CVE-2014-6033 - XML External Entity Injection in F5 Networks Big-IP
Vulnerability title: XML External Entity Injection in F5 Networks Big-IPCVE: CVE-2014-6033Vendor: F5 NetworksProduct: Big-IPAffected version: 11.3.0.39.0Fixed version: N/AReported by: Oliver...
View ArticleCybercriminals create platform for automating rogue credit card charges
The developers claim it can emulate human interaction to trick payment gatewaysmore...
View ArticleScan for shellshock with wfuzz
In the last few weeks everyone has been talking about Shellshock, the vulnerability affecting bash and having security ramifications everywhere, from Web, DHCP or SSH servers to mail servers. It does...
View ArticleGive me any zero-day and I will rule the world
A few months ago, I was having lunch at a favorite Italian restaurant in Washington, DC. I work in a residential area, which means lunch time is slow and there’s no crowd. This leads to many...
View ArticleReflected File Download - A New Web Attack Vector
On October 2014 as part of my talk at the Black Hat Europe 2014 event, I presented a new web attack vector that enables attackers to gain complete control over a victim’s machine by virtually...
View ArticleMac OS X local privilege escalation (IOBluetoothFamily)
Nowadays, exploitation of user-level vulnerabilities is becoming more and more difficult, because of the widespread diffusion of several protection methods, including ASLR, NX, various heap...
View ArticleHTTP PUBLIC-KEY-PINNING EXPLAINED
In my last post “Deploying TLS the hard way” I explained how TLS and its extensions (as well as a few HTTP extensions) work and what to watch out for when enabling TLS for your server. One of the HTTP...
View ArticlePaper: Printed Circuit Board Deconstruction Techniques
The primary purpose of printed circuit board (PCB) reverse engineering is to determine electronic system or subsystem functionality by analyzing how components are interconnected. We performed a series...
View ArticleRoll Your Own IP Attack Graphs with IPew
Are you:A security vendor feeling inadequate because you don’t have your own “live attack graph”?A SOC manager who needs to distract/impress visitors and/or executives with an “ooh, shiny!” display?A...
View ArticleAndroid/Emmental: adding cheese in emmental holes
This is a follow up post on Operation Emmental. If you are not aware of Emmental, please read this white paper, and our previous blog post.more...
View ArticleSEC Consult SA-20141031-0 :: XML External Entity Injection (XXE) and...
SEC Consult Vulnerability Lab Security Advisory < 20141031-0 >======================================================================= title: XML External Entity Injection (XXE) and...
View ArticleJinja2 2.0 /utils.py urlize vulnerability
.::Jinja2 2.0 /utils.py urlize vulnerability::. We enjoy hacking of life in day and night. _______________________________________________ [+] HSID:...
View ArticleCuckoo Sandbox API with Apache
This is yet another short Cuckoo post.If you would like to quickly get the Cuckoo API to work with Apache this one is for you.You can have both the API and the Web Interface configuration in the same...
View ArticleMicrosoft EMET - Armor against zero-days bypassed again | Conference Slides
New methods make it possible to circumvent protection mechanisms of Microsoft EMET 5.0more here.........http://blog.sec-consult.com/2014/10/microsoft-emet-armor-against-zero-days.html
View ArticleCVE-2014-1761 – The Alley of Compromise
A significant fraction of targeted attacks involve spear phishing emails with malicious lure documents that, when opened, exploit a vulnerability in the document viewer application to invoke a backdoor...
View ArticleCalifornia Data Breach Report
In this report, Attorney General Kamala D. Harris presents findings and recommendationsbased on a review of the 167 breaches reported in 2013 and on the full set of 298 breachesreported since 2012.more...
View ArticleDHCPSnoop
DHCPSnoop will listen on a network interface for DHCP replies from it's own DHCP requests and any other requests it can see during the runtime.It will then verify the DHCP response parameters that are...
View Article[SE-2014-01] Missing patches / inaccurate information regarding Oracle Oct CPU
Hello All,We've been recently informed by a 3rd party that Oracle planned to releasefixes for the vulnerabilities covered by our SE-2014-01 [1] project in Nov2014.We initially thought that someone...
View ArticleSetting HoneyTraps with ModSecurity: Adding Fake Cookies
This blog post continues with the topic of setting "HoneyTraps" within your web applications to catch attackers.more...
View ArticleSpotting Malicious Injections in Otherwise Benign Code
Being able to spot suspicious code, and then determine whether it is benign or malicious is a very important skill for a security researcher. Every day we scan through megabytes of HTML, JS and PHP....
View Article