Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

CERT C Secure Coding Standard Wiki

The C rules and recommendations in this wiki are a work in progress and reflect the current thinking of the secure coding community. Because this is a development website, many pages are incomplete or...

View Article


Image may be NSFW.
Clik here to view.

Python Registry Parser (regparse)

I released a tool called, Python Registry Parser (or regparse for short), which is a plugin based Windows Registry parser written in Python.The reason for writing regparse was three fold.1) I don’t...

View Article


Image may be NSFW.
Clik here to view.

Android Malware Evaluating Tools

In order to accomplish a deep antimalwares' detection algorithms analysis, we developed two different tools, both coded in Java.more here........https://github.com/faber03/AndroidMalwareEvaluatingTools

View Article

Image may be NSFW.
Clik here to view.

Contemplating Malware Immunization via Infection Markers

Some malware avoids infecting the system twice by looking for predefined markers. For instance, if a particular process, registry key or mutex object is present on the host, such malicious software...

View Article

Image may be NSFW.
Clik here to view.

Multiple vulnerabilities in Untangle NGFW 9-11

Multiple issues have been discovered in the Untangle NGFW virtualappliance. The vendor was unresponsive and uncooperative to the researcher.- Persistent XSS leading to rootAuthentication...

View Article


Image may be NSFW.
Clik here to view.

How Malware Generates Mutex Names to Evade Detection

Malicious software sometimes uses mutex objects to avoid infecting the system more than once, as well as to coordinate communications among its multiple components on the host. Incident responders can...

View Article

Image may be NSFW.
Clik here to view.

OpenKM Platform Remote Reflected Cross Site Scripting (PoC)

# Exploit Title: OpenKM Platform Remote Reflected Cross Site Scripting# Google Dork: N/A# Date: 18-11-2014# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)# Vendor Homepage:...

View Article

Image may be NSFW.
Clik here to view.

BERserk

A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificate generation tool, works with CAs in the trust store.more...

View Article


Image may be NSFW.
Clik here to view.

Chrome SOP Bypass with SVG (CVE-2014-3160)

This is a short writeup about my SOP (Same-Origin Policy) bypass with SVG images I've found in Chrome, so that other security researchers can benefit from it. I reported the Chrome vulnerability to...

View Article


Image may be NSFW.
Clik here to view.

First version of working CanBusHacker - low budget Can Bus sniffer/injector...

This is a project to make a real time CAN packet monitoring system using Arduino and CAN BUS shield hardware. This makes a very affordable and reliable CAN packet monitor and injector.more...

View Article

Image may be NSFW.
Clik here to view.

A Ghost Tale

Back in January, me and other two guys, tested Ghost CMS doing a Web Application PT and a code review.I won't talk here of the whole test, but I'll focus on my findings trying to explain what brings me...

View Article

Image may be NSFW.
Clik here to view.

Exploits

Miscellaneous proof of concept exploit code written at Xiphos Research for testing purposes here.....https://github.com/XiphosResearch/exploits

View Article

Image may be NSFW.
Clik here to view.

MikroTik RouterOS Admin Password Change CSRF (PoC)

# Exploit Title: MikroTik RouterOS Admin Password Change CSRF# Google Dork: N/A# Date: 23-2-2015# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)# Vendor Homepage:...

View Article


Image may be NSFW.
Clik here to view.

Varnish 4.0.3 heap-buffer-overflow while parsing backend server HTTP response

Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache...

View Article

Image may be NSFW.
Clik here to view.

Exploiting the Cloud and Mitigating the Risk of SaaS Supplier Failure

The cloud is here to stay and according to a recent survey [i], organisations are going to be investing more in cloud services to support their core business operations.But have companies properly...

View Article


Image may be NSFW.
Clik here to view.

Paper: Tighter, faster, simpler side-channel security evaluations beyond...

Abstract. A Eurocrypt 2013 paper “Security evaluations beyond computingpower: How to analyze side-channel attacks you cannot mount?”by Veyrat-Charvillon, G´erard, and Standaert proposed a “Rank...

View Article

Image may be NSFW.
Clik here to view.

Hacking Team Reloaded? US-Based Ethiopian Journalists Again Targeted with...

SummaryOn February 12, 2014, Citizen Lab published a report1 documenting how journalists at the Ethiopian Satellite Television Service (ESAT) were targeted by a governmental attacker in December 2013,...

View Article


Image may be NSFW.
Clik here to view.

iOS Tutorial – Dumping the Application Memory Part 2

In my previous blog, iOS Tutorial – Dumping the Application Heap from Memory, I covered how to dump sensitive information from the heap of an iOS application using GDB. This time we will be covering...

View Article

Image may be NSFW.
Clik here to view.

0 Detection PDF with external link to malware EXE

This morning Malware Domain List tweeted a 0/57 detection malware PDF which was/is not detected as malware by any AV product on VirusTotal.commore...

View Article

Image may be NSFW.
Clik here to view.

Paper: Enpublic Apps: Security Threats Using iOS Enterprise and Developer...

ABSTRACTCompared with Android, the conventional wisdom is thatiOS is more secure. However, both jailbroken and nonjailbrokeniOS devices have number of vulnerabilities. ForiOS, apps need to interact...

View Article
Browsing all 8064 articles
Browse latest View live