Leaked sources of malware and exploit toolkits
Leaked source codes for researchers to perform tests here.....http://www.malwaretech.com/p/sources.html
View ArticleYet another ransomware variant
The blog post of today is a bit different than usual, as you can read the full post on the Panda Security blog.In this post I'm simply adding some additional information and repeating the most...
View ArticleNotorious Hacking Groups
Knowing your "enemies" is always a good exercise before developing every protection. Different attackers have different techniques and belong to different groups. Each group owns strict beliefs and...
View ArticlePractically Exploiting MS15-014/MS15-011 (Microsoft Group Policy Engine) & Demo
If you’re reading this then you’ve probably seen all the media coverage over the last couple of days surrounding MS15-011 and MS15-014. These bulletins resolve issues in Microsoft’s group policy engine...
View ArticleKRBTGT Account Password Reset Scripts now available for customers
One way to help mitigate the risk of a bad actor using a compromised krbtgt key to forge user tickets is by periodically resetting the krbtgt account password. Resetting this password on a regular...
View ArticleHow a simple box might end our need for antivirus software forever
I still remember the day my dad installed the first antivirus program I’d ever seen on my old Pentium II. Adorned in its signature colors of black and gold, I quickly came to learn all the ins and outs...
View ArticleHumHub .htaccess file upload vulnerability and remote code execution
[+] HumHub .htaccess file upload vulnerability and remote code execution[+] Discovered by: Jos Wetzels[+] Vendor: HumHub[+] Product: HumHub[+] Versions affected: 0.10.0 and earlier.[+] Advisory URL:...
View ArticleNullsecuritynet Tools- security and hacking tools, exploits, proof of...
This section offers a selection of Nulls fully featured security and hacking tools. They also provide some exploits, proof of concept code, shellcodes and snippets. That means some tools are not tested...
View ArticleBypass GPO (Group Policy Object) path restrictions for Runas.exe
ClosePreviousNextfunction Invoke-RunAs {<#.DESCRIPTIONRunas knockoff. Will bypass GPO path restrictions..PARAMETER UserNameProvide a user.PARAMETER PasswordProvide a password.PARAMETER DomainProvide...
View ArticleBank Hackers Steal Millions via Malware
In late 2013, an A.T.M. in Kiev started dispensing cash at seemingly random times of day. No one had put in a card or touched a button. Cameras showed that the piles of money had been swept up by...
View Article7170 Bitcoins ($1,727,409.6509 USD) Were Stolen, Claims BTER.com Exchange
When you try to connect to BTER.COM you get the following message below
View ArticleMandingoSandbox
Steps required to properly install and run in your system the "Mandingo's Sandbox" for analyzing malware samples here...........https://code.google.com/p/mandingo/wiki/MandingoSandbox
View ArticleHow is apicrypt working
Apicrypt is a cryptography solution that allows health professionals in France to exchange sensitive medical information by email. The official website of apicrypt claims that it uses a one-time pad...
View ArticleSQL Permissions Tool
SqlPermissions is a tool used to calculate the precise minimal permissions necessary for an application using a database. It works in an online fashion by monitoring active connections, or offline by...
View ArticlePawn Storm Malware Fact Check Due to Inaccuricies
Fortinet recently published a blog entry analyzing the Pawn Storm malware for iOS. There were some significant inaccuracies, however, and since Fortinet seems to be censoring website comments, I...
View ArticlePowerShell: Better phishing for all!
A year ago i was watching a presentation by Dave Kennedy (ReL1k) and Josh Kelly called: “PowerShell…omfg” the presentation shows multiple techniques that are very very useful during a pentest. After...
View ArticleTechnical Report on the activities of criminal groups engaged in targeted...
In the second half of 2014, we have repeatedly mentioned the targeted attacks on major financial institutions as a new level of fraud. Because now the money is not being kidnapped in "small legal...
View ArticlePaper a Must Read: OPERATION ARID VIPER -reveals the campaign’s technical...
Trend Micro researchers discovered an ongoing malware campaign that targets Israeli victims and leverages network infrastructure in Germany. The campaign has strong attribution ties to Arab parties...
View ArticleDownloaders and Decoys
Recently, we have been receiving samples that use “decoys” to imitate what is to be expected from running a normal file. In this blog post, we will analyze one such sample that Fortinet detects as...
View ArticleLife in a post-database world: using crypto to avoid DB writes
Possibly one of the biggest hurdles that stands in the way of fostering innovation and discovering newer and better techniques of doing old things is the ease with which developers and designers today...
View Article