Search:

Type: Posts; User: prashant_uniyal

Page 1 of 20 1 2 3 4

Search: Search took 0.48 seconds.

  1. Targeted Attack Protection via Network Topology Alteration

    Nice read on changing network topology that can make lateral movement in targeted attacks more difficult
    ...
  2. Smart meters can be hacked to cut power bills

    Smart meters widely used in Spain can be hacked to under-report energy use, security researchers have found. Poorly protected credentials inside the devices could let attackers take control over the...
  3. python socket.recvfrom_into() remote buffer overflow

    Sharing : python socket.recvfrom_into() remote buffer overflow


    #!/usr/bin/env python

    '''
    # Exploit Title: python socket.recvfrom_into() remote buffer overflow
    # Date: 21/02/2014
    # Exploit...
  4. Replies
    2
    Views
    7,420

    May be this new documentation on bypassing EMET...

    May be this new documentation on bypassing EMET help you :)

    http://bromiumlabs.files.wordpress.com/2014/02/bypassing-emet-4-1.pdf
  5. Operation GreedyWonk: Multiple Economic and Foreign Policy Sites Compromised, Serving

    Less than a week after uncovering Operation SnowMan, the FireEye Dynamic Threat Intelligence cloud has identified another targeted attack campaign — this one exploiting a zero-day vulnerability in...
  6. Replies
    0
    Views
    2,510

    HQL for pentesters

    SQL injection is a highly coveted type of attack. Plenty of resources exist to take advantage of an injection on common DBMS (MySQL, Oracle, MS SQL, etc). But, I could not find a resource targeting...
  7. Here are some other links: ...

    Here are some other links:


    http://www.malwaredomainlist.com/mdl.php
    http://www.malwareblacklist.com/showMDL.php
    http://support.clean-mx.de/clean-mx/viruses.php
    http://malc0de.com/database/...
  8. Oldboot: the first bootkit on Android

    A few days ago, we found an Android Trojan using brand new method to modify devices’ boot partition and booting script file to launch system service and extract malicious application during the early...
  9. Replies
    0
    Views
    5,036

    Analysis of the FBI Tor Malware

    The Tor network is an anonymising network that allows people to browse the web and access other services without being traced. As part of this network, there is the so called 'darknet', servers only...
  10. World’s largest botnet of 200,000 infected Android devices discovered

    Virus analysts of the Russian anti-virus company Doctor Web have discovered the world's largest botnet comprised of Android handhelds. To date, over 200,000 smart phones have been infected with...
  11. Sure. A tutorial from you on this will be helpful.

    Sure. A tutorial from you on this will be helpful.
  12. Article: Google Chrome Denial Of Service (DoS)

    You can view the page at http://www.garage4hackers.com/content.php?r=155-Google-Chrome-Denial-Of-Service-(DoS)
  13. Stealing User Certificates with Meterpreter Mimikatz Extension

    Here's a nice read on stealing user certificates with meterpreter mimikatz extension

    Security and Networking - Blog - Stealing User Certificates with Meterpreter Mimikatz*Extension
  14. Replies
    0
    Views
    2,773

    OWASP Top Ten 2013

    OWASP Top Ten for 2013 has been released. Here is the Top Ten list:

    A1 Injection

    A2 Broken Authentication and Session Management

    A3 Cross-Site Scripting (XSS)

    A4 Insecure Direct...
  15. CMS Hacking, A Look Into The ECCouncil Hack

    Yesterday, EC Council was reported to have been compromised by a hacker called “Godzilla”. The site that got hacked was the Academy site of EC Council i.e eccouncilacademy.org

    Read complete...
  16. Introduction to Windows Kernel Security Research

    Article by Tavis Ormandy on Introduction to windows kernel security research

    Tavis Ormandy: Introduction to Windows Kernel Security Research
  17. Stored XSS In Facebook Chat, Check In, Facebook Messenger

    Nir goldshlager from Break Security uncovers some stored XSS on Facebook

    Stored XSS In Facebook Chat, Check In, Facebook Messenger | Break Security
  18. Using xss-protection and blocking/bypassing javascript code

    Using xss-protection and blocking/bypassing javascript code | #XSS #protection #webappsec

    Using xss-protection and blocking/bypassing javascript code
  19. Hackers Using Brute-Force Attacks to Harvest WordPress Sites

    Attacks against WordPress sites began last week, when some Web hosts and security experts reported brute-force attacks against administrative credentials using a combination of “admin” as a user...
  20. Evocam Remote BOF exploit | Mac OS exploitation

    A nice read on exploitation on Mac OS X. Thought of sharing it while I was searching for some study material on Mac exploitation :)

    Evocam Remote Buffer Overflow on OSX
  21. Is the firewall turned on on the other machine? ...

    Is the firewall turned on on the other machine?

    Though I have seen at scenario where you have most favor against you, you need to carry out SE attacks like browser based etc. This video Series on...
  22. Hello, Looks you are into a lot of mess. Since...

    Hello,

    Looks you are into a lot of mess. Since I used ADSL router sometime back, I had easy access on VMs in the host machine using bridge option in the VMware. For using RHOST over a remote IP...
  23. Replies
    0
    Views
    5,160

    Wardrive, Raspberry Pi Style!

    A must read for all wardrive fans out there! :)

    Wardrive, Raspberry Pi Style! - SpiderLabs Anterior
  24. Replies
    0
    Views
    3,059

    Java 0 day found [Exploit code]

    Security expert Kafeine of Malware Don’t Need Coffee website has identified a new 0 day in Java. The vulnerability affects the latest Java 1.7 and it has been found on a website that allegedly...
  25. Replies
    4
    Views
    2,190

    Not getting much of your question. Could you...

    Not getting much of your question. Could you please elaborate more. Like are you talking about injecting payloads or exploit packs on the hacked sites and taking advantage of the vulnerability on...
Results 1 to 25 of 499
Page 1 of 20 1 2 3 4