“Steganos Online Shield VPN” leaks the user’s hostname in the HTTP “Via” header
“Steganos Online Shield VPN” claims to enhance the user’s privacy online (<https://www.steganos.com/en/products/vpn/online-shield-vpn/features/>) by, among other measures, (a) blocking...
View ArticleDoes malware still detect virtual machines?
In the security field, virtual machines (VM) have been used for many years and are popular among researchers because malware can be executed and analyzed on them without having to reinstall production...
View ArticleMultiple Vulnerabilities in Disqus WordPress Plugin
Disqus is an extremely popular third-party commenting system used on blogs and media sites. The disqus plugin for WordPress has been installed over a million times and is the 15th most popular overall...
View ArticleCVE-2014-2388 - BlackBerry Z 10 Storage and Access File-Exchange...
---------------------------------------------------------------------modzero Security Advisory: BlackBerry Z 10 - Storage and AccessFile-Exchange Authentication By-Pass...
View ArticleMetasploit: VirtualBox Guest Additions VBoxGuest.sys Privilege Escalation
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require...
View ArticleCS-Cart v4.2.0 Session Hijacking and Other Vulnerabilities
CS-Cart is a semi-popular open source e-commerce shopping cart application. It contains a homebrew session management system that utilizes an insecure source of randomness to generate session tokens....
View ArticleWordPress CK-And-SyntaxHighLighter Arbitrary File Upload Vuln
[+] Title: Wordpress ck-and-syntaxhighlighter Plugin RFU vulnerability[+] Date: 2014-08-12[+] Author: Hekt0r[+] Tested on: Windows7 & Kali Linux[+] Vendor Homepage: http://wordpress.org/[+]...
View ArticleFreedom Hosting FBI Shellcode Payload..
# MalwareMustDie!# Cracking Magneto (FBI Freedom Hosting Payload malware) with radare2more here...........http://pastebin.com/aFUP2gLB
View ArticleHake Second Release - Protocol dissection
Haka, the open source security oriented language which allows to apply security policies on (live) captured traffic announced its second release...
View ArticleDorkBot, a Twin Botnet of NgrBot
DorkBot is another modified IrcBot that is extremely similar to NgrBot, which is why many antivirus software treat them the same way, oftentimes using the same detection. Our botnet monitoring system...
View ArticleThe History of XXShenqi and the Future of SMS Phishing
On Aug 3rd, Chinese social media websites reported on the latest and largest SMS phishing (smishing for short) attack in China. The public security authorities of multiple cities in Guangdong, Jiangxi,...
View ArticleReverse engineering a fake Tor Bundle
The website is an almost perfect copy of the original website, except for he download link, and also the donation one, replaced by a bitcoin address.more...
View ArticleRansomware Race (Part 3): SynoLocker Under The Hood
Last week we wrote about a new ransomware family called SynoLocker that was targeting network attached storage devices manufactured by Synology. Initial rumours suggested SynoLocker might be related to...
View ArticleShellcode/Agent (Freedom Hosting Malcodes)
This is purely a case of state sponsored case malware, it was search warrant backing up the domain name spotted to be infected.Infection runs in Onionland on FreeHosting website(s) in 2013, with the...
View ArticleInternet Noise and Malicious Requests to a New Web Server
I set up a brand new web server to see what type of connections it will receive. Since the server had no “production” purpose, all attempts to access it could be considered suspicious at best. Such...
View ArticleBSides Las Vegas 2014 Videos
Here are the videos from the BSides Las Vegas conference for those interestedhttp://www.irongeek.com/i.php?page=videos/bsideslasvegas2014/mainlist
View ArticleWhat's the matter with PGP?
Last Thursday, Yahoo announced their plans to support end-to-end encryption using a fork of Google's end-to-end email extension. This is a Big Deal. With providers like Google and Yahoo onboard, email...
View ArticleIntro to BurpSuite V: Extracting Intrusions
Hi, Folks,Since the last post on Intruder, I've been seeing questions come up on how to pull out data from a large number of results. I wanted to take some time to throw a quick post on how you can...
View ArticleParanoiDF
ParanoiDF - PDF Analysis Suite based on PeePDF by Jose Miguel Esparza (http://peepdf.eternal-todo.com/). Tools added: Password cracking, redaction recovery, DRM removal, malicious JavaScript...
View ArticleZeuS GameOver, Brazilian Trojans and Boletos: an explosive combination
I'm sure you've read or heard about the malware attacking boletos – the popular Brazilian payment system – and how lots of malicious code is able to modify it, redirecting the amount paid to an account...
View Article