TLS Prober
TLS Prober is a tool for identifying the implementation in use by SSL/TLS servers. It analyses the behaviour of a server by sending a range of probes then comparing the responses with a database of...
View ArticleExploiting Samba CVE-2015-0240 on Ubuntu 12.04 and Debian 7 32-bit
It was found that Ubuntu 12.04 32-bit and Debian 7 Samba binaries contained a stack layout that was suitable for exploiting the recent _netr_ServerPasswordSet bug. I was able to develop a reliable...
View ArticleSimple source code level tricks that will make reverse engineering harder
Many people rely only on virtualization software when protecting their binaries which is often very bad. There's plenty of information on existing VM protections on popular reversing sites, some even...
View ArticlePaper: Eclipse Attacks on Bitcoin’s Peer-to-Peer Network
AbstractWe present eclipse attacks on bitcoin’s peer-to-peer network.Our attack allows an adversary controlling a suffi-cient number of IP addresses to monopolize all connectionsto and from a victim...
View ArticleAndroid Installer Hijacking Vulnerability Could Expose Android Users to Malware
We discovered a widespread vulnerability in Google’s Android OS we are calling “Android Installer Hijacking,” estimated to impact 49.5 percent of all current Android users. In detail:Android Installer...
View ArticleVulnerability Patching: Learning from AVG on Doing it Right
As part of our research, we analyze the intricate relationship between Anti-Virus and Operating Systems (OS). During this process, we came across a vulnerability in AVG Internet Security 2015 build...
View Article100 Days of Malware
It's now been a little over 100 days since I started running malware samples in PANDA and making the executions publicly available. In that time, we've analyzed 10,794 pieces of malware, which...
View ArticleShadow Daemon
Shadow Daemon is a collection of tools to detect, protocol and prevent attacks on web applications. Technically speaking, Shadow Daemon is a web application firewall that intercepts requests and...
View Articleusbguard
The usbguard software framework helps to protect your computer against rogue USB devices by implementing basic whitelisting/blacklisting capabilities based on USB device attributes.more...
View ArticleIETF92: BGPdump2 presented at IEPG by Yasuhiro Ohara
At the IEPG session at IETF92, Dallas, Yasuhiro Ohara from NTT showed his BGP tool bgpdump2. This is a really sweet package which can be used to compare BGP RIB dumps.Its using a unix ‘diff’ format...
View ArticleLive-Armor
This repository contains the Live-Armor Guide, a guide to building custom Linux live images for security sandboxing using tools from the Debian Live Systems project and Grsecurity.more...
View ArticleDeobfuscation: Test O-LLVM protected code with simplification passes.
Roughly 5 years ago during researches in Taganrog Federal University we opened a discussion, what is the easiest way to protect program against heuristic analysis? The answer was easy, compile it with...
View ArticleHow Miscreants Hide From Browser Forensics
Scammers, intruders and other miscreants often aim to conceal their actions from forensic investigators.When analyzing an IT support scam, I interacted with the person posing as the help desk...
View ArticleHow I Cracked Trivia Crack
Trivia Crack is a highly popular game for both web and mobile platforms which is somewhat modeled after Trivial Pursuit. It’s the latest craze in social gaming, allowing users to compete against their...
View ArticleLearn How to Hack an App Video Series
Learn how mobile apps are getting attacked and what you can do about it. Jonathan Carter from Arxan shows real life examples of tools and approaches readily available in the market to hack into a...
View Articlenginx-1.7.11 mailine version release
Includes experimental thread pools support, proxy_request_buffering and other features here........http://nginx.org/
View ArticleHanjuan EK’s ‘March Madness’ malvertising campaign
The lesser known and stealthy Hanjuan Exploit Kit, which for almost two months was using a Flash Player zero-day (CVE-2015-0313) to infect unsuspecting users, has been quite active again during the...
View ArticleCryptol (The Language of Cryptography) version 2.2.0 release
The Cryptol specification language was designed by Galois for the NSA's Trusted Systems Research Group as a public standard for specifying cryptographic algorithms. A Cryptol reference specification...
View ArticleFormer Tesla Intern Releases $60 Full Open Source Car Hacking Kit For The Masses
Eric Evenchick knows what it’s like to be at the mercy of modes of transport. That might be why the former Tesla intern is so keen to hack his way to gaining greater control over the vehicles he...
View ArticleSurgeon with a Shotgun! – Memory Forensics
With the ever-increasing need for speed and accuracy for digital investigations and incident response, it is imperative that organizations are able to provide answers quickly. These organizations rely...
View Article