Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

TLS Prober

TLS Prober is a tool for identifying the implementation in use by SSL/TLS servers. It analyses the behaviour of a server by sending a range of probes then comparing the responses with a database of...

View Article


Image may be NSFW.
Clik here to view.

Exploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit

It was found that Ubuntu 12.04 32-bit and Debian 7 Samba binaries contained a stack layout that was suitable for exploiting the recent _netr_ServerPasswordSet bug. I was able to develop a reliable...

View Article


Image may be NSFW.
Clik here to view.

Simple source code level tricks that will make reverse engineering harder

Many people rely only on virtualization software when protecting their binaries which is often very bad. There's plenty of information on existing VM protections on popular reversing sites, some even...

View Article

Image may be NSFW.
Clik here to view.

Paper: Eclipse Attacks on Bitcoin’s Peer-to-Peer Network

AbstractWe present eclipse attacks on bitcoin’s peer-to-peer network.Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connectionsto and from a victim...

View Article

Image may be NSFW.
Clik here to view.

Android Installer Hijacking Vulnerability Could Expose Android Users to Malware

We discovered a widespread vulnerability in Google’s Android OS we are calling “Android Installer Hijacking,” estimated to impact 49.5 percent of all current Android users. In detail:Android Installer...

View Article


Image may be NSFW.
Clik here to view.

Vulnerability Patching: Learning from AVG on Doing it Right

As part of our research, we analyze the intricate relationship between Anti-Virus and Operating Systems (OS). During this process, we came across a vulnerability in AVG Internet Security 2015 build...

View Article

Image may be NSFW.
Clik here to view.

100 Days of Malware

It's now been a little over 100 days since I started running malware samples in PANDA and making the executions publicly available. In that time, we've analyzed 10,794 pieces of malware, which...

View Article

Image may be NSFW.
Clik here to view.

Shadow Daemon

Shadow Daemon is a collection of tools to detect, protocol and prevent attacks on web applications. Technically speaking, Shadow Daemon is a web application firewall that intercepts requests and...

View Article


Image may be NSFW.
Clik here to view.

usbguard

The usbguard software framework helps to protect your computer against rogue USB devices by implementing basic whitelisting/blacklisting capabilities based on USB device attributes.more...

View Article


Image may be NSFW.
Clik here to view.

IETF92: BGPdump2 presented at IEPG by Yasuhiro Ohara

At the IEPG session at IETF92, Dallas, Yasuhiro Ohara from NTT showed his BGP tool bgpdump2. This is a really sweet package which can be used to compare BGP RIB dumps.Its using a unix ‘diff’ format...

View Article

Image may be NSFW.
Clik here to view.

Live-Armor

This repository contains the Live-Armor Guide, a guide to building custom Linux live images for security sandboxing using tools from the Debian Live Systems project and Grsecurity.more...

View Article

Image may be NSFW.
Clik here to view.

Deobfuscation: Test O-LLVM protected code with simplification passes.

Roughly 5 years ago during researches in Taganrog Federal University we opened a discussion, what is the easiest way to protect program against heuristic analysis? The answer was easy, compile it with...

View Article

Image may be NSFW.
Clik here to view.

How Miscreants Hide From Browser Forensics

Scammers, intruders and other miscreants often aim to conceal their actions from forensic investigators.When analyzing an IT support scam, I interacted with the person posing as the help desk...

View Article


Image may be NSFW.
Clik here to view.

How I Cracked Trivia Crack

Trivia Crack is a highly popular game for both web and mobile platforms which is somewhat modeled after Trivial Pursuit. It’s the latest craze in social gaming, allowing users to compete against their...

View Article

Image may be NSFW.
Clik here to view.

Learn How to Hack an App Video Series

Learn how mobile apps are getting attacked and what you can do about it. Jonathan Carter from Arxan shows real life examples of tools and approaches readily available in the market to hack into a...

View Article


Image may be NSFW.
Clik here to view.

nginx-1.7.11 mailine version release

Includes experimental thread pools support, proxy_request_buffering and other features here........http://nginx.org/

View Article

Image may be NSFW.
Clik here to view.

Hanjuan EK’s ‘March Madness’ malvertising campaign

The lesser known and stealthy Hanjuan Exploit Kit, which for almost two months was using a Flash Player zero-day (CVE-2015-0313) to infect unsuspecting users, has been quite active again during the...

View Article


Image may be NSFW.
Clik here to view.

Cryptol (The Language of Cryptography) version 2.2.0 release

The Cryptol specification language was designed by Galois for the NSA's Trusted Systems Research Group as a public standard for specifying cryptographic algorithms. A Cryptol reference specification...

View Article

Image may be NSFW.
Clik here to view.

Former Tesla Intern Releases $60 Full Open Source Car Hacking Kit For The Masses

Eric Evenchick knows what it’s like to be at the mercy of modes of transport. That might be why the former Tesla intern is so keen to hack his way to gaining greater control over the vehicles he...

View Article

Image may be NSFW.
Clik here to view.

Surgeon with a Shotgun! – Memory Forensics

With the ever-increasing need for speed and accuracy for digital investigations and incident response, it is imperative that organizations are able to provide answers quickly. These organizations rely...

View Article
Browsing all 8064 articles
Browse latest View live