[CORE-2015-0007] - Schneider Vampset Stack and Heap Buffer Overflow
1. Advisory InformationTitle: Schneider Vampset Stack and Heap Buffer OverflowAdvisory ID: CORE-2015-0007Advisory URL:...
View ArticlePaper: Preventing Use-after-free with Dangling Pointers Nullification
Abstract—Many system components and network applicationsare written in languages that are prone to memory corruptionvulnerabilities. There have been countless cases where simplemistakes by developers...
View Articlemaldrolyzer
Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.) here...https://github.com/maldroid/maldrolyzer
View ArticleSnort 2.9.7.2 now available!
Snort Security Onion Update and Additional Info Here.....http://blog.securityonion.net/2015/03/snort-2972-now-available.html
View ArticleArgon2
Argon2 is a new hash function, which summarizes the state of the art in the design of memory-hard functions. It is a streamlined and simple design. It aims at the highest memory filling rate and...
View ArticleGitHub Status Page After DDoS - All systems reporting at 100%. Attack traffic...
Good work continuously updating users here......https://status.github.com/messages?latest
View ArticleExploiting CVE-2011-2461 on google.com
As a follow up of our Troopers 2015 presentation about CVE-2011-2461 we want to release more details about a real world exploitation scenario targeting Google services.During our large-scale analysis...
View ArticleA timeline of mobile botnets
AbstractThe recent explosion in smartphone usage has not goneunnoticed by malware authors. Indeed, malware authorshave increasingly focused their attention on mobile devices,leading to a steep rise in...
View Article2 Federal Agents in Silk Road Case Face Fraud Charges (I can honestly say I'm...
Two former federal agents are expected to be arrested on Monday on charges of stealing money while working undercover on an investigation into Silk Road, the once-thriving black market website for drug...
View ArticleSign Up at irs.gov Before Crooks Do It For You (Good Advice)
If you’re an American and haven’t yet created an account at irs.gov, you may want to take care of that before tax fraudsters create an account in your name and steal your personal and tax data in the...
View Articlecommix- Automated All-in-One OS Command Injection and Exploitation Tool
Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the...
View ArticleStack overflow in libtasn1
Fromhttps://blog.fuzzing-project.org/6-Stack-overflow-in-libtasn1-TFPA-0022015.htmllibtasn1 is a library to parse ASN.1 data structures. Its mostprominent user is GnuTLS.Fuzzing libtasn1 led to the...
View ArticleSQL Inception: How to select yourself
In this blog post I will describe a few ways to view the whole SQL statement being executed as part of a SQL injection attack. Currently, unless the vulnerable page returns the SQL statement in an...
View ArticleBoston Key Party 2015 'Wood Island' writeup
Originally, I wanted to write up the write-up for the airport challenge, but since Niklas has already done that, I’m doing the Wood Island challenge instead. It was worth 150 points on the Boston Key...
View ArticleZeroBrane Studio
ZeroBrane Studio is a lightweight Lua IDE with code completion, syntax highlighting, live coding, code analyzer, and debugging support for Lua 5.1, Lua 5.2, Lua 5.3, LuaJIT, and other Lua engines.It is...
View ArticleThreat Spotlight: Dyre/Dyreza: An Analysis to Discover the DGA
Banking and sensitive financial information is a highly coveted target for attackers because of the high value and obvious financial implications. In the past year, a large amount of attention has...
View Article0CTF 2015 - mislead (web 300)
We are welcomed with a login page where we can register a new account and log in with it.After logging to the application we received a:Hello pwntester. Try to login as 0ops! The first thing I looked...
View Articlebamfdetect v1.6.3 Nanocore module release
Identifies and extracts information from bots and other malware. Information is returned in a readable json format. bamfdetect works by reading files into RAM, applying any applicable preprocessors,...
View Article0CTF Writeup- RSAQuine
For this challenge we had to find all possible messages that are unconcealed when applying RSA with the given e and n, this means that the ciphertext is equal to the plaintext (these messages are...
View ArticleChina's Man-on-the-Side Attack on GitHub
We have looked closer at this attack, and can conclude that China is using their active and passive network infrastructure in order to perform a man-on-the-side attack against GitHub.more...
View Article