Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

generate-cert

Certificate chain generator compatible with most Android versions.more here..............https://github.com/nelenkov/generate-cert

View Article


Image may be NSFW.
Clik here to view.

Capture the Coins – Bitcoin Challenge – Explained

On August 2014, Kulkan Security took a shot at the Bitcoin “Capture the coins” challenge, brought by coinspect.co. The challenge was put together for the Ekoparty 2014 Security Conference that takes...

View Article


Image may be NSFW.
Clik here to view.

AIL

AIL framework - Analysis Information Leak frameworkAIL is a modular framework to analyse potential information leak from unstructured data source like pastes from Pastebin or similar services. AIL...

View Article

Image may be NSFW.
Clik here to view.

Check Point Researchers Discover ISP Vulnerabilities that Hackers Could Use...

Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today released its findings of security concerns in CPE WAN Management Protocol (CWMP/TR-069)...

View Article

Image may be NSFW.
Clik here to view.

Wordpress GB Gallery Slideshow 1.5 Authenticated SQLi Vulnerability

####################### Exploit Title : Wordpress GB Gallery Slideshow 1.5 Authenticated SQL Injection# Exploit Author : Claudio Viviani# Vendor Homepage : http://gb-plugins.com/# Software Link :...

View Article


Image may be NSFW.
Clik here to view.

Metasploit: Yokogawa BKBCopyD.exe Client Exploit

### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliaryinclude...

View Article

Image may be NSFW.
Clik here to view.

Metasploit: Wordpress XMLRPC DoS Exploit

### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Auxiliaryinclude...

View Article

Image may be NSFW.
Clik here to view.

Black Hat USA 2014 materials

If interested in material from Black Hat 2014, click on the followinglink. Some of it is being uploaded as I write this post....https://www.blackhat.com/us-14/archives.html

View Article


Image may be NSFW.
Clik here to view.

HOW TO HACK A MACBOOK USING JUST A USB

There’s nothing quite like a weekend at a hacking convention to make you realise just how easy it is for technology companies to fall behind the ball.Yesterday, at the 2014 DEFCON hackers conference in...

View Article


Image may be NSFW.
Clik here to view.

The matasano crypto challenges

Eight sets of our crypto challenges, with solutions in most mainstream languages.more here...........http://cryptopals.com/

View Article

Image may be NSFW.
Clik here to view.

IBM Sametime Meet Server 8.5 Arbitrary File Upload Vuln (2014-3088)

# Exploit Title:   IBM Sametime Meet Server 8.5 Arbitrary File Upload# Google Dork:     intitle:"New Meet - IBM Lotus Sametime"# Date:     11/08/2014# CVSS Score:...

View Article

Image may be NSFW.
Clik here to view.

IBM Sametime Meet Server 8.5 XSS Vuln (CVE-2014-4748)

# Exploit Title:   IBM Sametime Meet Server 8.5 Reflect Cross Site Script# Google Dork:     intitle:"Meeting Center - IBM Lotus Sametime"# Date:     11/08/2014# CVSS Score:...

View Article

Image may be NSFW.
Clik here to view.

IBM Sametime Meet Server 8.5 Password Disclosure Vuln (CVE-2014-4747)

# Exploit Title:   IBM Sametime Meet Server 8.5 Password Disclosure# Google Dork:     intitle:"Meeting Center - IBM Lotus Sametime"# Date:     11/08/2014# CVSS Score:...

View Article


Image may be NSFW.
Clik here to view.

"How to Disclose an Exploit Without Getting in Trouble"

Compliance is probably one of the most significant aspects in any career. In particular the Information Security realm. Here are slides from a legal disclosure DefCon presentation that you may find of...

View Article

Image may be NSFW.
Clik here to view.

Security Updates available for Adobe Reader and Acrobat

Adobe has released security updates for Adobe Reader and Acrobat XI (11.0.07) and earlier versions for Windows. These updates address a vulnerability that could allow an attacker to circumvent sandbox...

View Article


Image may be NSFW.
Clik here to view.

Twitter admits that as many as 23 million of its active users are actually bots

Twitter raised eyebrows last month when it suggested that many of its active users aren’t actually human. Now we know how many.more...

View Article

Image may be NSFW.
Clik here to view.

[oCERT-2014-006] Ganeti insecure archive permission

#2014-006 Ganeti insecure archive permissionDescription:Ganeti, an open source virtualisation manager, suffers from an insecure filepermission vulnerability that leads to sensitive information...

View Article


Image may be NSFW.
Clik here to view.

Website Malware: Mobile Redirect to BaDoink Porn App Evolving

Recently, we wrote about a malware redirection on this blog where the malware was causing compromised sites to redirect their visitors to pornographic content (specifically, the BaDoink app). You can...

View Article

Image may be NSFW.
Clik here to view.

Liberal Crossdomain.xml Example- Part 2

As a followup to Liberal Crossdomain.xml Exploit Example – Part 1, this is the source for the Flash app.more here...........http://www.chs.us/liberal-crossdomain-xml-example-part-2/

View Article

Image may be NSFW.
Clik here to view.

Microsoft Security Bulletin Summary for August 2014

This bulletin summary lists security bulletins released for August 2014.Inclusive is Vulnerabilities in Kernel-Mode Drivers Could Allow Elevation Of Privilege and more here...................

View Article
Browsing all 8064 articles
Browse latest View live