Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CryptoWall Encrypted File Recovery and Analysis

A couple of weeks ago I got a call from a client that one of their employees had clicked on an attachment named “electronic_fund_transfer.zip” in a spam email. Naturally, the employee opened the PDF...

View Article


Image may be NSFW.
Clik here to view.

Account-stealing bank machine skimmers are now virtually invisible

Bank machine skimmers, which swipe your account as you insert your card, have been getting increasingly harder to spot as the years go by; now, it looks like they're just about undetectable....

View Article


Image may be NSFW.
Clik here to view.

Play TLS Example With Client Authentication

This is part of a series of posts about setting up Play WS as a TLS client for a “secure by default” setup.more...

View Article

Image may be NSFW.
Clik here to view.

Hacking CERN - Exploiting python-lz4 for Particles and Profit

TL;DREditor's Note: The TL;DR of this long technical report can be summarized asLZ4 was always critically vulnerable whether in Kernel or User-landExploitation is easy regardless of the attack used...

View Article

Image may be NSFW.
Clik here to view.

Deep in Thought: Chinese Targeting of National Security Think Tanks

For some time now, CrowdStrike has been working with a number of national security think tanks and human rights organizations on a pro bono basis to help them with their security posture. These...

View Article


Image may be NSFW.
Clik here to view.

Paper: Analysing Android’s Full Disk Encryption Feature

Since Android 4.0, which was released in October 2011, users of Android smartphones are pro-vided  with a built-in encryption feature to protect their home partitions. In the work at hand, wegive a...

View Article

Image may be NSFW.
Clik here to view.

Dolibarr CMS 3.5.3 - Multiple Security Vulnerabilities

Vulnerability Name: SQL injectionSeverity: CriticalURL: http://localhost/dolibarr/user/fiche.phpAffected Users: All authenticated usersIssue details: The "entity" parameter appears to be vulnerable to...

View Article

Image may be NSFW.
Clik here to view.

Abusing JSONP with Rosetta Flash

In this blog post I present Rosetta Flash, a tool for converting any SWF file to one composed of only alphanumeric characters in order to abuse JSONP endpoints, making a victim perform arbitrary...

View Article


Image may be NSFW.
Clik here to view.

Abusing Oracle’s CREATE DATABASE LINK privilege for fun and profit!

Oracle database (like any other database) offers functionality to create a database link via which you can connect to a remote database. You can then run a SQL Query on the remote database and get the...

View Article


Image may be NSFW.
Clik here to view.

Disect Android APKs like a Pro - Static code analysis

I've started writing this IPython notebook in order to make myself more comfortable with Android and its SDK. Due to some personal interests I thought I could also have a look at the available RE tools...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-3074 - Runtime Linker Allows Privilege Escalation Via Arbitrary File...

Vulnerability title: Runtime Linker Allows Privilege Escalation ViaArbitrary File Writes in IBM AIXCVE: CVE-2014-3074Vendor: IBMProduct: AIXAffected version: AIX 6.1 and 7.1 and VIOS 2.2.*Reported by:...

View Article

Image may be NSFW.
Clik here to view.

Unauthorized digital certificates for several Google domains

On Wednesday, July 2, we became aware of unauthorized digital certificates for several Google domains. The certificates were issued by the National Informatics Centre (NIC) of India, which holds...

View Article

Image may be NSFW.
Clik here to view.

Introducing transport layer security (TLS) in pure OCaml

We announce a beta release of ocaml-tls, a clean-slate implementation of Transport Layer Security (TLS) in OCaml.more here............http://openmirage.org/blog/introducing-ocaml-tls

View Article


Image may be NSFW.
Clik here to view.

Hacking Facebook’s Legacy API, Part 1: Making Calls on Behalf of Any User

A misconfigured endpoint allowed legacy REST API calls to be made on behalf of any Facebook user using only their user ID, which could be obtained from their profile or through the Graph API. Through...

View Article

Image may be NSFW.
Clik here to view.

What We Learned From Analyzing Over 40 Million Spam Messages

Earlier today we announced yet another major milestone at Malcovery: over 47 million spam messages processed and seven thousand email-based attacks identified in one month. In addition, we achieved...

View Article


Image may be NSFW.
Clik here to view.

Threat Spotlight: "A String of Paerls", Part 2, Deep Dive

In part one of our two part blog series on the “String of Paerls” threat, we showed an attack involving a spearphish message containing an attached malicious Word doc. We also described our methodology...

View Article

Image may be NSFW.
Clik here to view.

Another Linux DDoS bot via CVE-2012-1823

If you run a web server, you should be very familiar with the PHP vulnerability classified as CVE-2012-1823.  Successful exploitation of this vulnerability allows a remote attacker to inject arbitrary...

View Article


Image may be NSFW.
Clik here to view.

Case Study: Headless Browsers in Web Forum Spam

We’ve been through a few episodes with comment spam on the Vamsoft Community Forums, sowhen in early May 2014 we started receiving a new wave, we just shrugged and attributed it toanother mislead soul...

View Article

Image may be NSFW.
Clik here to view.

OkayToCloseProcedure callback kernel hook

During the last few weeks I was busy exploring the internal working of Handles under Windows , by disassembling and decompiling certain kernel (ntoskrnl.exe) functions under my Windows 7 32-bit...

View Article

Image may be NSFW.
Clik here to view.

PerfectView CRM XSS Vulnerability

# Affected software: PerfectView CRM# Description: PerfectView CRM is a software for Relationship Management,Marketing & Sales# Type of vulnerability: XSS Persistent # URL:...

View Article
Browsing all 8064 articles
Browse latest View live