generate-cert
Certificate chain generator compatible with most Android versions.more here..............https://github.com/nelenkov/generate-cert
View ArticleCapture the Coins – Bitcoin Challenge – Explained
On August 2014, Kulkan Security took a shot at the Bitcoin “Capture the coins” challenge, brought by coinspect.co. The challenge was put together for the Ekoparty 2014 Security Conference that takes...
View ArticleAIL
AIL framework - Analysis Information Leak frameworkAIL is a modular framework to analyse potential information leak from unstructured data source like pastes from Pastebin or similar services. AIL...
View ArticleCheck Point Researchers Discover ISP Vulnerabilities that Hackers Could Use...
Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069)...
View ArticleWordpress GB Gallery Slideshow 1.5 Authenticated SQLi Vulnerability
####################### Exploit Title : Wordpress GB Gallery Slideshow 1.5 Authenticated SQL Injection# Exploit Author : Claudio Viviani# Vendor Homepage : http://gb-plugins.com/# Software Link :...
View ArticleMetasploit: Yokogawa BKBCopyD.exe Client Exploit
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliaryinclude...
View ArticleMetasploit: Wordpress XMLRPC DoS Exploit
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliaryinclude...
View ArticleBlack Hat USA 2014 materials
If interested in material from Black Hat 2014, click on the followinglink. Some of it is being uploaded as I write this post....https://www.blackhat.com/us-14/archives.html
View ArticleHOW TO HACK A MACBOOK USING JUST A USB
There’s nothing quite like a weekend at a hacking convention to make you realise just how easy it is for technology companies to fall behind the ball.Yesterday, at the 2014 DEFCON hackers conference in...
View ArticleThe matasano crypto challenges
Eight sets of our crypto challenges, with solutions in most mainstream languages.more here...........http://cryptopals.com/
View ArticleIBM Sametime Meet Server 8.5 Arbitrary File Upload Vuln (2014-3088)
# Exploit Title: IBM Sametime Meet Server 8.5 Arbitrary File Upload# Google Dork: intitle:"New Meet - IBM Lotus Sametime"# Date: 11/08/2014# CVSS Score:...
View ArticleIBM Sametime Meet Server 8.5 XSS Vuln (CVE-2014-4748)
# Exploit Title: IBM Sametime Meet Server 8.5 Reflect Cross Site Script# Google Dork: intitle:"Meeting Center - IBM Lotus Sametime"# Date: 11/08/2014# CVSS Score:...
View ArticleIBM Sametime Meet Server 8.5 Password Disclosure Vuln (CVE-2014-4747)
# Exploit Title: IBM Sametime Meet Server 8.5 Password Disclosure# Google Dork: intitle:"Meeting Center - IBM Lotus Sametime"# Date: 11/08/2014# CVSS Score:...
View Article"How to Disclose an Exploit Without Getting in Trouble"
Compliance is probably one of the most significant aspects in any career. In particular the Information Security realm. Here are slides from a legal disclosure DefCon presentation that you may find of...
View ArticleSecurity Updates available for Adobe Reader and Acrobat
Adobe has released security updates for Adobe Reader and Acrobat XI (11.0.07) and earlier versions for Windows. These updates address a vulnerability that could allow an attacker to circumvent sandbox...
View ArticleTwitter admits that as many as 23 million of its active users are actually bots
Twitter raised eyebrows last month when it suggested that many of its active users aren’t actually human. Now we know how many.more...
View Article[oCERT-2014-006] Ganeti insecure archive permission
#2014-006 Ganeti insecure archive permissionDescription:Ganeti, an open source virtualisation manager, suffers from an insecure filepermission vulnerability that leads to sensitive information...
View ArticleWebsite Malware: Mobile Redirect to BaDoink Porn App Evolving
Recently, we wrote about a malware redirection on this blog where the malware was causing compromised sites to redirect their visitors to pornographic content (specifically, the BaDoink app). You can...
View ArticleLiberal Crossdomain.xml Example- Part 2
As a followup to Liberal Crossdomain.xml Exploit Example – Part 1, this is the source for the Flash app.more here...........http://www.chs.us/liberal-crossdomain-xml-example-part-2/
View ArticleMicrosoft Security Bulletin Summary for August 2014
This bulletin summary lists security bulletins released for August 2014.Inclusive is Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege and more here...................
View Article