Web Server Attack Investigation - Installing a Bot and Reverse Shell via a...
With Windows malware getting so much attention nowadays, it's easy to forget that attackers also target other OS platforms. Let's take a look at a recent attempt to install an IRC bot written in Perl...
View Article300Gbps DDoS attack on firm exploits server flaw
Hacktivists launched up an immense and formerly undocumented 300Gbps DDoS attack earlier this summer by taking advantage of an obscure motherboard-level exploit on 100,000 unpatched servers, VeriSign...
View ArticleNSA/GCHQ/CESC Infecting Innocent Computers Worldwide
There's a new story on the c't magazin website about a 5-Eyes program to infect computers around the world for use as launching pads for attacks. These are not target computers; these are innocent...
View ArticleReport: Syrian Malware, the ever-evolving threat
The Global Research and Analysis Team (GReAT) at Kaspersky Lab has discovered new malwareattacks in Syria, with malicious entities using a plethora of methods from their toolbox to hideand operate...
View ArticleDarshak
Darshak is an application serving two primary usage -detecting any suspicious activity of being tracked via cellular network for example Silent SMSto assess security capabilities of your current...
View ArticleXRay: A New Tool for Tracking the Use of Personal Data on the Web
A real problem with personal data today is that the terms of trade so often seem both opaque and askew. Browse for information, send messages or go shopping online and data about you, your habits and...
View ArticleTenda A5s Router 3.02.05_CN - Authentication Bypass Vulnerability
----------------------------------------------------------------------- Tenda A5s Router Authentication Bypass...
View ArticleCVE-2014-3577: Apache HttpComponents client: Hostname verification...
Security Advisory - Apache Software Foundation Apache HttpComponents / hc.apache.org Hostname verification susceptible to MITM attack CVE-2014-3577 /...
View ArticleMetasploit: Gitlab-shell Code Execution
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'net/ssh'class Metasploit3 <...
View ArticleCommunity Health says data stolen in cyber attack from China
Community Health Systems Inc (CYH.N), one of the biggest U.S. hospital groups, said on Monday it was the victim of a cyber attack from China, resulting in the theft of Social Security numbers and other...
View ArticleMetasploit: Firefox toString console.time Privileged Javascript Injection
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rex/exploitation/jsobfu'class Metasploit3...
View ArticleSenkas Kolibri WebServer 2.0 Buffer Overflow Exploit
Exploit Details------------------Senkas Kolibri WebServer 2.0 (available at http://www.senkas.com/kolibri/download.php) is vulnerable to RCE via an overly long POST request.Sending the exploit will...
View ArticleHow to DDoS through Facebook Datacenter with almost 1Gbs. They’ve started to...
The vulnerability, found by Teofil Cojocariu in June 12, Security Researcher @CCSIR.org has a simple concept but it can leave a big impact on websites of small companies or individuals. He made Open...
View ArticleiSEC Partners Conducts Tor Browser Hardening Study
In May, the Open Technology Fund commissioned iSEC Partners to study current and future hardening options for the Tor Browser. The Open Technology Fund is the primary funder of Tor Browser development,...
View ArticleLearning Exploitation with FSExploitMe
I've been an adjunct professor at NYU Poly for almost two years now. It's been a great experience for a number of reasons, one of which is because I'm teaching a hot topic: Vulnerability Analysis and...
View ArticleVulnerabilities found in Dendroid mobile Trojan
On Friday, the full source code of the Dendroid Remote Access Trojan (RAT) was leaked. Dendroid is a popular crimeware package that targets Android devices and is sold on underground forums for $300....
View ArticlePatching the Mach-o Format the Simple and Easy Way
This is a strange post for me.I'm relatively new to mac research. So when I find something new, that seems cutting edge, but relatively simple I question it. Has anyone else done this before? Is this...
View ArticleThe Case Of The Bloated Reference Count: Handle Table Entry Changes in...
As part of my daily reverse engineering and peering into Windows Internals, I started noticing a strange effect in Windows 8.1 whenever looking at the reference counts of various objects with tools...
View ArticleCounterfeit Legal Notices continue to spread malware
Counterfeit legal notices continue to spread malware Today a friend mentioned that they had seen several ASProx messages being distributed by domains that looked like law firm names warning of court...
View ArticleRumor: Undisclosed security breach cause of Apple's new Gatekeeper app...
A report on Monday suggests Apple's recently modified OS X app signing policy is the result of an undisclosed Developer Portal security breach that leaked keys for multiple services, including...
View Article