oledump And XML With Embedded OLE Object
I updated oledump to handle a new type of malicious document: an XML file, not with VBA macros, but with an embedded OLE object that is a VBS file.more...
View ArticleAMD Bulldozer Linux ASLR weakness: Reducing entropy by 87.5%
A bug in Linux ASLR implementation which affects some AMD processors has been found. The issue affects to all Linux process even if they are not using shared libraries (statically compiled).The problem...
View Articleapisetschema.dll from windows 10 build 10041
very interesting - api-ms-win-core-debug-minidump was added here.....http://redplait.blogspot.ru/2015/03/apisetschemadll-from-windows-10-build.htmland here...
View ArticleAndroid malware goes Mono (.NET) and Lua!
In December I attended a (really great!) Botconf 2014 conference. During that conference I gave a lightning talk about an interesting Android malware sample that (presumably) used Lua and Mono (hence,...
View ArticleMarch 2015 Slack Security Incident, the Launch of Two Factor Authentication &...
We were recently able to confirm that there was unauthorized access to a Slack database storing user profile information. We have since blocked this unauthorized access and made additional changes to...
View ArticleManage Engine Desktop Central 9 - CVE-2015-2560 - Unauthorised administrative...
Desktop Central is integrated desktop and mobile device management software that helps in managing servers, laptops, desktops, smartphones, and tablets from a central location.A vulnerability exists in...
View ArticleRetro Game Internals: Punch-Out Passwords
The NES game “Mike Tyson’s Punch-Out” uses a password system to allow players to continue from certain points in the game. Each password consists of 10 digits, each of which can be any number from 0 to...
View ArticleTracy - PHP debugger
Tracy library is a useful PHP everyday programmer's helper. It helps you to:quickly detect and correct errorslog errorsdump variablesmeasure the timemore here.......https://github.com/nette/tracy
View ArticleSkylines-Debugger
Mod debugging/ reverse engineering tool for Cities: Skylines here.....https://github.com/Skylines-ModTools/Skylines-ModTools
View ArticleSafari FILE: scheme security hole
It appears that Safari does not enforce any kind of access restrictions for XMLHTTPRequests on FILE: scheme URLs. As a result, any HTML file on the local file system that is opened inSafari can read...
View Article(0DAY) WebDepo -SQL injection / INURL BRASIL
Advisory: SQLi-vulnerabilities in aplication CMS WebDepoAffected aplication web: Aplication CMS WebDepo (Release date: 28/03/2014)Vendor URL: http://www.webdepot.co.ilVendor Status:...
View ArticleAdvisory: CVE-2014-9708: Appweb Web Server
Affected software: Appweb Web ServerCVE ID: CVE-2014-9708Description: An HTTP request with a Range header of the form "Range:x=," (ie. with an empty range value) will cause a null pointerdereference,...
View ArticleAdvisory: CVE-2014-9707: GoAhead Web Server 3.0.0 - 3.4.1
Affected software: GoAhead Web ServerAffected versions: 3.0.0 - 3.4.1 (3.x.x series before 3.4.2)CVE ID: CVE-2014-9707Description: The server incorrectly normalizes HTTP request URIs thatcontain path...
View ArticleWhy you need to hash reset_token like password
Slack was hacked. Reading the thread on HN I decided to discuss why hashing only passwords is impractical if attackers get read access to your users table or entire database.more...
View ArticleBeta Bot Trojan
In this article, I would like to show how an analysis is performed on the Beta Bot trojan to identify its characteristics. The Beta Bot trojan, classified as Troj/Neurevt-A, is a dangerous trojan. This...
View ArticleJADX
Dex to Java decompilerCommand line and GUI tools for produce Java source code from Android Dex and Apk filesmore info here.....https://github.com/skylot/jadx
View Article[ WALKTHROUGH : SYSCAN 2015 BADGE CHALLENGE ]
2days ago, a few of us recently went to SyScan and completed the Badge Challenge that was put together by the SyScan crew.Here...
View ArticleUACMe
Defeating Windows User Account Control by abusing built-in Windows AutoElevate backdoor.Access AutoElevation UAC bypass methods from ITW malware combined in UACMe here....https://github.com/hfiref0x/UACME
View ArticlePaper: COUNTERFEIT OBJECT-ORIENTED PROGRAMMING: ON THE DIFFICULTY OF...
Code reuse attacks such as return-oriented programming (ROP) have become prevalent techniques to exploit memory corruption vulnerabilities in software programs. A variety of...
View ArticlePaper: CROSS-ARCHITECTURE BUG SEARCH IN BINARY EXECUTABLES
With the general availability of closed-source software for various CPU architectures, there is a need to identify security-critical vulnerabilities at the binary level to...
View Article