BootJacker: The Amazing AVR Bootloader Hack
There's an old adage that says if you don't know it's impossible you could end up achieving it. BootJacker is that kind of hack: a way for ordinary firmware on an AVR to reprogram its bootloader. It's...
View ArticleNetgear WNR1000v3 - Password Recovery Credential Disclosure Vulnerability
## This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework## Exploit Title: Netgear WNR1000v3 Password Recovery Credential...
View ArticleFireEye Malware Analysis System (MAS) 6.4.1 - Multiple Vulnerabilities
# Exploit Title: Fireeye Malware Analysis System multiple vulnerabilities# Google Dork: none# Date: 06/05/2014# Exploit Author: kmkz (Bourbon Jean-Marie)# Vendor Homepage:...
View ArticleExploiting the Futex Bug and uncovering Towelroot
The Futex bug (CVE-2014-3153) is a serious bug that affects most Linux kernel version and was made popular by geohot in his towelroot exploit. You can read the original comex report at hackerone....
View ArticlePaypal Inc Bug Bounty #109 Multi Shipping Application API - Filter Bypass &...
Document Title:===============Paypal Inc Bug Bounty #109 Multi Shipping Application API - Filter Bypass & Persistent VulnerabilityReferences...
View ArticlePayPal Inc Bug Bounty #74 - Persistent Core Backend Vulnerability
Document Title:===============PayPal Inc Bug Bounty #74 - Persistent Core Backend VulnerabilityReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1278PayPal Inc...
View ArticleYahoo! Bug Bounty #25 Flickr API - Persistent Service Vulnerability
Document Title:===============Yahoo! Bug Bounty #25 Flickr API - Persistent Service VulnerabilityReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1132Release...
View ArticleJoe Sandbox aware Malware? Certainly not! But surely!
During the weekend we have been notified by one of our Joe Sandbox Cloud customers that they have found an interesting sample (MD5: D80E956259C858EACCB53C1AFFAF8141) which shows much malicious behavior...
View ArticleXKS speedup trickery
Lets have a look on how our traffic is XKey-scored and whetherits done with efficiency.more here...........http://c-skills.blogspot.de/2014/07/the-xks-source-seems-to-be-some-kind-of.html
View ArticleBackdoor access to Techboard/Syac devices
During a security assessment on one of our customers, we had the opportunity to analyze a device by Techboard/Syac, a manufacturer of digital video recorders (DVR) and network cameras. In particular,...
View ArticleVideo: How I hacked the "secure" e-mail provider Protonmail - just using a...
"This is why you should not trust newspaper articles about secure communication" exclaims Thomas Roth@StackSmashingthe video is here..... http://vimeo.com/99599725
View ArticlePaper: A Diffie-Hellman-like Key Exchange Protocol Based on Multivariate Ore...
In this paper we present a key exchange protocol based on multivariate non-commutative polynomial rings, analogous to the classic Diffie-Hellman method. Ourtechnique extends the proposed scheme of...
View ArticleFoxit PDF Reader Stored XSS
A friend of mine was performing an external pentest recently and he started to complain that his traditional Java exploits were not being effective. He was able to map a few applications and defenses...
View ArticlePhoto Org WonderApplications v8.3 iOS - File Include Vulnerability
Document Title:===============Photo Org WonderApplications v8.3 iOS - File Include VulnerabilityReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1277Release...
View ArticleGKsu and VirtualBox Root Command Execution by Filename (CVE-2014-2943)
Poisoning VirtualBox via Crafted FilenamesWhen I began researching this, I believed the vulnerability laid within Virtualbox, but I realized this was not true after a bit. The vulnerability being hit...
View ArticleBundled Software and Attack Surface
Hi, it's Will. We are all probably annoyed by software that bundles other applications that we didn't ask for. You want a specific application, but depending on what the application is, where you...
View ArticleiTunes 11.2.2 for Windows: completely outdated and vulnerable 3rd party...
Apples current iTunes 11.2.2 for Windows comes with the followingCOMPLETELY outdated and vulnerable 3rd party libraries (as part ofAppleApplicationSupport.msi):* libeay32.dll and ssleay32.dll 0.9.8d...
View ArticleFrom Alureon/Wowliks to Poweliks botnet (distribution in Affiliate mode)
At beginning of February 2014 a sample pushed via Sweet Orange caught my attentionmore here.............http://malware.dontneedcoffee.com/2014/07/from-alureonwowliks-to-poweliks-botnet.html
View ArticleThe Washington Post’s SecureDrop Relies on Tor
The Washington Post’s SecureDrop is a discreet way for readers to share messages and materials with our journalists. It offers greater security and anonymity than conventional e-mail and Web forms.How...
View ArticleGoogle Has Given HTTPS A Huge Boost
For a while now there’s been talk of Google favoring secure HTTPS pages in its results. We just noticed this week that any Google searches for content on our web site now return secure HTTPS URLs...
View Article