Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

SmarterMail - Stored XSS in emails

_______ _________ _________ ________ \ \ \_ ___ \\_ ___ \ / _____/______ ____ __ ________ / | \/ \ \// \ \/ / \ __\_ __ \/ _ \| | \____ \ / | \ \___\ \____ \ \_\ \ | \( <_> ) | / |_> >...

View Article


Image may be NSFW.
Clik here to view.

Paper: Triathlon of Lightweight Block Ciphers for the Internet of Things

Abstract. In this paper we introduce an open framework for the benchmarking of lightweightblock ciphers on a multitude of embedded platforms. Our framework is able to evaluate executiontime, RAM...

View Article


Image may be NSFW.
Clik here to view.

Exfiltrate Data via DNS with Egress-Assess

DNS is a channel that can usually be utilized to exfiltrate data out over a network.  Even in the event that a network you are operating in requires authenticating to a proxy for data to leave a...

View Article

Image may be NSFW.
Clik here to view.

Mobile App Wall of Shame: Quikr

Quikr is India's largest online and mobile classifieds portal. Like Craigslist, Quikr provides the users with a platform to help them buy, sell, rent and advertise across multiple categories like real...

View Article

Image may be NSFW.
Clik here to view.

The Importance of Good Labels in Security Datasets

Working as security researchers is common to create a new machine learning algorithm that we want to evaluate. It may be that we are trying to detect malware, identify attacks or analyze IDS logs, but...

View Article


Image may be NSFW.
Clik here to view.

Saying goodbye to encrypted SMS/MMS

It’s 2015, and the end of the road for encrypted SMS/MMS in TextSecure.The TextSecure story started back in 2009, at the dawn of the smartphone era. Back then, TextSecure focused on securing the...

View Article

Image may be NSFW.
Clik here to view.

Registry Explorer 0.0.2.0 released!

Lots of good changes in this version that you can view here.....http://binaryforay.blogspot.com/2015/03/registry-explorer-0020-released.html

View Article

Image may be NSFW.
Clik here to view.

Google OAuth Target URL and Domain Description Vulnerable to UI redress attack

Over last 3 years, I’ve participated in the Google Reward Program and found some relatively serious vulnerability. Google OAuth Target URL, Upload X.509 Cert and Domain Description Vulnerable to UI...

View Article


Image may be NSFW.
Clik here to view.

ON THE SECURITY IMPLICATIONS OF WINDOW.OPENER.LOCATION.REPLACE()

It’s no secret I am a big fan of many HackerOne bug reports and public penetration test reports authored by companies such as Cure53 and Least Authority.In fact, pretty much every week I spend some of...

View Article


Image may be NSFW.
Clik here to view.

MentalJS DOM bypass

Ruben Ventura (@tr3w_) found a pretty cool bypass of MentalJS. He used insertBefore with a null second argument which allows you to insert a node into the dom and bypass my sandboxing restrictions.more...

View Article

Image may be NSFW.
Clik here to view.

Referer Header Based Blind SQL Injection Explained With Example

Hello everyone, this post is third in series of posts that I will be doing on SQL injection. Earlier I explained Second Order SQL Injections with Example and Column Truncation SQL injection...

View Article

Image may be NSFW.
Clik here to view.

Mono TLS vulnerabilities

A TLS impersonation attack was discovered in Mono's TLS stack byresearchers at Inria. During checks on our TLS stack, we havediscovered two further issues which we have fixed - SSLv2 support,...

View Article

Image may be NSFW.
Clik here to view.

Ransomware Report: The Rise of BandarChor

This week, we have received a number of reports on yet another ransomware, BandarChor.This ransomware is not exactly fresh. The first infections that we've noticed related to this family came in...

View Article


Image may be NSFW.
Clik here to view.

ClassNameDeobfuscator

This is a simple script to parse through the .smali files produced by apktool and extract the .source annotation lines.Obfuscation can be a pain to deal with when reversing an app. However, some apps...

View Article

Image may be NSFW.
Clik here to view.

PHP Reflect

PHP Reflect is a library that adds the ability to reverse-engineer classes, interfaces, functions, constants, namespaces and more.Additional info here....https://github.com/llaville/php-reflect

View Article


Image may be NSFW.
Clik here to view.

keysweeper

KeySweeper is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any...

View Article

Image may be NSFW.
Clik here to view.

Visa and Other Gift Card Transactions Exposed by GoWallet Vulnerability

I recently received a Visa Gift Card and decided to use GoWallet to manage it, as advertised on the card’s packaging. GoWallet offers the ability to manage most types of gift cards, allowing a user to...

View Article


Image may be NSFW.
Clik here to view.

Scope Injection in CFML

Here is an interesting vulnerability that I have come across several times in real CFML code during code reviews, I have spoken about it at conferences but have never written about it. Since it doesn't...

View Article

Image may be NSFW.
Clik here to view.

VernamTunnel

Cross-platform multi-thread TCP tunnel with Vernam cipher encryption. You can use this software to enable remote access to your private services in your network.more...

View Article

Image may be NSFW.
Clik here to view.

Blog on Section Based Code Injection and Its Detection (Inclusive tool to...

I wrote a small tool to detect a possible code injection even if it is done by only section APIs.A few weeks ago, I had an opportunity to analyze ransomware referred as Urausy. At a very initial stage...

View Article
Browsing all 8064 articles
Browse latest View live