HoneyMalt
HoneyMalt is a Maltego transform pack for the analysis (graphing) of Honeypots. Starting with Kippo (that uses MySQL) you can now export all that lovely SQL data and have your Maltego graphs displaying...
View ArticleSHIVA
SHIVA: Spam Honeypot with Intelligent Virtual Analyzer, is an open but controlled relay Spam Honeypot (SpamPot), built on top of Lamson Python framework, with capability of collecting and analyzing all...
View ArticleReversing the Dropcam Part 3: Digging into complied Lua functionality
In Part 1 & Part 2 of this RE blog series you saw how we reverse engineered the Dropcam and got access to the file system. In this final post of the series we'll examine some of the binaries found...
View ArticleTiny Malware PoC: Malware Without IAT, DATA OR Resource Section
Have you ever wondered about having an EXE without any entry in IAT (Import Address Table) at all? Well, I knew that it's possible, but never saw an actual exe file without IAT entry. So I developed an...
View ArticleMilkman: Creating Processes as Any Currently Logged in User
One of the problems with using PSEXEC from Metasploit (any of the psexec modules) is that it runs as SYSTEM. What’s the problem with that? Isn’t SYSTEM god mode? Ya, and normally I’d agree that it’s...
View ArticleMetasploit: VirtualBox 3D Acceleration Virtual Machine Escape
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rex'class Metasploit3 <...
View ArticleMetasploit: VMTurbo Operations Manager 4.6 vmtadmin.cgi Remote Command Execution
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit3 < Msf::Exploit::Remote Rank =...
View ArticleGoogle Chrome 36.0.1985.142 Use-after-free vulnerability
[WebSocket] Task creation should be separated from task posting.Having a complex argument as a waitForMethodCompletion may keep alivetemporary objects which must be killed before posting a task to...
View ArticleAdThief malware infected jailbroken Apple devices
Malware expert Axelle Apvrille explained how the iOS AdThief malware infected more than 75000 jailbroken iOS devices hijacking millions advertisements.more...
View ArticleTek Security Group's Password Repository
In this repository you will find helpful authentication brute forcing files. These files include known password defaults, usernames, common and specialized dictionaries, etc. Feel free to contribute to...
View ArticleGoogle Online Security: That’s not the download you’re looking for...
You should be able to use the web safely, without fear that malware could take control of your computer, or that you could be tricked into giving up personal information in a phishing scam.That’s why...
View ArticleThe Windows 8.1 Kernel Patch Protection
In the last 3 months we have seen a lot of machines compromised by Uroburos (a kernel-mode rootkit that spreads in the wild and specifically targets Windows 7 64-bit). Curiosity lead me to start...
View ArticleDeanonymizing Facebook Users By CSP Bruteforcing
Did you ever wish to have all relevant information about a visitor right when he hits your site? Think of (full) name, gender and maybe hobbies and interests? Thanks to social networks we could at...
View ArticleCertificate transparency for PGP?
Yesterday, Prof. Matthew Green wrote a nice blog post about why PGP must die. Ignoring the UX design problem for now, his four main points were: (1) the keys themselves are too unwieldy, (2) key...
View ArticleESPot - ElasticSearch Honeypot
An Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120 (The default configuration in Elasticsearch before 1.2 enables dynamic scripting, which allows remote...
View ArticleOptimizing a Birthday Attack
A birthday attack is a generic attack on hash functions (and some other cryptographic primitives) that trades time for space (memory).more...
View ArticleSANS Institute Recent Paper: Botnet Tracking Tools
AbstractBotnets are a serious threat to internet security. Botnets consist of networkedcollections of compromised machines called robots or ‘bots’ for short. Bots are alsocalled ‘zombies,’ and botnets...
View ArticlePaper: An Evasion and Counter-Evasion Study in Malicious Websites Detection
Malicious websites are a major cyber attack vector, and effective detection of them is an important cyber defense task. The main defense paradigm in this regard is that the defender uses some kind of...
View ArticlePaper: A CryptoCubic Protocol for Hacker-Proof Off-Chain Bitcoin Transactions
Off-Chain transactions allow for the immediate transfer of Cryptocurrency between two parties, without delays or unavoidable transaction fees. Such capabilities are critical for mainstream...
View ArticleLyris ListManagerWeb 8.95a Cross Site Scripting Vulnerability
Author: 1N3Website: http://xerosecurity.comVender Website: http://lyris.com/us-en/products/listmanagerAffected Product: Lyris ListManagerWebAffected Version: 8.95aABOUT:Lyris ListManager (Lyris LM) is...
View Article