Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

oledump And XML With Embedded OLE Object

I updated oledump to handle a new type of malicious document: an XML file, not with VBA macros, but with an embedded OLE object that is a VBS file.more...

View Article


Image may be NSFW.
Clik here to view.

AMD Bulldozer Linux ASLR weakness: Reducing entropy by 87.5%

A bug in Linux ASLR implementation which affects some AMD processors has been found. The issue affects to all Linux process even if they are not using shared libraries (statically compiled).The problem...

View Article


Image may be NSFW.
Clik here to view.

apisetschema.dll from windows 10 build 10041

very interesting - api-ms-win-core-debug-minidump was added here.....http://redplait.blogspot.ru/2015/03/apisetschemadll-from-windows-10-build.htmland here...

View Article

Image may be NSFW.
Clik here to view.

Android malware goes Mono (.NET) and Lua!

In December I attended a (really great!) Botconf 2014 conference. During that conference I gave a lightning talk about an interesting Android malware sample that (presumably) used Lua and Mono (hence,...

View Article

Image may be NSFW.
Clik here to view.

March 2015 Slack Security Incident, the Launch of Two Factor Authentication &...

We were recently able to confirm that there was unauthorized access to a Slack database storing user profile information. We have since blocked this unauthorized access and made additional changes to...

View Article


Image may be NSFW.
Clik here to view.

Manage Engine Desktop Central 9 - CVE-2015-2560 - Unauthorised administrative...

Desktop Central is integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.A vulnerability exists in...

View Article

Image may be NSFW.
Clik here to view.

Retro Game Internals: Punch-Out Passwords

The NES game “Mike Tyson’s Punch-Out” uses a password system to allow players to continue from certain points in the game. Each password consists of 10 digits, each of which can be any number from 0 to...

View Article

Image may be NSFW.
Clik here to view.

Tracy - PHP debugger

Tracy library is a useful PHP everyday programmer's helper. It helps you to:quickly detect and correct errorslog errorsdump variablesmeasure the timemore here.......https://github.com/nette/tracy

View Article


Image may be NSFW.
Clik here to view.

Skylines-Debugger

Mod debugging/ reverse engineering tool for Cities: Skylines here.....https://github.com/Skylines-ModTools/Skylines-ModTools

View Article


Image may be NSFW.
Clik here to view.

Safari FILE: scheme security hole

It appears that Safari does not enforce any kind of access restrictions for XMLHTTPRequests on FILE: scheme URLs.  As a result, any HTML file on the local file system that is opened inSafari can read...

View Article

Image may be NSFW.
Clik here to view.

(0DAY) WebDepo -SQL injection / INURL BRASIL

Advisory: SQLi-vulnerabilities in aplication CMS WebDepoAffected aplication web: Aplication CMS WebDepo  (Release date: 28/03/2014)Vendor URL: http://www.webdepot.co.ilVendor Status:...

View Article

Image may be NSFW.
Clik here to view.

Advisory: CVE-2014-9708: Appweb Web Server

Affected software: Appweb Web ServerCVE ID: CVE-2014-9708Description: An HTTP request with a Range header of the form "Range:x=," (ie. with an empty range value) will cause a null pointerdereference,...

View Article

Image may be NSFW.
Clik here to view.

Advisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1

Affected software: GoAhead Web ServerAffected versions: 3.0.0 - 3.4.1 (3.x.x series before 3.4.2)CVE ID: CVE-2014-9707Description: The server incorrectly normalizes HTTP request URIs thatcontain path...

View Article


Image may be NSFW.
Clik here to view.

Why you need to hash reset_token like password

Slack was hacked. Reading the thread on HN I decided to discuss why hashing only passwords is impractical if attackers get read access to your users table or entire database.more...

View Article

Image may be NSFW.
Clik here to view.

Beta Bot Trojan

In this article, I would like to show how an analysis is performed on the Beta Bot trojan to identify its characteristics. The Beta Bot trojan, classified as Troj/Neurevt-A, is a dangerous trojan. This...

View Article


Image may be NSFW.
Clik here to view.

JADX

Dex to Java decompilerCommand line and GUI tools for produce Java source code from Android Dex and Apk filesmore info here.....https://github.com/skylot/jadx

View Article

Image may be NSFW.
Clik here to view.

[ WALKTHROUGH : SYSCAN 2015 BADGE CHALLENGE ]

2days ago, a few of us recently went to SyScan and completed the Badge Challenge that was put together by the SyScan crew.Here...

View Article


Image may be NSFW.
Clik here to view.

UACMe

Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.Access AutoElevation UAC bypass methods from ITW malware combined in UACMe here....https://github.com/hfiref0x/UACME

View Article

Image may be NSFW.
Clik here to view.

Paper: COUN­TER­FEIT OB­JECT-ORI­EN­TED PRO­GRAMMING: ON THE DIF­FI­CUL­TY OF...

Code reuse at­tacks such as re­turn-ori­en­ted pro­gramming (ROP) have be­co­me pre­va­lent tech­ni­ques to ex­ploit me­mo­ry cor­rup­ti­on vul­nerabi­li­ties in soft­ware pro­grams. A va­rie­ty of...

View Article

Image may be NSFW.
Clik here to view.

Paper: CROSS-AR­CHI­TEC­TU­RE BUG SE­ARCH IN BI­NA­RY EXE­CU­TA­BLES

With the ge­ne­ral avail­a­bi­li­ty of clo­sed-sour­ce soft­ware for va­rious CPU ar­chi­tec­tu­res, there is a need to iden­ti­fy se­cu­ri­ty-cri­ti­cal vul­nerabi­li­ties at the bi­na­ry level to...

View Article
Browsing all 8064 articles
Browse latest View live