Quantcast
Channel: BOT24
Browsing all 8064 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

[CORE-2015-0007] - Schneider Vampset Stack and Heap Buffer Overflow

1. Advisory InformationTitle: Schneider Vampset Stack and Heap Buffer OverflowAdvisory ID: CORE-2015-0007Advisory URL:...

View Article


Image may be NSFW.
Clik here to view.

Paper: Preventing Use-after-free with Dangling Pointers Nullification

Abstract—Many system components and network applicationsare written in languages that are prone to memory corruptionvulnerabilities. There have been countless cases where simplemistakes by developers...

View Article


Image may be NSFW.
Clik here to view.

maldrolyzer

Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.) here...https://github.com/maldroid/maldrolyzer

View Article

Image may be NSFW.
Clik here to view.

Snort 2.9.7.2 now available!

Snort Security Onion Update and Additional Info Here.....http://blog.securityonion.net/2015/03/snort-2972-now-available.html

View Article

Image may be NSFW.
Clik here to view.

Argon2

Argon2 is a new hash function, which summarizes the state of the art in the design of memory-hard functions. It is a streamlined and simple design. It aims at the highest memory filling rate and...

View Article


Image may be NSFW.
Clik here to view.

GitHub Status Page After DDoS - All systems reporting at 100%. Attack traffic...

Good work continuously updating users here......https://status.github.com/messages?latest

View Article

Image may be NSFW.
Clik here to view.

Exploiting CVE-2011-2461 on google.com

As a follow up of our Troopers 2015 presentation about CVE-2011-2461 we want to release more details about a real world exploitation scenario targeting Google services.During our large-scale analysis...

View Article

Image may be NSFW.
Clik here to view.

A timeline of mobile botnets

AbstractThe recent explosion in smartphone usage has not goneunnoticed by malware authors. Indeed, malware authorshave increasingly focused their attention on mobile devices,leading to a steep rise in...

View Article


Image may be NSFW.
Clik here to view.

2 Federal Agents in Silk Road Case Face Fraud Charges (I can honestly say I'm...

Two former federal agents are expected to be arrested on Monday on charges of stealing money while working undercover on an investigation into Silk Road, the once-thriving black market website for drug...

View Article


Image may be NSFW.
Clik here to view.

Sign Up at irs.gov Before Crooks Do It For You (Good Advice)

If you’re an American and haven’t yet created an account at irs.gov, you may want to take care of that before tax fraudsters create an account in your name and steal your personal and tax data in the...

View Article

Image may be NSFW.
Clik here to view.

commix- Automated All-in-One OS Command Injection and Exploitation Tool

Commix (short for [comm]and [i]njection e[x]ploiter) has a simple environment and it can be used, from web developers, penetration testers or even security researchers to test web applications with the...

View Article

Image may be NSFW.
Clik here to view.

Stack overflow in libtasn1

Fromhttps://blog.fuzzing-project.org/6-Stack-overflow-in-libtasn1-TFPA-0022015.htmllibtasn1 is a library to parse ASN.1 data structures. Its mostprominent user is GnuTLS.Fuzzing libtasn1 led to the...

View Article

Image may be NSFW.
Clik here to view.

SQL Inception: How to select yourself

In this blog post I will describe a few ways to view the whole SQL statement being executed as part of a SQL injection attack. Currently, unless the vulnerable page returns the SQL statement in an...

View Article


Image may be NSFW.
Clik here to view.

Boston Key Party 2015 'Wood Island' writeup

Originally, I wanted to write up the write-up for the airport challenge, but since Niklas has already done that, I’m doing the Wood Island challenge instead. It was worth 150 points on the Boston Key...

View Article

Image may be NSFW.
Clik here to view.

ZeroBrane Studio

ZeroBrane Studio is a lightweight Lua IDE with code completion, syntax highlighting, live coding, code analyzer, and debugging support for Lua 5.1, Lua 5.2, Lua 5.3, LuaJIT, and other Lua engines.It is...

View Article


Image may be NSFW.
Clik here to view.

Threat Spotlight: Dyre/Dyreza: An Analysis to Discover the DGA

Banking and sensitive financial information is a highly coveted target for attackers because of the high value and obvious financial implications.  In the past year, a large amount of attention has...

View Article

Image may be NSFW.
Clik here to view.

0CTF 2015 - mislead (web 300)

We are welcomed with a login page where we can register a new account and log in with it.After logging to the application we received a:Hello pwntester. Try to login as 0ops! The first thing I looked...

View Article


Image may be NSFW.
Clik here to view.

bamfdetect v1.6.3 Nanocore module release

Identifies and extracts information from bots and other malware. Information is returned in a readable json format. bamfdetect works by reading files into RAM, applying any applicable preprocessors,...

View Article

Image may be NSFW.
Clik here to view.

0CTF Writeup- RSAQuine

For this challenge we had to find all possible messages that are unconcealed when applying RSA with the given e and n, this means that the ciphertext is equal to the plaintext (these messages are...

View Article

Image may be NSFW.
Clik here to view.

China's Man-on-the-Side Attack on GitHub

We have looked closer at this attack, and can conclude that China is using their active and passive network infrastructure in order to perform a man-on-the-side attack against GitHub.more...

View Article
Browsing all 8064 articles
Browse latest View live