CERT C Secure Coding Standard Wiki
The C rules and recommendations in this wiki are a work in progress and reflect the current thinking of the secure coding community. Because this is a development website, many pages are incomplete or...
View ArticlePython Registry Parser (regparse)
I released a tool called, Python Registry Parser (or regparse for short), which is a plugin based Windows Registry parser written in Python.The reason for writing regparse was three fold.1) I don’t...
View ArticleAndroid Malware Evaluating Tools
In order to accomplish a deep antimalwares' detection algorithms analysis, we developed two different tools, both coded in Java.more here........https://github.com/faber03/AndroidMalwareEvaluatingTools
View ArticleContemplating Malware Immunization via Infection Markers
Some malware avoids infecting the system twice by looking for predefined markers. For instance, if a particular process, registry key or mutex object is present on the host, such malicious software...
View ArticleMultiple vulnerabilities in Untangle NGFW 9-11
Multiple issues have been discovered in the Untangle NGFW virtualappliance. The vendor was unresponsive and uncooperative to the researcher.- Persistent XSS leading to rootAuthentication...
View ArticleHow Malware Generates Mutex Names to Evade Detection
Malicious software sometimes uses mutex objects to avoid infecting the system more than once, as well as to coordinate communications among its multiple components on the host. Incident responders can...
View ArticleOpenKM Platform Remote Reflected Cross Site Scripting (PoC)
# Exploit Title: OpenKM Platform Remote Reflected Cross Site Scripting# Google Dork: N/A# Date: 18-11-2014# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)# Vendor Homepage:...
View ArticleBERserk
A Go implementation of the BERserk attack against Mozilla NSS ASN.1 parsing of PKCS#1 RSA signatures with e = 3. Complete of a certificate generation tool, works with CAs in the trust store.more...
View ArticleChrome SOP Bypass with SVG (CVE-2014-3160)
This is a short writeup about my SOP (Same-Origin Policy) bypass with SVG images I've found in Chrome, so that other security researchers can benefit from it. I reported the Chrome vulnerability to...
View ArticleFirst version of working CanBusHacker - low budget Can Bus sniffer/injector...
This is a project to make a real time CAN packet monitoring system using Arduino and CAN BUS shield hardware. This makes a very affordable and reliable CAN packet monitor and injector.more...
View ArticleA Ghost Tale
Back in January, me and other two guys, tested Ghost CMS doing a Web Application PT and a code review.I won't talk here of the whole test, but I'll focus on my findings trying to explain what brings me...
View ArticleExploits
Miscellaneous proof of concept exploit code written at Xiphos Research for testing purposes here.....https://github.com/XiphosResearch/exploits
View ArticleMikroTik RouterOS Admin Password Change CSRF (PoC)
# Exploit Title: MikroTik RouterOS Admin Password Change CSRF# Google Dork: N/A# Date: 23-2-2015# Exploit Author: Mohamed Abdelbaset Elnoby (@SymbianSyMoh)# Vendor Homepage:...
View ArticleVarnish 4.0.3 heap-buffer-overflow while parsing backend server HTTP response
Varnish Cache is a web application accelerator also known as a caching HTTP reverse proxy. You install it in front of any server that speaks HTTP and configure it to cache the contents. Varnish Cache...
View ArticleExploiting the Cloud and Mitigating the Risk of SaaS Supplier Failure
The cloud is here to stay and according to a recent survey [i], organisations are going to be investing more in cloud services to support their core business operations.But have companies properly...
View ArticlePaper: Tighter, faster, simpler side-channel security evaluations beyond...
Abstract. A Eurocrypt 2013 paper “Security evaluations beyond computingpower: How to analyze side-channel attacks you cannot mount?”by Veyrat-Charvillon, G´erard, and Standaert proposed a “Rank...
View ArticleHacking Team Reloaded? US-Based Ethiopian Journalists Again Targeted with...
SummaryOn February 12, 2014, Citizen Lab published a report1 documenting how journalists at the Ethiopian Satellite Television Service (ESAT) were targeted by a governmental attacker in December 2013,...
View ArticleiOS Tutorial – Dumping the Application Memory Part 2
In my previous blog, iOS Tutorial – Dumping the Application Heap from Memory, I covered how to dump sensitive information from the heap of an iOS application using GDB. This time we will be covering...
View Article0 Detection PDF with external link to malware EXE
This morning Malware Domain List tweeted a 0/57 detection malware PDF which was/is not detected as malware by any AV product on VirusTotal.commore...
View ArticlePaper: Enpublic Apps: Security Threats Using iOS Enterprise and Developer...
ABSTRACTCompared with Android, the conventional wisdom is thatiOS is more secure. However, both jailbroken and nonjailbrokeniOS devices have number of vulnerabilities. ForiOS, apps need to interact...
View Article