Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[KIS-2014-12] TestLink

----------------------------------------------------------------TestLink <= 1.9.12 (database.class.php) Path Disclosure Weakness----------------------------------------------------------------[-]...

View Article


Image may be NSFW.
Clik here to view.

[KIS-2014-11] TestLink

--------------------------------------------------------------------------TestLink <= 1.9.12 (execSetResults.php) PHP Object Injection...

View Article


Image may be NSFW.
Clik here to view.

Anatomy of a code tracer

A few years back I found myself reverse-engineering a vendor lock-in handshake in a proprietary application. It was clear to me: I needed a code tracer.In my mind the ultimate code tracer should be...

View Article

Image may be NSFW.
Clik here to view.

Top 5 Scariest Zombie Botnets

An army of the undead, wreaking havoc on the Internet – it’s a nightmare scenario that has played out time and again as the world’s online population has exploded. But time and again protectors of the...

View Article

Image may be NSFW.
Clik here to view.

POS malware - a look at Dexter and Decebal

Point of Sale (POS) systems consist of the hardware and software used in processing a retail purchase of goods or services. The information stored on the magnetic stripe of the card is collected and...

View Article


Image may be NSFW.
Clik here to view.

Ventir Trojan Intercepts Keystrokes from Mac OS X Computers

Intego has seen an eyebrow-raising upward trend in the number of malicious files discovered targeting Mac OS X in the past few years, and it has many security experts concerned. Virus hunters have...

View Article

Image may be NSFW.
Clik here to view.

THE CASE OF THE MODIFIED BINARIES OVER TOR

After creating and using a new exitmap module, I found downloaded binaries being patched through a Tor exit node in Russia.  Tor is a wonderful tool for protecting the identity of journalists, their...

View Article

Image may be NSFW.
Clik here to view.

Incorrect implementation of NAT-PMP in multiple devices

Many NAT-PMP devices are incorrectly configured, allowing them to field requests received on external network interfaces or map forwarding routes to addresses other than that of the requesting host,...

View Article


Image may be NSFW.
Clik here to view.

Hack.lu 2014 CTF Write Up: At Gunpoint

Hack.lu's 2014 CTF took place on October 21-23. The event was organized by fluxfingers, and this year's challenges were really enjoyable, huge props to them. I played with my friends from TheGoonies -...

View Article


Image may be NSFW.
Clik here to view.

CVE-2014-4113 Detailed Vulnerability and Patch Analysis

As you might have heard, Microsoft recently patched some vulnerabilities, vulnerabilities related to Sandworm CVE-2014-4114 (Powerpoint exploit) and Font parsing vulnerabilitiy (CVE-2014-4148). But in...

View Article

Image may be NSFW.
Clik here to view.

Vuln Hunt: Find the Security Vulnerability Challenge # 3

This particular type of vulnerability is used to attack data-driven applications found across the web.  It has been around for over a decade and is one of the top threats today.  Do you know what it...

View Article

Image may be NSFW.
Clik here to view.

LeoUncia and OrcaRat

The PWC-named malware OrcaRat is presented as a new piece of malware but looking at the URI used for C&C communication, it could be an updated version of a well-known and kind of old piece of...

View Article

Image may be NSFW.
Clik here to view.

[ TECHNICAL TEARDOWN: HONGKONG PROTEST MALWARE ]

[ How it starts ]It all started when we saw Tsui Lokman mentioned about an executable that they received and it could be a malware.This particular piece of malware could potentially be used to target...

View Article


Image may be NSFW.
Clik here to view.

PSA: don't run 'strings' on untrusted files

Many shell users, and certainly most of the people working in computer forensics or other fields of information security, have a habit of running /usr/bin/strings on binary files originating from the...

View Article

Image may be NSFW.
Clik here to view.

OWNCLOUD UBUNTU PACKAGE AFFECTED BY MULTIPLE CRITICAL SECURITY ISSUES, NOBODY...

ownCloud developer Lukas Reschke has sent an email to the Ubuntu Devel mailing list, requesting that ownCloud (server) is removed from the Ubuntu repositories because the package is old and there are...

View Article


Image may be NSFW.
Clik here to view.

Unbreakable filter

I was bored so I thought I’d take a look at Ashar’s filters. I noticed he’d done a talk about it at Blackhat Europe which I was quite surprised at.more...

View Article

Image may be NSFW.
Clik here to view.

ELF obfuscation: let analysis tools show wrong external symbol calls

Now where the hack.lu 2014 CTF is over, I can finally publish a small ELF analysis tool fuck up, I found some months ago. I used this ELF analysis tools fuck up in a challenge of the CTF ("the union")...

View Article


Image may be NSFW.
Clik here to view.

Google Blacklists Bit.ly

If you ever shortened a URL using bit.ly or if you use it anywhere, be aware that Google recently blacklisted all bit.ly pages through its Safe Browsing program. It means that anyone using Chrome,...

View Article

Image may be NSFW.
Clik here to view.

Shellshock via SMTP

I've received several reports of what appears to be shellshock exploit attempts via SMTP.  The sources so far have all be webhosting providers, so I'm assuming these are compromised systems. more...

View Article

Image may be NSFW.
Clik here to view.

(PDF) akamai’s [state of the internet]

Akamai’s globally-distributed Intelligent Platform allows us togather massive amounts of data on many metrics, includingconnection speeds, attack traffic, network connectivity/availabilityissues, and...

View Article
Browsing all 8064 articles
Browse latest View live