Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CVE-2014-6033 - XML External Entity Injection in F5 Networks Big-IP

Vulnerability title: XML External Entity Injection in F5 Networks Big-IPCVE: CVE-2014-6033Vendor: F5 NetworksProduct: Big-IPAffected version: 11.3.0.39.0Fixed version: N/AReported by: Oliver...

View Article


Image may be NSFW.
Clik here to view.

Cybercriminals create platform for automating rogue credit card charges

The developers claim it can emulate human interaction to trick payment gatewaysmore...

View Article


Image may be NSFW.
Clik here to view.

Scan for shellshock with wfuzz

In the last few weeks everyone has been talking about Shellshock, the vulnerability affecting bash and having security ramifications everywhere, from Web, DHCP or SSH servers to mail servers. It does...

View Article

Image may be NSFW.
Clik here to view.

Give me any zero-day and I will rule the world

A few months ago, I was having lunch at a favorite Italian restaurant in Washington, DC. I work in a residential area, which means lunch time is slow and there’s no crowd. This leads to many...

View Article

Image may be NSFW.
Clik here to view.

Reflected File Download - A New Web Attack Vector

On October 2014 as part of my talk at the Black Hat Europe 2014 event, I presented a new web attack vector that enables attackers to gain complete control over a victim’s machine by virtually...

View Article


Image may be NSFW.
Clik here to view.

Mac OS X local privilege escalation (IOBluetoothFamily)

Nowadays, exploitation of user-level vulnerabilities is becoming more and more difficult, because of the widespread diffusion of several protection methods, including ASLR, NX, various heap...

View Article

Image may be NSFW.
Clik here to view.

HTTP PUBLIC-KEY-PINNING EXPLAINED

In my last post “Deploying TLS the hard way” I explained how TLS and its extensions (as well as a few HTTP extensions) work and what to watch out for when enabling TLS for your server. One of the HTTP...

View Article

Image may be NSFW.
Clik here to view.

Paper: Printed Circuit Board Deconstruction Techniques

The primary purpose of printed circuit board (PCB) reverse engineering is to determine electronic system or subsystem functionality by analyzing how components are interconnected. We performed a series...

View Article


Image may be NSFW.
Clik here to view.

Roll Your Own IP Attack Graphs with IPew

Are you:A security vendor feeling inadequate because you don’t have your own “live attack graph”?A SOC manager who needs to distract/impress visitors and/or executives with an “ooh, shiny!” display?A...

View Article


Image may be NSFW.
Clik here to view.

Android/Emmental: adding cheese in emmental holes

This is a follow up post on Operation Emmental. If you are not aware of Emmental, please read this white paper, and our previous blog post.more...

View Article

Image may be NSFW.
Clik here to view.

SEC Consult SA-20141031-0 :: XML External Entity Injection (XXE) and...

SEC Consult Vulnerability Lab Security Advisory < 20141031-0 >=======================================================================              title: XML External Entity Injection (XXE) and...

View Article

Image may be NSFW.
Clik here to view.

Jinja2 2.0 /utils.py urlize vulnerability

.::Jinja2 2.0 /utils.py urlize vulnerability::.                    We enjoy hacking of life in day and night.                _______________________________________________                  [+] HSID:...

View Article

Image may be NSFW.
Clik here to view.

Cuckoo Sandbox API with Apache

This is yet another short Cuckoo post.If you would like to quickly get the Cuckoo API to work with Apache this one is for you.You can have both the API and the Web Interface configuration in the same...

View Article


Image may be NSFW.
Clik here to view.

Microsoft EMET - Armor against zero-days bypassed again | Conference Slides

New methods make it possible to circumvent protection mechanisms of Microsoft EMET 5.0more here.........http://blog.sec-consult.com/2014/10/microsoft-emet-armor-against-zero-days.html

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-1761 – The Alley of Compromise

A significant fraction of targeted attacks involve spear phishing emails with malicious lure documents that, when opened, exploit a vulnerability in the document viewer application to invoke a backdoor...

View Article


Image may be NSFW.
Clik here to view.

California Data Breach Report

In this report, Attorney General Kamala D. Harris presents findings and recommendationsbased on a review of the 167 breaches reported in 2013 and on the full set of 298 breachesreported since 2012.more...

View Article

Image may be NSFW.
Clik here to view.

DHCPSnoop

DHCPSnoop will listen on a network interface for DHCP replies from it's own DHCP requests and any other requests it can see during the runtime.It will then verify the DHCP response parameters that are...

View Article


Image may be NSFW.
Clik here to view.

[SE-2014-01] Missing patches / inaccurate information regarding Oracle Oct CPU

Hello All,We've been recently informed by a 3rd party that Oracle planned to releasefixes for the vulnerabilities covered by our SE-2014-01 [1] project in Nov2014.We initially thought that someone...

View Article

Image may be NSFW.
Clik here to view.

Setting HoneyTraps with ModSecurity: Adding Fake Cookies

This blog post continues with the topic of setting "HoneyTraps" within your web applications to catch attackers.more...

View Article

Image may be NSFW.
Clik here to view.

Spotting Malicious Injections in Otherwise Benign Code

Being able to spot suspicious code, and then determine whether it is benign or malicious is a very important skill for a security researcher. Every day we scan through megabytes of HTML, JS and PHP....

View Article
Browsing all 8064 articles
Browse latest View live