... neuere Einträge
Monday, 11. July 2011
XpertRAT 1.1
Am Monday, 11. Jul 2011 im Topic 'Remote Administration Tool'
XpertRAT (Remote Administration Tool) is software design to control in the best condition and confort possible any kind of Microsoft Windows up windows7
Download:
soon
Download:
soon
WebCalendar - XSS
Am Monday, 11. Jul 2011 im Topic 'Vulnerabilities'
Affected Software: Version 1.2.3 and probably prior versions
Vendor URL: http://www.k5n.us/webcalendar.php
Details
http://www.rul3z.de/advisories/SSCHADV2011-008.txt
by schurtz
Vendor URL: http://www.k5n.us/webcalendar.php
Details
http://www.rul3z.de/advisories/SSCHADV2011-008.txt
by schurtz
viaExtract - Forensic tool for Android devices released
Am Monday, 11. Jul 2011 im Topic 'Android'
Key Features
An easy-to-use interface for data acquisition, analysis and reporting
Searching and sorting acquired data, plus printing to PDF
Pre-configured VM runs on Linux, Windows or Mac
Logical recovery of call logs, contacts, browser history, SMS/MMS and more
Forensically sound, proven technology
Purchase includes 1 year of updates and support, with many planned enhancements coming soon
Download Demo!
https://viaforensics.com/register/?p=viaextract-demo%2Caccess
An easy-to-use interface for data acquisition, analysis and reporting
Searching and sorting acquired data, plus printing to PDF
Pre-configured VM runs on Linux, Windows or Mac
Logical recovery of call logs, contacts, browser history, SMS/MMS and more
Forensically sound, proven technology
Purchase includes 1 year of updates and support, with many planned enhancements coming soon
Download Demo!
https://viaforensics.com/register/?p=viaextract-demo%2Caccess
Android Botnet : Command and Control Channel over SMS
Am Monday, 11. Jul 2011 im Topic 'Android'
Shmoocon 2011 Smartphone Botnets over SMS Demo from Georgia Weidman. Compiling instructions are simple and straight forward. Please follow these:
Compile with arm-gcc with the -static flag set
Copy to anywhere on the underlying OS that is writable (/data/ is good).
Rename /dev/smd0/ to /dev/smd0real/
Start the bot application
Kill the radio application (ps | grep rild)
The radio will automatically respawn and now the bot proxy will be working
More interesting stuff such as the botnet structure, possible infection methods are presented by the author in here slides that can be found here.
PDF
http://www.grmn00bs.com/GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf
Download
http://www.grmn00bs.com/botPoCrelease-android.c
http://vimeo.com/19372118
Compile with arm-gcc with the -static flag set
Copy to anywhere on the underlying OS that is writable (/data/ is good).
Rename /dev/smd0/ to /dev/smd0real/
Start the bot application
Kill the radio application (ps | grep rild)
The radio will automatically respawn and now the bot proxy will be working
More interesting stuff such as the botnet structure, possible infection methods are presented by the author in here slides that can be found here.
http://www.grmn00bs.com/GeorgiaW_Smartphone_Bots_SLIDES_Shmoocon2011.pdf
Download
http://www.grmn00bs.com/botPoCrelease-android.c
http://vimeo.com/19372118
XerXes C/C++ - Linux
Am Monday, 11. Jul 2011 im Topic 'Source Code'
XerXes is one of the most powerful private dos tool
Source Code
http://pastebin.com/eLrQXTnu
Info
http://vimeo.com/17268609
Platform: Linux
Instructions for use: Save that as xerxes.c
then in terminal: gcc xerxes.c -o xerxes
Followed by ./xerxes www.target.com 80
Ensure TOR is running and on the port in the source, feel free to edit that in the source to match your port.
Source Code
http://pastebin.com/eLrQXTnu
Info
http://vimeo.com/17268609
Platform: Linux
Instructions for use: Save that as xerxes.c
then in terminal: gcc xerxes.c -o xerxes
Followed by ./xerxes www.target.com 80
Ensure TOR is running and on the port in the source, feel free to edit that in the source to match your port.
Hackers Family Tree
Am Monday, 11. Jul 2011 im Topic 'News'
Many People are still confused by all the hacking groups that were and ruling the internet now.You must be confused between the connection between Anonymous , LulzSec and AntiSec . Why Team Poison attacked LulzSec and Anonymous. Ahh it is really confusing even i get confuse at times.
http://2.bp.blogspot.com/-UEcnPhuYDHs/ThfD_yoljvI/AAAAAAAAAXs/hIY5qKhVd0w/s640/phpTFPs66PM2.jpg
http://2.bp.blogspot.com/-UEcnPhuYDHs/ThfD_yoljvI/AAAAAAAAAXs/hIY5qKhVd0w/s640/phpTFPs66PM2.jpg
Clickjacking Attacks Unresolved
Am Monday, 11. Jul 2011 im Topic 'Vulnerabilities'
Share with your friends on Facebook Share with your friends on StumbleUpon Share with your friends on Digg Reddit this post Share with your friends on del.icio.us Technorati
Clickjacking attacks were originally described by Robert Hansen and Jeremiah Grossman in 2008. In these attacks, the attacker tricks the user into interacting with a malicious web page, but routes the user’s input to another web page that would result in undesirable consequences. A commonly used technique is to embed the targeted web page with a completely transparent IFRAME and lure the user to click on it unintentionally. There are plenty of known variants demonstrated by researchers, with or without JavaScript.
read full article
https://docs.google.com/document/pub?id=1hVcxPeCidZrM5acFH9ZoTYzg1D0VjkG3BDW_oUdn5qc
Clickjacking attacks were originally described by Robert Hansen and Jeremiah Grossman in 2008. In these attacks, the attacker tricks the user into interacting with a malicious web page, but routes the user’s input to another web page that would result in undesirable consequences. A commonly used technique is to embed the targeted web page with a completely transparent IFRAME and lure the user to click on it unintentionally. There are plenty of known variants demonstrated by researchers, with or without JavaScript.
read full article
https://docs.google.com/document/pub?id=1hVcxPeCidZrM5acFH9ZoTYzg1D0VjkG3BDW_oUdn5qc
... ältere Einträge