Saturday, 5. November 2011
How to use latest exploits from milw0rm


by
br194nt3

Permalink

 


Duqu Analysis Detection Tool
NSS engineers have developed a scanning tool that can be used to detect all DuQu drivers installed on a system. This tool was developed in the hopes that additional drivers can be discovered to allow us to learn more about the functionality, capabilities and ultimate purpose of DuQu.

Download
https://github.com/halsten/Duqu-detectors

Permalink

 


Friday, 4. November 2011
AOL Energy - XSS
A non-persistent Cross Site Scripting (XSS) vulnerability discovered on AOL Energy website.

xploit url:

http://energy.aol.com/search/?q=%22%3E%3Cscript%3Ealert(%22XSS+by+Vansh+%26+Vaibhuv%22)%3C%2Fscript%3E

by
Vansh & Vaibhuv

Permalink

 


Thursday, 3. November 2011
Secunia Online Software Inspector
Online Software Inspector – OSI, is a fast way to scan your PC for the most common programs and vulnerabilities, thus checking if your PC has a minimum security baseline against known patched vulnerabilities.

Source
http://secunia.com/vulnerability_scanning/online/

Download
ftp://ftp.secunia.com/PSI3BetaSetup.exe

Permalink

 


The Hacker Magazine - Anniversary Edition - November Issue 06
Download PDF
http://theevilhackerz.com/THN-nov2011.pdf

Permalink

 


Wednesday, 2. November 2011
Exploiting P2P Communications
This paper, shows how to exploit real-time communication applications to determine the IP address of a targeted user.
This paper focuses on Skype, although other real-time communication applications may have similar privacy issues. The paper presenter designed a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT! By calling the user periodically, they were then able to observe the mobility of the user.

Download PDF
http://arxiv.org/PS_cache/arxiv/pdf/1109/1109.4039v3.pdf

Permalink

 


Android Reverse Engineering (A.R.E) - Android
The Honeynet Project release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.

Download
http://redmine.honeynet.org/projects/are/wiki

Permalink

 


Monday, 31. October 2011
Steganos Privacy Suite 12 - Free
Visit below promo page of steganos.

http://www.steganos.com/de/magazines/covermount/?tx_steganoscovermounts_pi1[mag]=computerbild&tx_steganoscovermounts_pi1[productid]=sss12//

Enter your email address and press ‘Abschicken’ . You will receive serial number in mail
Enter the serial number you received in mail and activate Steganos Privacy Suite 12.

Permalink

 


Volatility 2.0
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.

Download
https://www.volatilesystems.com/default/volatility

Guide
http://code.google.com/p/volatility/wiki/FullInstallation

Permalink