Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Paper:Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent

A new fault attack, double counting attack (DCA), on the precomputation of 2t-ary modular exponentiation for a classical RSA digital signature (i.e., RSA without the Chinese remainder theorem) is...

View Article


Image may be NSFW.
Clik here to view.

Fiesta exploit kit does the splits

A few days ago, we began noticing a strange new pattern with the Fiesta exploit kit. We were getting a double payload where before only one was delivered.more...

View Article


Image may be NSFW.
Clik here to view.

Mac OS X and iPhone sandbox escapes

As part of our launch manifesto, we committed to openness and transparency, including sharing full details of our research. About a month ago, Apple released two security advisories which fixed some...

View Article

Image may be NSFW.
Clik here to view.

Binwalk Version 2.0.0 Release

Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.more here.............https://github.com/devttys0/binwalk/releases/tag/v2.0.0

View Article

Image may be NSFW.
Clik here to view.

Inside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother

It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted.This wasn't too surprising. In Deibert's...

View Article


Image may be NSFW.
Clik here to view.

Alert (TA14-212A) Backoff Point-of-Sale Malware

This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...

View Article

Image may be NSFW.
Clik here to view.

TigerCom iFolder+ v1.2 iOS - Multiple Vulnerabilities

Document Title:===============TigerCom iFolder+ v1.2 iOS - Multiple VulnerabilitiesReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1284Release...

View Article

Image may be NSFW.
Clik here to view.

Why the Security of USB Is Fundamentally Br

Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our...

View Article


Image may be NSFW.
Clik here to view.

Energetic Bear: more like a Crouching Yeti (Inclusive paper and appendixes...

Energetic Bear/Crouching Yeti is an actor involved in several advanced persistent threat (APT) campaigns that has been active going back to at least the end of 2010. Targeted sectors...

View Article


Image may be NSFW.
Clik here to view.

Dilettante

It turns out that Maven Central only lets you use SSL if you purchase an authentication token for a donation of $10. They claim this $10 will go to the Apache project, but that's besides the point.SSL...

View Article

Image may be NSFW.
Clik here to view.

RailsGoat

RailsGoat is a vulnerable version of the Ruby on Rails Framework. It includes vulnerabilities from the OWASP Top 10, as well as some "extras" that the initial project contributors felt worthwhile to...

View Article

Image may be NSFW.
Clik here to view.

Credential Management

The spec is way more detailed than it should be at this stage; it's not much more than my own opinions, mixed with a little bit of feedback from folks on Google's identity team and password manager...

View Article

Image may be NSFW.
Clik here to view.

ROPC — Turing complete ROP compiler (part 3, implementation)

This is the third (and last) post in a series  about ROPC, describing implementation of its features like tables, conditional jumps, recursive calls, etc. Please familiarize yourself with the two first...

View Article


Image may be NSFW.
Clik here to view.

How to Hunt Down Phishing Kits

Sites like phishtank and clean-mx act as crowdsourced phishing detection and validation. By knowing how to look, you can consistently find interesting information about how attackers work, and the...

View Article

Image may be NSFW.
Clik here to view.

Why were CERT researchers attacking Tor?

Yesterday the Tor Project issued an advisory describing a large-scale identification attack on Tor hidden services. The attack started on January 30 and ended when Tor ejected the attackers on July 4....

View Article


Image may be NSFW.
Clik here to view.

CREATE AN ARMY OF RASPBERRY PI HONEYPOTS ON A BUDGET

Hi! My name is Nathan Yee and I’m an intern at ThreatStream. I’m studying computer science and mathematics at the University of Arizona. Most recently, I worked on deploying a Raspberry Pi as a Dionaea...

View Article

Image may be NSFW.
Clik here to view.

Backoff - Technical Analysis

As discussed in the an advisory published by US-CERT, Trustwave SpiderLabs has discovered a previously unidentified family of Point of Sale (PoS) malware. This blog post serves as a technical analysis...

View Article


Image may be NSFW.
Clik here to view.

Announcing EMET 5.0

Today, we are excited to announce the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0. As many of you already know, EMET is a free tool, designed to help customers with...

View Article

Image may be NSFW.
Clik here to view.

Android IMSI-Catcher Detector (AIMSICD)

Android-based project to detect and (hopefully one day) avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks.more here.............https://github.com/SecUpwN/Android-IMSI-Catcher-Detector

View Article

Image may be NSFW.
Clik here to view.

There’s No Place Like Localhost: A Welcoming Front Door To Medium Integrity

This year, Abdul Aziz Hariri, Jasiel Spelman, and myself (Matt Molinyawe) of the Zero Day Initiative were involved in producing an exploit for this year’s Pwn4Fun. It demonstrated our work and that...

View Article
Browsing all 8064 articles
Browse latest View live