The Shellshock Aftershock for NAS Administrators
FireEye has been monitoring Shellshock-related attacks closely since the vulnerability was first made public last week. Specifically, FireEye has observed attackers attempting to exploit the BASH...
View ArticleVerifying Chinese MITM of Yahoo
GreatFire.org sent out a tweet yesterday saying that “Yahoo appears to under Man-in-the-middle attack in China. 3rd case of country-wide MITM, after Google, Github”.Mashable later ran a story called...
View Articlexfs directory hash ordering bug
Another kernel bug which did not get a CVE yet, but should be consideredto get one (sorry for the late...
View ArticleTwo New Attack Vectors to Aggravate the Android addJavascriptInterface RCE...
The Android addJavascriptInterface Remote Code Execution (RCE) issue is a disaster in Android ecosystem (see background knowledge here and here). CVE had assigned CVE-2012-6636 for the basic issue, and...
View ArticleMetasploit: Pure-FTPd External Authentication Bash Environment Variable Code...
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'class Metasploit4 < Msf::Exploit::Remote Rank =...
View ArticleMetasploit: PXE Exploit Server
### This module requires Metasploit: http//metasploit.com/download# Current source: https://github.com/rapid7/metasploit-framework##require 'msf/core'require 'rex/proto/tftp'require...
View ArticleChopShop 4.0- Protocol Analysis/Decoder Framework
ChopShop is a MITRE developed framework to aid analysts in the creation and execution of pynids based decoders and detectors of APT tradecraft.more here...........https://github.com/MITRECND/chopshop
View ArticleRecovering Evidence from SSD Drives: Understanding TRIM, Garbage Collection...
We published an article on SSD forensics in 2012. SSD self-corrosion, TRIM and garbage collection were little known and poorly understood phenomena at that time, while encrypting and compressing SSD...
View ArticleWindows 10–Active Memory Dump
Windows 10 brings a new type of memory dump: Active Memory Dump. I love this feature, just what I’ve been waiting for.To analyze the Windows 10 Technical Preview Dump files ensure you have the symbols...
View ArticleCVE-2013-7331 and Exploit Kits
Thanks to EKWatcher and his decoding skills saving me a lot of time.As we can see more and more of those "XMLDOM" checks in exploit kits i decided to write here some of the checks spotted. This is a...
View ArticleScan the internet for Autonomous Systems that can perform IP spoofing
I have always been interested in IP spoofing. I would say it's something "elegant", and it's a neat way to show how the Internet works, or rather how there are some inherent flaws with it. My greatest...
View ArticleSeriously! NSSLabs responds to Palo Alto Networks claims about latest NGFW...
We don’t follow up every NSS Labs test with a blog response to a vendor, but after the fun andgames following our recent BDS test, we find ourselves in a similar position. This time it is Palo Alto...
View ArticleCVE-2014-7284 (NGRO Bug): Lack of randomness in Linux kernel network secrets
In the late 1990s and early 2000s, many operating systems were found to have flawed TCP/IP sequence number generators, and this was identified as a serious security vulnerability (see, for example,...
View ArticleThe Unpatchable Malware That Infects USBs Is Now on the Loose
It’s been just two months since researcher Karsten Nohl demonstrated an attack he called BadUSB to a standing-room-only crowd at the Black Hat security conference in Las Vegas, showing that it’s...
View ArticleCross Site Scripting – Attacking the Honeywell Falcon XLWeb part two
On Tuesday Outpost24 released information on CVE-2014-2717 – Honeywell Authentication Bypass. Later, the same day we were contacted by Mr. Bolivar, the second vulnerability researcher mentioned in the...
View ArticleWebsite Security: A Case of SEO Poisoning
There are so many ways your website can be co-opted by hackers for many different reasons, targeting the value created via your SEO is highly attractive. It provides an attacker the opportunity to...
View ArticleNoSQL SSJI Authentication Bypass
Following my previous post on SSJI (Server Side JavaScript Injection), I received many questions requesting more details and techniques on how applications that use a big data back end may be...
View ArticleReading the Silk Road configuration
Many of us believe it wasn't the FBI who discovered the hidden Silk Road server, but the NSA (or other intelligence organization). We believe the FBI is using "parallel construction", meaning creating...
View ArticleRight-winger explains what's wrong with ComputerCop
The EFF has a good article on ComputerCop. Police departments have lashed back, saying the EFF is an "ultra-liberal organization that is not in any way credible on this". While it's true the EFF leans...
View ArticleThe domain 0427d7.se with no readable text is valued at $8.6 Million...
Torrent sites link to 0427d7.se then malware. According to appraisepage.com 0427d7.se was registered 1 year 7 months ago. It has a alexa rank of #1,018 in the world. It is a domain having .se...
View Article