Demonstration of the Windows/Office "Insecure Temporary File Dropping"...
As it's described here, recently I discovered a potential RTF-related zero-day in Windows/Office at my daily work. This is really an interesting study for me, thus I took some of my free time digging...
View ArticleFreeDisk v1.01 iOS - Multiple Web Vulnerabilities
Document Title:===============FreeDisk v1.01 iOS - Multiple Web VulnerabilitiesReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1287Release...
View ArticleEbay Inc Magento ProStore CP #4 - Filter Validation Bypass & Persistent...
Document Title:===============Ebay Inc Magento ProStore CP #4 - Filter Validation Bypass & Persistent(Payment Information) VulnerabilityReferences...
View ArticleBeyond good ol’ Run key, Part 15
Today I am going to show you yet another debugging mechanism that allows to load a couple of phantom DLLs.This time the culprit is DirectX.The DirectX is pretty much a standard for programming anything...
View ArticleIcoScript: using webmail to control malware
AbstractWin32.Trojan.IcoScript.A is a classic remote administration tool, but it has a particular way of communicating with its control server. It is very modular and it abuses popular web platforms...
View ArticleCVE-2014-2595 - Authentication Bypass in Barracuda Web Application Firewall
Vulnerability title: Authentication Bypass in Barracuda Web ApplicationFirewallCVE: CVE-2014-2595Vendor: BarracudaProduct: Web Application FirewallAffected version: Firmware v7.8.1.013Fixed version:...
View ArticleBlockies
A tiny library for generating blocky identicons.more here..............https://github.com/download13/blockies
View ArticleKronos is here...
Early in July, news regarding an alleged new Banking Trojan called Kronos have shown up in underground forums. Unfortunately there were no real evidences to confirm the existence of this threat, except...
View ArticleReverse Engineering a NAND Flash Device Management Algorithm
Around June of 2012, I had gotten myself into a very bad habit. Instead of carrying my SD card in my camera, I left it sticking out of the side of my laptop, presumably intending to do something with...
View ArticleSuperfish 7.x Minor Cross Site Scripting Vulnerability
Superfish 7.x-1.9 Cross Site Scripting Vulnerability====================================================Author: Ubani A Balogun <ubani@sas.upenn.edu>Reported: June 25, 2014Product Description:-...
View ArticlePaypal Complete 2-Factor Authentication(2FA) Bypass Exploit. Working as of...
Today, the 5th of August, I release my Paypal 2FA bypass exploit.It's been exactly 2 months since I've reported this bug, and due to thesimplicity of it, I believe I've given Paypal long enough to fix...
View ArticleVembu Storegrid - Multiple Critical Vulnerabilities
1. Advisory OverviewMultiple vulnerabilities exist in the Vembu Storegrid Backup and Disaster Recovery solution affecting both the client and server software (see Additional Information section)...
View ArticleHybridAuth
####################################################################### _ ___ _ _ ____ ____ _ _____# | | / _ \| \ | |/ ___|/ ___| / \|_ _|# | | | | | | \| | | _| | / _ \ |...
View ArticleMicrosoft Exchange Multiple Vulnerabilities
Exchange Multiple Internal IP Disclosures------------------------------------------Advisory:http://foofus.net/?p=758http://www.securitypentest.com/2014/08/exchange-multiple-internal-ip.htmlAutodiscover...
View ArticleReversing Different Aspects of a GPS Watch to Upload a Custom Firmware
A while ago, I built a reverse geocache box from a broken GPS wristwatch (Keymaze 700 trail) found in an electronics recycle bin. For that, I had to upload a custom firmware in the STM32F103...
View ArticleAsprox Update - Version 2050
or the past month the Asprox / Kuluoz botnet has been sending out E-ZPass themed emails on a regular basis. The most recent campaign appears to be from E-ZPass Info and the emails arrive with the...
View ArticleBackdoor Techniques in Targeted Attacks
Backdoors are an essential part of targeted attacks, as they allow an external threat actor to exercise control over any compromised machines. These allow the threat actor to collect information and...
View Article(kind of) new tool: american fuzzy lop
Since I haven't really ever properly done it, i wanted to "officially"announce american fuzzy lop, a novel instrumentation-driven fuzzerthat, among other things, had some luck finding a bunch of...
View ArticleSEC Consult SA-20140805-0 :: Multiple vulnerabilities in Readsoft Invoice...
SEC Consult Vulnerability Lab Security Advisory < 20140805-0 >======================================================================= title: Multiple vulnerabilities...
View ArticleAndroid Dynamic Code Analysis - Mastering DroidBox
In this article I'll have a a closer look at DroidBox which provides a mobile sandbox to look at Android applications. In the previous post I've dealt with static code analysis. This time will start...
View Article