Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Malware spreading via Steam chat

Today I was brought to the attention of a Tumblr post - apparently there's malware doing the rounds making use of Steam chat, (adding Steam friends and) spamming Steam users.more...

View Article


Image may be NSFW.
Clik here to view.

Stuxnet - User/Kernel-Mode analysis

Today I'll be taking a look at Stuxnet, and at a kernel level mostly (as usual) more than its impact on user-mode. I'll still however be going over a few user-mode things as it ties in with our kernel...

View Article


Image may be NSFW.
Clik here to view.

Proticaret E-Commerce Script v3.0 SQL Injection

Document Title:============Proticaret E-Commerce Script v3.0 >= SQL InjectionRelease Date:===========13 Nov 2014Product & Service Introduction:========================Proticaret is a free...

View Article

Image may be NSFW.
Clik here to view.

Reverse Engineer a Verisure Wireless Alarm part 1 – Radio Communications

Verisure is a supplier of wireless home alarms and connected services for the home. A Verisure setup can be composed of multiple devices, sensors and/or detectors such as Motion detectors with camera,...

View Article

Image may be NSFW.
Clik here to view.

Bypass WAF: Burp Plugin to Bypass Some WAF Devices

I wrote a blog post on the technique used by this plugin here a while back. Many WAF devices can be tricked into believing a request is from itself, and therefore trusted, if specific headers are...

View Article


Image may be NSFW.
Clik here to view.

XOOPS

=============================================MGC ALERT 2014-003- Original release date: March 6, 2014- Last revised:  November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 7,1/10 (CVSS...

View Article

Image may be NSFW.
Clik here to view.

Reflected XSS in Nibbleblog

=============================================MGC ALERT 2014-002- Original release date: March 5, 2014- Last revised:  November 17, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 4,8/10 (CVSS...

View Article

Image may be NSFW.
Clik here to view.

Triggering MS14-066

Microsoft addressed CVE-2014-6321 this Patch Tuesday, which has been hyped as the next Heartbleed.  This vulnerability (actually at least 2 vulnerabilities) promises remote code execution in...

View Article


Image may be NSFW.
Clik here to view.

BitTorrentsync security & privacy analysis – Hackito Session results

During last Hackito Session, a group of passionate tech gathered and during one evening dug whatever they could on BTsync. The goal of this Hackito Session was to analyze the security of BTsync.more...

View Article


Image may be NSFW.
Clik here to view.

LinuxChiro

LinuxChiro==========Posture checking and correcting for LinuxWhat it checks/fixes: - Files/folders for permissions and/or ownership - Config files for correct option/value settings (separator can be...

View Article

Image may be NSFW.
Clik here to view.

WebsiteBaker

=============================================MGC ALERT 2014-004- Original release date: March 11, 2014- Last revised:  November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 10/10 (CVSS...

View Article

Image may be NSFW.
Clik here to view.

Deep Dive into the HikaShop Vulnerability

It’s been two months since our disclosure of an Object Injection vulnerability affecting versions <2.3.3 of the Joomla! Hikashop extension. The vulnerability allowed an attacker to execute malicious...

View Article

Image may be NSFW.
Clik here to view.

Zoph

=============================================MGC ALERT 2014-005- Original release date: March 5, 2014- Last revised:  November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 10/10 (CVSS...

View Article


Image may be NSFW.
Clik here to view.

CVE-2014-8493 - ZTE ZXHN H108L Authentication Bypass

About the software==================ZTE ZXHN H108L is provided by some large Greek ISPs to their subscribers.Vulnerability Details=====================CWMP configuration is accessible only through the...

View Article

Image may be NSFW.
Clik here to view.

Let's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools

Last August, at Defcon, the hacker conference in  Las Vegas, a boyish 40-year-old engineer and security researcher named Michael Ossmann stood on the stage of a lecture hall, about to detail a stunning...

View Article


Image may be NSFW.
Clik here to view.

THE SAD STATE OF SERVER-SIDE TLS SESSION RESUMPTION IMPLEMENTATIONS

The probably oldest complaint about TLS is that its handshake is slow and together with the transport encryption has a lot of CPU overhead. This certainly is not true anymore if configured correctly...

View Article

Image may be NSFW.
Clik here to view.

Disarming and Bypassing EMET

Last week Microsoft released EMET 5.1 to address some compatibility issues and strengthen mitigations to make them more resilient to attacks and bypasses. We, of course, were curious to see if our EMET...

View Article


Image may be NSFW.
Clik here to view.

Die Laughing from a Billion Laughs

Recursion is the process of repeating items in a self-similar way, and that’s what the XML Entity Expansion (XEE)[1] is about: a small string is referenced a huge number of times.Technology standards...

View Article

Image may be NSFW.
Clik here to view.

Reversing Multilayer .NET Malware

Recently, we came across a malware sample that has been traversing the Internet disguised as an image of a woman. The malware sample uses several layers of obfuscation to hide its payload, including...

View Article

Image may be NSFW.
Clik here to view.

CVE-2014-8768 tcpdump denial of service in verbose mode using malformed...

CVE-2014-8768 tcpdump denial of service in verbose mode using malformed Geonet payload1. Backgroundtcpdump is a powerful command-line packet analyzer. It allows the user to intercept and display TCP/IP...

View Article
Browsing all 8064 articles
Browse latest View live