Paper:Double Counting in 2t-ary RSA Precomputation Reveals the Secret Exponent
A new fault attack, double counting attack (DCA), on the precomputation of 2t-ary modular exponentiation for a classical RSA digital signature (i.e., RSA without the Chinese remainder theorem) is...
View ArticleFiesta exploit kit does the splits
A few days ago, we began noticing a strange new pattern with the Fiesta exploit kit. We were getting a double payload where before only one was delivered.more...
View ArticleMac OS X and iPhone sandbox escapes
As part of our launch manifesto, we committed to openness and transparency, including sharing full details of our research. About a month ago, Apple released two security advisories which fixed some...
View ArticleBinwalk Version 2.0.0 Release
Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.more here.............https://github.com/devttys0/binwalk/releases/tag/v2.0.0
View ArticleInside Citizen Lab, the “Hacker Hothouse” protecting you from Big Brother
It was May of 2012 at a security conference in Calgary, Alberta, when professor Ron Deibert heard a former high-ranking official suggest he should be prosecuted.This wasn't too surprising. In Deibert's...
View ArticleAlert (TA14-212A) Backoff Point-of-Sale Malware
This advisory was prepared in collaboration with the National Cybersecurity and Communications Integration Center (NCCIC), United States Secret Service (USSS), Financial Sector Information Sharing and...
View ArticleTigerCom iFolder+ v1.2 iOS - Multiple Vulnerabilities
Document Title:===============TigerCom iFolder+ v1.2 iOS - Multiple VulnerabilitiesReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1284Release...
View ArticleWhy the Security of USB Is Fundamentally Br
Computer users pass around USB sticks like silicon business cards. Although we know they often carry malware infections, we depend on antivirus scans and the occasional reformatting to keep our...
View ArticleEnergetic Bear: more like a Crouching Yeti (Inclusive paper and appendixes...
Energetic Bear/Crouching Yeti is an actor involved in several advanced persistent threat (APT) campaigns that has been active going back to at least the end of 2010. Targeted sectors...
View ArticleDilettante
It turns out that Maven Central only lets you use SSL if you purchase an authentication token for a donation of $10. They claim this $10 will go to the Apache project, but that's besides the point.SSL...
View ArticleRailsGoat
RailsGoat is a vulnerable version of the Ruby on Rails Framework. It includes vulnerabilities from the OWASP Top 10, as well as some "extras" that the initial project contributors felt worthwhile to...
View ArticleCredential Management
The spec is way more detailed than it should be at this stage; it's not much more than my own opinions, mixed with a little bit of feedback from folks on Google's identity team and password manager...
View ArticleROPC — Turing complete ROP compiler (part 3, implementation)
This is the third (and last) post in a series about ROPC, describing implementation of its features like tables, conditional jumps, recursive calls, etc. Please familiarize yourself with the two first...
View ArticleHow to Hunt Down Phishing Kits
Sites like phishtank and clean-mx act as crowdsourced phishing detection and validation. By knowing how to look, you can consistently find interesting information about how attackers work, and the...
View ArticleWhy were CERT researchers attacking Tor?
Yesterday the Tor Project issued an advisory describing a large-scale identification attack on Tor hidden services. The attack started on January 30 and ended when Tor ejected the attackers on July 4....
View ArticleCREATE AN ARMY OF RASPBERRY PI HONEYPOTS ON A BUDGET
Hi! My name is Nathan Yee and I’m an intern at ThreatStream. I’m studying computer science and mathematics at the University of Arizona. Most recently, I worked on deploying a Raspberry Pi as a Dionaea...
View ArticleBackoff - Technical Analysis
As discussed in the an advisory published by US-CERT, Trustwave SpiderLabs has discovered a previously unidentified family of Point of Sale (PoS) malware. This blog post serves as a technical analysis...
View ArticleAnnouncing EMET 5.0
Today, we are excited to announce the general availability of the Enhanced Mitigation Experience Toolkit (EMET) 5.0. As many of you already know, EMET is a free tool, designed to help customers with...
View ArticleAndroid IMSI-Catcher Detector (AIMSICD)
Android-based project to detect and (hopefully one day) avoid fake base stations (IMSI-Catchers) in GSM/UMTS Networks.more here.............https://github.com/SecUpwN/Android-IMSI-Catcher-Detector
View ArticleThere’s No Place Like Localhost: A Welcoming Front Door To Medium Integrity
This year, Abdul Aziz Hariri, Jasiel Spelman, and myself (Matt Molinyawe) of the Zero Day Initiative were involved in producing an exploit for this year’s Pwn4Fun. It demonstrated our work and that...
View Article