CryptoWall Encrypted File Recovery and Analysis
A couple of weeks ago I got a call from a client that one of their employees had clicked on an attachment named “electronic_fund_transfer.zip” in a spam email. Naturally, the employee opened the PDF...
View ArticleAccount-stealing bank machine skimmers are now virtually invisible
Bank machine skimmers, which swipe your account as you insert your card, have been getting increasingly harder to spot as the years go by; now, it looks like they're just about undetectable....
View ArticlePlay TLS Example With Client Authentication
This is part of a series of posts about setting up Play WS as a TLS client for a “secure by default” setup.more...
View ArticleHacking CERN - Exploiting python-lz4 for Particles and Profit
TL;DREditor's Note: The TL;DR of this long technical report can be summarized asLZ4 was always critically vulnerable whether in Kernel or User-landExploitation is easy regardless of the attack used...
View ArticleDeep in Thought: Chinese Targeting of National Security Think Tanks
For some time now, CrowdStrike has been working with a number of national security think tanks and human rights organizations on a pro bono basis to help them with their security posture. These...
View ArticlePaper: Analysing Android’s Full Disk Encryption Feature
Since Android 4.0, which was released in October 2011, users of Android smartphones are pro-vided with a built-in encryption feature to protect their home partitions. In the work at hand, wegive a...
View ArticleDolibarr CMS 3.5.3 - Multiple Security Vulnerabilities
Vulnerability Name: SQL injectionSeverity: CriticalURL: http://localhost/dolibarr/user/fiche.phpAffected Users: All authenticated usersIssue details: The "entity" parameter appears to be vulnerable to...
View ArticleAbusing JSONP with Rosetta Flash
In this blog post I present Rosetta Flash, a tool for converting any SWF file to one composed of only alphanumeric characters in order to abuse JSONP endpoints, making a victim perform arbitrary...
View ArticleAbusing Oracle’s CREATE DATABASE LINK privilege for fun and profit!
Oracle database (like any other database) offers functionality to create a database link via which you can connect to a remote database. You can then run a SQL Query on the remote database and get the...
View ArticleDisect Android APKs like a Pro - Static code analysis
I've started writing this IPython notebook in order to make myself more comfortable with Android and its SDK. Due to some personal interests I thought I could also have a look at the available RE tools...
View ArticleCVE-2014-3074 - Runtime Linker Allows Privilege Escalation Via Arbitrary File...
Vulnerability title: Runtime Linker Allows Privilege Escalation ViaArbitrary File Writes in IBM AIXCVE: CVE-2014-3074Vendor: IBMProduct: AIXAffected version: AIX 6.1 and 7.1 and VIOS 2.2.*Reported by:...
View ArticleUnauthorized digital certificates for several Google domains
On Wednesday, July 2, we became aware of unauthorized digital certificates for several Google domains. The certificates were issued by the National Informatics Centre (NIC) of India, which holds...
View ArticleIntroducing transport layer security (TLS) in pure OCaml
We announce a beta release of ocaml-tls, a clean-slate implementation of Transport Layer Security (TLS) in OCaml.more here............http://openmirage.org/blog/introducing-ocaml-tls
View ArticleHacking Facebook’s Legacy API, Part 1: Making Calls on Behalf of Any User
A misconfigured endpoint allowed legacy REST API calls to be made on behalf of any Facebook user using only their user ID, which could be obtained from their profile or through the Graph API. Through...
View ArticleWhat We Learned From Analyzing Over 40 Million Spam Messages
Earlier today we announced yet another major milestone at Malcovery: over 47 million spam messages processed and seven thousand email-based attacks identified in one month. In addition, we achieved...
View ArticleThreat Spotlight: "A String of Paerls", Part 2, Deep Dive
In part one of our two part blog series on the “String of Paerls” threat, we showed an attack involving a spearphish message containing an attached malicious Word doc. We also described our methodology...
View ArticleAnother Linux DDoS bot via CVE-2012-1823
If you run a web server, you should be very familiar with the PHP vulnerability classified as CVE-2012-1823. Successful exploitation of this vulnerability allows a remote attacker to inject arbitrary...
View ArticleCase Study: Headless Browsers in Web Forum Spam
We’ve been through a few episodes with comment spam on the Vamsoft Community Forums, sowhen in early May 2014 we started receiving a new wave, we just shrugged and attributed it toanother mislead soul...
View ArticleOkayToCloseProcedure callback kernel hook
During the last few weeks I was busy exploring the internal working of Handles under Windows , by disassembling and decompiling certain kernel (ntoskrnl.exe) functions under my Windows 7 32-bit...
View ArticlePerfectView CRM XSS Vulnerability
# Affected software: PerfectView CRM# Description: PerfectView CRM is a software for Relationship Management,Marketing & Sales# Type of vulnerability: XSS Persistent # URL:...
View Article