Malware spreading via Steam chat
Today I was brought to the attention of a Tumblr post - apparently there's malware doing the rounds making use of Steam chat, (adding Steam friends and) spamming Steam users.more...
View ArticleStuxnet - User/Kernel-Mode analysis
Today I'll be taking a look at Stuxnet, and at a kernel level mostly (as usual) more than its impact on user-mode. I'll still however be going over a few user-mode things as it ties in with our kernel...
View ArticleProticaret E-Commerce Script v3.0 SQL Injection
Document Title:============Proticaret E-Commerce Script v3.0 >= SQL InjectionRelease Date:===========13 Nov 2014Product & Service Introduction:========================Proticaret is a free...
View ArticleReverse Engineer a Verisure Wireless Alarm part 1 – Radio Communications
Verisure is a supplier of wireless home alarms and connected services for the home. A Verisure setup can be composed of multiple devices, sensors and/or detectors such as Motion detectors with camera,...
View ArticleBypass WAF: Burp Plugin to Bypass Some WAF Devices
I wrote a blog post on the technique used by this plugin here a while back. Many WAF devices can be tricked into believing a request is from itself, and therefore trusted, if specific headers are...
View ArticleXOOPS
=============================================MGC ALERT 2014-003- Original release date: March 6, 2014- Last revised: November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 7,1/10 (CVSS...
View ArticleReflected XSS in Nibbleblog
=============================================MGC ALERT 2014-002- Original release date: March 5, 2014- Last revised: November 17, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 4,8/10 (CVSS...
View ArticleTriggering MS14-066
Microsoft addressed CVE-2014-6321 this Patch Tuesday, which has been hyped as the next Heartbleed. This vulnerability (actually at least 2 vulnerabilities) promises remote code execution in...
View ArticleBitTorrentsync security & privacy analysis – Hackito Session results
During last Hackito Session, a group of passionate tech gathered and during one evening dug whatever they could on BTsync. The goal of this Hackito Session was to analyze the security of BTsync.more...
View ArticleLinuxChiro
LinuxChiro==========Posture checking and correcting for LinuxWhat it checks/fixes: - Files/folders for permissions and/or ownership - Config files for correct option/value settings (separator can be...
View ArticleWebsiteBaker
=============================================MGC ALERT 2014-004- Original release date: March 11, 2014- Last revised: November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 10/10 (CVSS...
View ArticleDeep Dive into the HikaShop Vulnerability
It’s been two months since our disclosure of an Object Injection vulnerability affecting versions <2.3.3 of the Joomla! Hikashop extension. The vulnerability allowed an attacker to execute malicious...
View ArticleZoph
=============================================MGC ALERT 2014-005- Original release date: March 5, 2014- Last revised: November 18, 2014- Discovered by: Manuel Garcia Cardenas- Severity: 10/10 (CVSS...
View ArticleCVE-2014-8493 - ZTE ZXHN H108L Authentication Bypass
About the software==================ZTE ZXHN H108L is provided by some large Greek ISPs to their subscribers.Vulnerability Details=====================CWMP configuration is accessible only through the...
View ArticleLet's Play NSA! The Hackers Open-Sourcing Top Secret Spy Tools
Last August, at Defcon, the hacker conference in Las Vegas, a boyish 40-year-old engineer and security researcher named Michael Ossmann stood on the stage of a lecture hall, about to detail a stunning...
View ArticleTHE SAD STATE OF SERVER-SIDE TLS SESSION RESUMPTION IMPLEMENTATIONS
The probably oldest complaint about TLS is that its handshake is slow and together with the transport encryption has a lot of CPU overhead. This certainly is not true anymore if configured correctly...
View ArticleDisarming and Bypassing EMET
Last week Microsoft released EMET 5.1 to address some compatibility issues and strengthen mitigations to make them more resilient to attacks and bypasses. We, of course, were curious to see if our EMET...
View ArticleDie Laughing from a Billion Laughs
Recursion is the process of repeating items in a self-similar way, and that’s what the XML Entity Expansion (XEE)[1] is about: a small string is referenced a huge number of times.Technology standards...
View ArticleReversing Multilayer .NET Malware
Recently, we came across a malware sample that has been traversing the Internet disguised as an image of a woman. The malware sample uses several layers of obfuscation to hide its payload, including...
View ArticleCVE-2014-8768 tcpdump denial of service in verbose mode using malformed...
CVE-2014-8768 tcpdump denial of service in verbose mode using malformed Geonet payload1. Backgroundtcpdump is a powerful command-line packet analyzer. It allows the user to intercept and display TCP/IP...
View Article