Dairy Queen Customer Data Compromised by Backoff Malware
International Dairy Queen, the ice cream chain owned by Warren Buffett’s Berkshire Hathaway Inc. (BRK/A), said customer data were compromised by hackers.The breach with the so-called Backoff malware...
View ArticleKmart Investigating Payment System Intrusion
On Thursday, Oct. 9, Kmart's Information Technology team detected our payment data systems had been breached and immediately launched a full investigation working with a leading IT security firm.Our...
View ArticleSnapchat Decrypt
Python script for decrypting stored images from Snapchat version 5.0.34.nn The script needs a rooted device and USB debugging turned on.more...
View ArticleCORE SECRETS: NSA SABOTEURS IN CHINA AND GERMANY
The National Security Agency has had agents in China, Germany, and South Korea working on programs that use “physical subversion” to infiltrate and compromise networks and devices, according to...
View ArticleShellshock User-agent Vulnerability Scanner
I was able to use the bash shellshock vulnerability last week to manually find a vulnerability in a web server through the HTTP User-agent. If you can do something manually there is a good chance that...
View ArticleBackBox Linux 4 released!
This release includes features such as Linux Kernel 3.13, EFI mode, Anonymous mode, LVM + Disk encryption installer, privacy additions and armhf Debian packages.more...
View ArticleUsermode Sandboxing
A lot of people (including myself, until recently) think that effective sandboxing requires a filter driver or kernel hooking, but this is no longer the case. A new security feature introduced in...
View ArticleRussian gangs in $1bn City cyber raid plot
Criminal gangs are plotting a $1 billion (£618 million) cyber-heist on global financial institutions, Europol has warned, as they ratchet up the pressure on banks reeling from the record-breaking hit...
View ArticleHow to Analyze Distributed Denial-of-Service (DDos) Attack
As per Wikipedia, denial-of-service (DoS) or distributed denial-of-service (DDoS) attack is an attempt to make a machine or network resource unavailable to its intended users.In this small post I would...
View ArticleExploiting unsecure web servers with .svn directories
A lot of sites use SVN as their VCS of choice, pushing site changes directly from the repository. This is all good, but if you are not careful, you risk exposing your entire working repository.more...
View ArticleCSP Bypass on Android prior to 4.4
I've found a Content Security Policy bypass similar and related to thesame origin policy bypass in CVE-2014-6041.https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6041I've tested this on an...
View ArticleA Code Signature Plugin for IDA
When reversing embedded code, it is often the case that completely different devices are built around a common code base, either due to code re-use by the vendor, or through the use of third-party...
View ArticleMemcached
Last week I came across a service on the Internet running on TCP port 11211, Memcached's default port. I had heard of Memcached before but I probably only knew it was some kind of database system, that...
View ArticleFinFisher Malware Analysis - Part 3 (Last)
I've already covered most parts of FinFisher malware in last two articles (part1, part2). This time, in this article, which is last article related to FinFisher, I'll cover last important tricks,...
View ArticleBrainstorming Security For The Internet Of Things
This afternoon, my internet connection was so unusable that I couldn’t even watch non-HD Youtube videos. I decided that before blaming Comcast again, I should at least try to make sure the problem...
View ArticleTL;DR: Just another way to get RCE in i2p version 0.9.13.
Inspired by this blogpost I decided to take a quick look at i2p myself (details on the vulnerability were not given at this point in time).After messing a bit with the routerconsole I figured that the...
View ArticleZeuS GameOver uses .NET cryptor and invites Zemot
ver the past days we intercepted several unsolicited emails purporting to be a voicemail from Microsoft Outlook sent via Microsoft Exchange Server.The emails arrive with the subject line "You have...
View ArticleThe Most Famous Malwares in APTA
During my talks and during my daily working life people asks me about the most interesting Malware used to perform Advanced Persistent Targeted Attacks (APTA). So I decided to give my personal answer...
View ArticleFuzzing on Edison: field report
When Intel Edison came out in September 2014, it caught my eye not only because of my unhealthy obsession with robotics, but also because it seemed like an interesting platform for security enthusiasts...
View ArticleAuditing Samsung Smart-TV Apps
In a recent assignment, I was asked to do an IT security audit of a Samsung Smart-TV app. It took me some time to find the (for me) ideal solution to do the audit with my usual setup of tools. Since...
View Article