far too few security researchers actually auditing these projects. And even fewer making their work public....
View ArticleAnalysis of a New Banking Trojan Spammed by Cutwail
The Cutwail spambot has a long history of sending spam with attached malicious files such as Zbot, Blackhole Exploit Kit and Cryptolocker. Another trick in Cutwail’s portfolio is to use links pointing...
View ArticleIt’s all a question of time – AES timing attacks on OpenSSL
Advanced Encryption Standard (AES) is the mostly widely used symmetric block cipher today. Its use is mandatory in several US government and industry applications. Among the commercial standards AES is...
View ArticleExploring the Java vulnerability (CVE-2013-2465) used in the Fiesta EK
While going through our daily analysis this month, we came across several Fiesta Exploit Kit attacks. Although this EK first emerged in August 2013, the authors have constantly updated their...
View ArticleObfuscation in Android malware, and how to fight back
Axelle Apvrille and Ruchna Nigam take an in-depth look at obfuscation techniques encountered while analysing Android malware - including both use of off-the-shelf products and custom obfuscation...
View ArticleCVE-2014-3153 Exploit
This awesome vulnerability, that affect pretty much all Linux kernels from the last five years, was found by Comex about a month ago. It is also the vulnerability that is used in TowelRoot by GeoHot,...
View Articlehdd_firmware_tools
This repository contains tools for HDD firmware extraction.more here.........https://github.com/eurecom-s3/hdd_firmware_toolsand here...........http://www.s3.eurecom.fr/~zaddach/docs/Recon14_HDD.pdf
View ArticleMiniduke is back: Nemesis Gemina and the Botgen Studio
A 2014 update on one of the world’s most unusual APT operations here.....http://www.securelist.com/en/blog/208214341/Miniduke_is_back_Nemesis_Gemina_and_the_Botgen_Studio
View ArticleBreaking Spotify DRM with PANDA
Disclaimer: Although I think DRM is both stupid and evil, I don't advocate pirating music. Therefore, this post will stop short of providing a turnkey solution for ripping Spotify music, but it will...
View ArticleDailymotion Compromised to Send Users to Exploit Kit
On June 28, the popular video sharing website Dailymotion was compromised to redirect users to the Sweet Orange Exploit Kit. This exploit kit takes advantage of vulnerabilities in Java, Internet...
View ArticleFeed2JS/MagpieRSS 0day vulnerability (not really, it is actually...
Feed2JS is a tool for user-friendly(developer-wise) embedding the RSS feeds on the pages without messing with XML.I’ve found out today that it’s vulnerable to local file disclosure (all your...
View ArticleJamming XKeyScore
Back in the day there was talk about "jamming echelon" by adding keywords to email that the echelon system was supposedly looking for. We can do the same thing for XKeyScore: jam the system with more...
View ArticleReading the XKeyScore-rules source
Today's story is about "XKeyScore source code" leak. As an expert, I'm going to read through the code line-by-line and comment on it.more...
View ArticleThe Microsoft Web Protection Library (WPL)
The Microsoft Web Protection Library (WPL) is a set of .NET assemblies which will help you protect your web sites, current, future and past.more here..........http://wpl.codeplex.com/
View ArticleIntroducing the BPF Tools
In a recent article I described the basic concepts behind the use of Berkeley Packet Filter (aka BSD Packet filter or BPF) bytecode for high performance packet filtering, and the xt_bpf iptables...
View ArticleHack Bank
POC to demostrates how to hack a bank account using C#more here.......https://github.com/JhetoX/HackBankAccount
View ArticleMPRESS Packer dumper
This is a MPRESS dumper utility as described in my Shakacon'14 presentation.(http://reverse.put.as/2014/06/26/shakacon-6-presentation-fuck-you-hacking-team-from-portugal-with-love/)At the moment it...
View Articlephpinfo() Type Confusion Infoleak Vulnerability and SSL Private Keys
In the last weeks we have spend some time looking into the PHP source code again, because we were working on new versions of Suhosin, our security extension for PHP. During this time we have discovered...
View Article