Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Dairy Queen Customer Data Compromised by Backoff Malware

International Dairy Queen, the ice cream chain owned by Warren Buffett’s Berkshire Hathaway Inc. (BRK/A), said customer data were compromised by hackers.The breach with the so-called Backoff malware...

View Article


Image may be NSFW.
Clik here to view.

Kmart Investigating Payment System Intrusion

On Thursday, Oct. 9, Kmart's Information Technology team detected our payment data systems had been breached and immediately launched a full investigation working with a leading IT security firm.Our...

View Article


Image may be NSFW.
Clik here to view.

Snapchat Decrypt

Python script for decrypting stored images from Snapchat version 5.0.34.nn The script needs a rooted device and USB debugging turned on.more...

View Article

Image may be NSFW.
Clik here to view.

CORE SECRETS: NSA SABOTEURS IN CHINA AND GERMANY

The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to...

View Article

Image may be NSFW.
Clik here to view.

Shellshock User-agent Vulnerability Scanner

I was able to use the bash shellshock vulnerability last week to manually find a vulnerability in a web server through the HTTP User-agent. If you can do something manually there is a good chance that...

View Article


Image may be NSFW.
Clik here to view.

BackBox Linux 4 released!

This release includes features such as Linux Kernel 3.13, EFI mode, Anonymous mode, LVM + Disk encryption installer, privacy additions and armhf Debian packages.more...

View Article

Image may be NSFW.
Clik here to view.

Usermode Sandboxing

A lot of people (including myself, until recently) think that effective sandboxing requires a filter driver or kernel hooking, but this is no longer the case. A new security feature introduced in...

View Article

Image may be NSFW.
Clik here to view.

Russian gangs in $1bn City cyber raid plot

Criminal gangs are plotting a $1 billion (£618 million) cyber-heist on global financial institutions, Europol has warned, as they ratchet up the pressure on banks reeling from the record-breaking hit...

View Article


Image may be NSFW.
Clik here to view.

How to Analyze Distributed Denial-of-Service (DDos) Attack

As per Wikipedia, denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.In this small post I would...

View Article


Image may be NSFW.
Clik here to view.

Exploiting unsecure web servers with .svn directories

A lot of sites use SVN as their VCS of choice, pushing site changes directly from the repository. This is all good, but if you are not careful, you risk exposing your entire working repository.more...

View Article

Image may be NSFW.
Clik here to view.

CSP Bypass on Android prior to 4.4

I've found a Content Security Policy bypass similar and related to thesame origin policy bypass in CVE-2014-6041.https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041I've tested this on an...

View Article

Image may be NSFW.
Clik here to view.

A Code Signature Plugin for IDA

When reversing embedded code, it is often the case that completely different devices are built around a common code base, either due to code re-use by the vendor, or through the use of third-party...

View Article

Image may be NSFW.
Clik here to view.

Memcached

Last week I came across a service on the Internet running on TCP port 11211, Memcached's default port. I had heard of Memcached before but I probably only knew it was some kind of database system, that...

View Article


Image may be NSFW.
Clik here to view.

FinFisher Malware Analysis - Part 3 (Last)

I've already covered most parts of FinFisher malware in last two articles (part1, part2). This time, in this article, which is last article related to FinFisher, I'll cover last important tricks,...

View Article

Image may be NSFW.
Clik here to view.

Brainstorming Security For The Internet Of Things

This afternoon, my internet connection was so unusable that I couldn’t even watch non-HD Youtube videos. I decided that before blaming Comcast again, I should at least try to make sure the problem...

View Article


Image may be NSFW.
Clik here to view.

TL;DR: Just another way to get RCE in i2p version 0.9.13.

Inspired by this blogpost I decided to take a quick look at i2p myself (details on the vulnerability were not given at this point in time).After messing a bit with the routerconsole I figured that the...

View Article

Image may be NSFW.
Clik here to view.

ZeuS GameOver uses .NET cryptor and invites Zemot

ver the past days we intercepted several unsolicited emails purporting to be a voicemail from Microsoft Outlook sent via Microsoft Exchange Server.The emails arrive with the subject line "You have...

View Article


Image may be NSFW.
Clik here to view.

The Most Famous Malwares in APTA

During my talks and during my daily working life people asks me about the most interesting Malware used to perform Advanced Persistent Targeted Attacks (APTA). So I decided to give my personal answer...

View Article

Image may be NSFW.
Clik here to view.

Fuzzing on Edison: field report

When Intel Edison came out in September 2014, it caught my eye not only because of my unhealthy obsession with robotics, but also because it seemed like an interesting platform for security enthusiasts...

View Article

Image may be NSFW.
Clik here to view.

Auditing Samsung Smart-TV Apps

In a recent assignment, I was asked to do an IT security audit of a Samsung Smart-TV app. It took me some time to find the (for me) ideal solution to do the audit with my usual setup of tools. Since...

View Article
Browsing all 8064 articles
Browse latest View live