Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Demonstration of the Windows/Office "Insecure Temporary File Dropping"...

As it's described here, recently I discovered a potential RTF-related zero-day in Windows/Office at my daily work. This is really an interesting study for me, thus I took some of my free time digging...

View Article


Image may be NSFW.
Clik here to view.

FreeDisk v1.01 iOS - Multiple Web Vulnerabilities

Document Title:===============FreeDisk v1.01 iOS - Multiple Web VulnerabilitiesReferences (Source):====================http://www.vulnerability-lab.com/get_content.php?id=1287Release...

View Article


Image may be NSFW.
Clik here to view.

Ebay Inc Magento ProStore CP #4 - Filter Validation Bypass & Persistent...

Document Title:===============Ebay Inc Magento ProStore CP #4 - Filter Validation Bypass & Persistent(Payment Information) VulnerabilityReferences...

View Article

Image may be NSFW.
Clik here to view.

Beyond good ol’ Run key, Part 15

Today I am going to show you yet another debugging mechanism that allows to load a couple of phantom DLLs.This time the culprit is DirectX.The DirectX is pretty much a standard for programming anything...

View Article

Image may be NSFW.
Clik here to view.

IcoScript: using webmail to control malware

AbstractWin32.Trojan.IcoScript.A is a classic remote administration tool, but it has a particular way of communicating with its control server. It is very modular and it abuses popular web platforms...

View Article


Image may be NSFW.
Clik here to view.

CVE-2014-2595 - Authentication Bypass in Barracuda Web Application Firewall

Vulnerability title: Authentication Bypass in Barracuda Web ApplicationFirewallCVE: CVE-2014-2595Vendor: BarracudaProduct: Web Application FirewallAffected version: Firmware v7.8.1.013Fixed version:...

View Article

Image may be NSFW.
Clik here to view.

Blockies

A tiny library for generating blocky identicons.more here..............https://github.com/download13/blockies

View Article

Image may be NSFW.
Clik here to view.

Kronos is here...

Early in July, news regarding an alleged new Banking Trojan called Kronos have shown up in underground forums. Unfortunately there were no real evidences to confirm the existence of this threat, except...

View Article


Image may be NSFW.
Clik here to view.

Reverse Engineering a NAND Flash Device Management Algorithm

Around June of 2012, I had gotten myself into a very bad habit. Instead of carrying my SD card in my camera, I left it sticking out of the side of my laptop, presumably intending to do something with...

View Article


Image may be NSFW.
Clik here to view.

Superfish 7.x Minor Cross Site Scripting Vulnerability

Superfish 7.x-1.9 Cross Site Scripting Vulnerability====================================================Author: Ubani A Balogun <ubani@sas.upenn.edu>Reported: June 25, 2014Product Description:-...

View Article

Image may be NSFW.
Clik here to view.

Paypal Complete 2-Factor Authentication(2FA) Bypass Exploit. Working as of...

Today, the 5th of August, I release my Paypal 2FA bypass exploit.It's been exactly 2 months since I've reported this bug, and due to thesimplicity of it, I believe I've given Paypal long enough to fix...

View Article

Image may be NSFW.
Clik here to view.

Vembu Storegrid - Multiple Critical Vulnerabilities

1. Advisory OverviewMultiple vulnerabilities exist in the Vembu Storegrid Backup and Disaster Recovery solution affecting both the client and server software (see Additional Information section)...

View Article

Image may be NSFW.
Clik here to view.

HybridAuth

#######################################################################  _     ___  _   _  ____  ____    _  _____#  | |   / _ \| \ | |/ ___|/ ___|  / \|_   _|#  | |  | | | |  \| | |  _| |     / _ \ |...

View Article


Image may be NSFW.
Clik here to view.

Microsoft Exchange Multiple Vulnerabilities

Exchange Multiple Internal IP Disclosures------------------------------------------Advisory:http://foofus.net/?p=758http://www.securitypentest.com/2014/08/exchange-multiple-internal-ip.htmlAutodiscover...

View Article

Image may be NSFW.
Clik here to view.

Reversing Different Aspects of a GPS Watch to Upload a Custom Firmware

A while ago, I built a reverse geocache box from a broken GPS wristwatch (Keymaze 700 trail) found in an electronics recycle bin. For that, I had to upload a custom firmware in the STM32F103...

View Article


Image may be NSFW.
Clik here to view.

Asprox Update - Version 2050

or the past month the Asprox / Kuluoz botnet has been sending out E-ZPass themed emails on a regular basis. The most recent campaign appears to be from E-ZPass Info and the emails arrive with the...

View Article

Image may be NSFW.
Clik here to view.

Backdoor Techniques in Targeted Attacks

Backdoors are an essential part of targeted attacks, as they allow an external threat actor to exercise control over any compromised machines. These allow the threat actor to collect information and...

View Article


Image may be NSFW.
Clik here to view.

(kind of) new tool: american fuzzy lop

Since I haven't really ever properly done it, i wanted to "officially"announce american fuzzy lop, a novel instrumentation-driven fuzzerthat, among other things, had some luck finding a bunch of...

View Article

Image may be NSFW.
Clik here to view.

SEC Consult SA-20140805-0 :: Multiple vulnerabilities in Readsoft Invoice...

SEC Consult Vulnerability Lab Security Advisory < 20140805-0 >=======================================================================              title: Multiple vulnerabilities...

View Article

Image may be NSFW.
Clik here to view.

Android Dynamic Code Analysis - Mastering DroidBox

In this article I'll have a a closer look at DroidBox which provides a mobile sandbox to look at Android applications. In the previous post I've dealt with static code analysis. This time will start...

View Article
Browsing all 8064 articles
Browse latest View live