... neuere Einträge
Saturday, 5. November 2011
How to use latest exploits from milw0rm
Am Saturday, 5. Nov 2011 im Topic 'Tutorials'
by
br194nt3
Duqu Analysis Detection Tool
Am Saturday, 5. Nov 2011 im Topic 'Malware Search'
NSS engineers have developed a scanning tool that can be used to detect all DuQu drivers installed on a system. This tool was developed in the hopes that additional drivers can be discovered to allow us to learn more about the functionality, capabilities and ultimate purpose of DuQu.
Download
https://github.com/halsten/Duqu-detectors
Download
https://github.com/halsten/Duqu-detectors
Friday, 4. November 2011
AOL Energy - XSS
Am Friday, 4. Nov 2011 im Topic 'Vulnerabilities'
A non-persistent Cross Site Scripting (XSS) vulnerability discovered on AOL Energy website.
xploit url:
http://energy.aol.com/search/?q=%22%3E%3Cscript%3Ealert(%22XSS+by+Vansh+%26+Vaibhuv%22)%3C%2Fscript%3E
by
Vansh & Vaibhuv
xploit url:
http://energy.aol.com/search/?q=%22%3E%3Cscript%3Ealert(%22XSS+by+Vansh+%26+Vaibhuv%22)%3C%2Fscript%3E
by
Vansh & Vaibhuv
Thursday, 3. November 2011
Secunia Online Software Inspector
Am Thursday, 3. Nov 2011 im Topic 'Pentest'
Online Software Inspector – OSI, is a fast way to scan your PC for the most common programs and vulnerabilities, thus checking if your PC has a minimum security baseline against known patched vulnerabilities.
Source
http://secunia.com/vulnerability_scanning/online/
Download
ftp://ftp.secunia.com/PSI3BetaSetup.exe
Source
http://secunia.com/vulnerability_scanning/online/
Download
ftp://ftp.secunia.com/PSI3BetaSetup.exe
The Hacker Magazine - Anniversary Edition - November Issue 06
Am Thursday, 3. Nov 2011 im Topic 'Books change the World'
Download PDF
http://theevilhackerz.com/THN-nov2011.pdf
http://theevilhackerz.com/THN-nov2011.pdf
Wednesday, 2. November 2011
Exploiting P2P Communications
Am Wednesday, 2. Nov 2011 im Topic 'News'
This paper, shows how to exploit real-time communication applications to determine the IP address of a targeted user.
This paper focuses on Skype, although other real-time communication applications may have similar privacy issues. The paper presenter designed a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT! By calling the user periodically, they were then able to observe the mobility of the user.
Download PDF
http://arxiv.org/PS_cache/arxiv/pdf/1109/1109.4039v3.pdf
This paper focuses on Skype, although other real-time communication applications may have similar privacy issues. The paper presenter designed a scheme that calls an identified targeted user inconspicuously to find his IP address, which can be done even if he is behind a NAT! By calling the user periodically, they were then able to observe the mobility of the user.
Download PDF
http://arxiv.org/PS_cache/arxiv/pdf/1109/1109.4039v3.pdf
Android Reverse Engineering (A.R.E) - Android
Am Wednesday, 2. Nov 2011 im Topic 'Android'
The Honeynet Project release of the Android Reverse Engineering (A.R.E.) Virtual Machine. Do you need to analyze a piece of Android malware, but dont have all your analysis tools at hand? The Android Reverse Engineering (A.R.E.) Virtual Machine, put together by Anthony Desnos from our French chapter, is here to help. A.R.E. combines the latest Android malware analysis tools in a readily accessible toolbox.
Download
http://redmine.honeynet.org/projects/are/wiki
Download
http://redmine.honeynet.org/projects/are/wiki
Monday, 31. October 2011
Steganos Privacy Suite 12 - Free
Am Monday, 31. Oct 2011 im Topic 'News'
Visit below promo page of steganos.
http://www.steganos.com/de/magazines/covermount/?tx_steganoscovermounts_pi1[mag]=computerbild&tx_steganoscovermounts_pi1[productid]=sss12//
Enter your email address and press ‘Abschicken’ . You will receive serial number in mail
Enter the serial number you received in mail and activate Steganos Privacy Suite 12.
http://www.steganos.com/de/magazines/covermount/?tx_steganoscovermounts_pi1[mag]=computerbild&tx_steganoscovermounts_pi1[productid]=sss12//
Enter your email address and press ‘Abschicken’ . You will receive serial number in mail
Enter the serial number you received in mail and activate Steganos Privacy Suite 12.
Volatility 2.0
Am Monday, 31. Oct 2011 im Topic 'Computer Forensics'
The Volatility Framework is a completely open collection of tools, implemented in Python under the GNU General Public License, for the extraction of digital artifacts from volatile memory (RAM) samples. The extraction techniques are performed completely independent of the system being investigated but offer unprecedented visibilty into the runtime state of the system. The framework is intended to introduce people to the techniques and complexities associated with extracting digital artifacts from volatile memory samples and provide a platform for further work into this exciting area of research.
Download
https://www.volatilesystems.com/default/volatility
Guide
http://code.google.com/p/volatility/wiki/FullInstallation
Download
https://www.volatilesystems.com/default/volatility
Guide
http://code.google.com/p/volatility/wiki/FullInstallation
... ältere Einträge