Google+ Badge

mercoledì 6 novembre 2013

Ethscan: Volatility Memory Forensics Framework :plugin for Recovering Ethernet Frames from Memory..

 Ethscan: volatility memory forensics framework plugin for recovering Ethernet frames from memory.

Full Disclosure: [Security-news] SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass

Full Disclosure: [Security-news] SA-CONTRIB-2013-089 - Node Access Keys - Access Bypass

Blackhat SEO and ASP Sites

Blackhat SEO and ASP Sites |

Analysis Of iOS Notes App | Forensic Focus - Articles

Analysis Of iOS Notes App | Forensic Focus - Articles

Bitcoin Forensics :A Journey into the Dark Web | Forensic Focus - Articles

Bitcoin Forensics :A Journey into the Dark Web | Forensic Focus - Articles

My experiences with Django and Python 3

My experiences with Django and Python 3

How HTTPS Secures Connections: What Every Web Dev Should Know

How HTTPS Secures Connections: What Every Web Dev Should Know

Dynamic Subdomains with OpenVPN and PyTinyDNS

Dynamic Subdomains with OpenVPN and PyTinyDNS

Shiz: Mutant RAT spotted gnawing at SAP apps • The Register

It's the Shiz: Mutant RAT spotted gnawing at SAP apps • The Register

martedì 5 novembre 2013

CVE-2013-6021 – Stack Based Buffer Overflow Exploit | Fun Over IP

CVE-2013-6021 – Stack Based Buffer Overflow Exploit | Fun Over IP

IT Best Practices: The Polarity of Security and Privacy

IT Best Practices: The Polarity of Security and Privacy Media

Joomla – Fancy SPAM Injections | Sucuri Blog

Joomla – Fancy SPAM Injections | Sucuri Blog

Google Bots Doing SQL Injection Attacks

Google Bots Doing SQL Injection Attacks 

CryptHook: Secure TCP/UDP Connection Wrapper

ChokePoint: September 2013

UPnP/ The Router Review: From Nmap to Firmware ..

UPnP | codeinsecurity

Preparing for Recovery: Four Strategies for Disaster Proofing Data | Data Center Knowledge

Preparing for Recovery: Four Strategies for Disaster Proofing Data | Data Center Knowledge

Remote code execution vulnerability in the SSH key upload /GitLab- Intelligent Exploit

Remote code execution vulnerability in the SSH key upload /- Intelligent Exploit

Enigmatis CMS XSS/SQLInjection Vulnerability

Enigmatis CMS XSS/SQLInjection Vulnerability 

Jamaal Speights - devblog: Ethscan: volatility memory forensics framework plugin for recovering Ethernet frames from memory.

Jamaal Speights - devblog: Ethscan: volatility memory forensics framework plugin for recovering Ethernet frames from memory.

Bounty Evolution: $100,000 for New Mitigation Bypass Techniques Wanted Dead or Alive

Bounty Evolution: $100,000 for New Mitigation Bypass Techniques Wanted Dead or Alive 

Software Defense: mitigating heap corruption vulnerabilities

Software Defense: mitigating heap corruption vulnerabilities 

sabato 2 novembre 2013

Proof. Cool & Free Tools / by Christos Beretas

Christos Beretas  Professional Web Site

Proof. Cool & Free Tools / by Christos Beretas

Christos Beretas  Professional Web Site

How to Erase Yourself From the Internet

How to Erase Yourself From the Internet

Critical Intel: Three Steps to Preventing USB Data Breaches

Critical Intel: Three Steps to Preventing USB Data Breaches 

Top 10 Wireshark Filters

Top 10 Wireshark Filters 

IGHASHGPU-SHA1/MD5/MD4 Bruteforcer for ATI & nVidia GPUs

SHA1/MD5/MD4 bruteforcer for ATI and nVidia GPUs

New Mac malware opens secure reverse shell | MacFixIt

New Mac malware opens secure reverse shell 

Malware Analysis with Dynamic Sandboxing

Malware Analysis with Dynamic Sandboxing

A Malware Classification

A Malware Classification -Kaspersky Daily | 

The badBIOS Analysis Is Wrong. at RootWyrm's Corner

The badBIOS Analysis Is Wrong. at RootWyrm's Corner

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Ethical Hacking and security tips

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Ethical Hacking and security tips

venerdì 1 novembre 2013

The danger of cybersecurity 'ghettos'

The danger of cybersecurity 'ghettos' 

The Clean Theory | Symantec Connect Community

The Clean Theory | Symantec Connect Community

PCI Security Standards Council's Validated Point-To-Point Encryption

PCI Security Standards Council's Validated Point-To-Point Encryption

Resources for Aspiring Penetration Testers - NetSPI Blog

Resources for Aspiring Penetration Testers - NetSPI Blog

Network Intelligence Gathering - InfoSec Institute

Network Intelligence Gathering - InfoSec Institute

ImpressPages CMS v3.6 Remote Arbitrary File Deletion Vulnerability

ImpressPages CMS v3.6 Remote Arbitrary File Deletion Vulnerability 

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps |

Running Hyper-V Inside of VMWare Fusion

Running Hyper-V Inside of VMWare Fusion

Security Strategies Against Hacking Attacks

Security Strategies Against Hacking Attacks 

Hacking a Reporter: Writing Malware For Fun and Profit (Part 1 of 3) - SpiderLabs Anterior

Hacking a Reporter: Writing Malware For Fun and Profit (Part 1 of 3) - SpiderLabs Anterior

Me, You and the EU Cyber Security Directive | The State of Security

Me, You and the EU Cyber Security Directive | The State of Security

Errata Security: #badBIOS features explained

Errata Security: #badBIOS features explained

giovedì 31 ottobre 2013

SCADA Systems: Myths, Inaccuracies and Chaos Surrounding Our Critical Infrastructure

 SCADA Systems: Myths, Inaccuracies and Chaos Surrounding Our Critical Infrastructure

The Dark Side of Technology

The Dark Side of Technology

Blackhole, Supreme No More - F-Secure Weblog :

Blackhole, Supreme No More - F-Secure Weblog 

Cisco IPsec VPN breakage on Windows 8[.1] and OS X 10.9

Cisco IPsec VPN breakage on Windows 8[.1] and OS X 10.9

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

5 Common Windows Hardening Misconfigurations

5 Common Windows Hardening Misconfigurations

Verifying Windows Kernel Vulnerabilities

Verifying Windows Kernel Vulnerabilities 

5 Steps to Turn Your PC into an Impenetrable Fortress.

5 Steps to Turn Your PC into an Impenetrable Fortress.

mercoledì 30 ottobre 2013

Cryptolocker Ransomware: What You Need To Know

Cryptolocker Ransomware: What You Need To Know 

PHP Hack Redirects To Magnitude Exploit Kit

PHP Hack Redirects To Magnitude Exploit Kit 

NIST updating Smart Grid Cybersecurity Guidelines

NIST updating Smart Grid Cybersecurity Guidelines 

sup MUA Command Injection

sup MUA Command Injection 

WordPress Curvo Shell Upload

WordPress Curvo Shell Upload 

sup Remote Command Execution

sup Remote Command Execution 

Google Play Billing Bypass

Google Play Billing Bypass 

Olat CMS 7.8.0.1 Cross Site Scripting

Olat CMS 7.8.0.1 Cross Site Scripting 

ProcessMaker Open Source Authenticated PHP Code Execution

ProcessMaker Open Source Authenticated PHP Code Execution 

martedì 29 ottobre 2013

The Ultimate Command Cheat Sheet for Metasploit's Meterpreter, Part 1

The Ultimate Command Cheat Sheet for Metasploit's Meterpreter, Part 1 «

Create Hidden Reverse Shell -by reusing an Open Port

Create hidden reverse shell by reusing an open port 

Command-line Forensics of hacked PHP.net

Command-line Forensics of hacked PHP.net 

Infection Rates and End of Support for Windows XP

Infection rates and end of support for Windows XP -

How to set up Web-based Network Traffic Monitoring System on Linux

 How to set up web-based network traffic monitoring system on Linux

Apache / PHP 5.x Remote Code Execution Exploit

Apache / PHP 5.x Remote Code Execution Exploit

Cannot Patch? Compensate, Mitigate, Terminate!

Cannot Patch? Compensate, Mitigate, Terminate!

Ransomware and Its Effect on IT

 Ransomware and Its Effect on IT

vFeed Open Source Aggregated Vulnerability Database v0.4.5 released (Support of CWE 2.5, OWASP- Snort ...

Vulnerability Database v0.4.5 released (support of CWE 2.5, OWASP Top 2013 & Snort rules)

Hunting FTP Password Stealer Malware

 Hunting FTP Password Stealer Malware

Netgear ReadyNAS Remote Command Execution

Netgear ReadyNAS Remote Command Execution 

User tracking with HTTP Redirect

User tracking with HTTP Redirect

MobileIron 4.5.4 Cross Site Scripting

MobileIron 4.5.4 Cross Site Scripting 

Stack and heap overflow detection at runtime via behavior analysis and PIN

Stack and heap overflow detection at runtime via behavior analysis and PIN

sabato 26 ottobre 2013

In Spy Uproar, ‘Everyone Does It’ Just Won’t Do

In Spy Uproar, ‘Everyone Does It’ Just Won’t Do 

How to Set Up Secure Remote Networking with OpenVPN on Linux, Part 2 | Linux.com

How to Set Up Secure Remote Networking with OpenVPN on Linux, Part 2 | Linux.com

How to Set Up Secure Remote Networking with OpenVPN on Linux, Part 1 | Linux.com

How to Set Up Secure Remote Networking with OpenVPN on Linux, Part 1 | Linux.com

Crypto Locker Virus: Hackers Give Users 100 Hours to Pay Ransom for Malware Removal or Lose All Files

Crypto Locker Virus: Hackers Give Users 100 Hours to Pay Ransom for Malware Removal or Lose All Files

UA training cyber security experts for FBI, CIA and NSA

UA training cyber security experts for FBI, CIA and NSA

Converse.js-An XMPP chat client for your website!

Converse.js

What are things to do after installing Ubuntu 13.10?

What are things to do after installing Ubuntu 13.10? 

Developing a Small Business Disaster Recovery Plan

Developing a Small Business Disaster Recovery Plan 

Evolution of the White Hat: Then and Now

Evolution of the White Hat: Then and Now - Threat Geek

A Smorgasbord of Denial of Service

A Smorgasbord of Denial of Service

Analytics,privacy,exploit,cyberwar,spy,hacking,defence,>>>The Constantin Milos Daily 26.10.2013

The Constantin Milos Daily

U.S. Military Multi-Service Defense Support of Civil Authorities Manual | Public Intelligence

U.S. Military Multi-Service Defense Support of Civil Authorities Manual | Public Intelligence

venerdì 25 ottobre 2013

The Milos Constantin Daily/Security News ,Advanced Threats,Tecnology,Attacks & Defence,Privacy 25.10.2013

The Milos Constantin Daily

How Can I Restore Closed Tabs After Accidentally Quitting Chrome?

How Can I Restore Closed Tabs After Accidentally Quitting Chrome?

Data Recovery Dictionary: 10 Terms to Know - TopTenREVIEWS

Data Recovery Dictionary: 10 Terms to Know - TopTenREVIEWS

Catching a Headless Horseman (Trojan.Downloader.1301007.C-Jottix)

Catching a Headless Horseman (Trojan.Downloader.1301007.C-Jottix)

Vinsula Execution Engine - Hunting FTP Password Stealer Malware

Vinsula Execution Engine - Hunting FTP Password Stealer Malware

Layer Seven DDoS Attacks

Layer Seven DDoS Attacks

Malicious Code Execution in PCI Expansion ROM

Malicious Code Execution in PCI Expansion ROM

"You have received a new debit" Lloyds TSB spam


/Dynamoo's Blog

Hiding Webshell Backdoor Code in Image Files

Hiding Webshell Backdoor Code in Image Files 

The Technical Aspects of Exploiting IE Zero-Day CVE-2013-3897

The Technical Aspects of Exploiting IE Zero-Day CVE-2013-3897 

PHP.net resets passwords after malware flinging HACK FLAP

PHP.net resets passwords after malware flinging HACK FLAP 

LinkedIn's New App called ,,a DREAM" for Hackers

LinkedIn's new app called a dream for hackers 

La Stampa e le foto degli Hacker: già, perchè siamo tutti criminali, no?

La Stampa e le foto degli Hacker: già, perchè siamo tutti criminali, no? 

The Constantin Milos Daily/World Security News,Technology&Tricks..

The Constantin Milos Daily

United States spied on Italian government, claims magazine

United States spied on Italian government, claims magazine

giovedì 24 ottobre 2013

gdsl-toolkit - Generic Decoder Specification Language Toolkit

gdsl-toolkit - Generic Decoder Specification Language Toolkit 

Hacking Harvard

Hacking Harvard

Hacking Harvard

Hacking Harvard

What to do if your computer is attacked by ransomware?

avast! blog

A (relatively Easy to Understand) primer on Elliptic curve Cryptography

A (relatively easy to understand) primer on elliptic curve cryptography 

Forensics Investigations: Do not forget the database!

Open Security Research: May 2013

Reversing Basics Part 3: Dynamically Reversing main

Open Security Research: June 2013

DoD finalizes Defense Industrial Base cyber threat-sharing

Federal Register | Department of Defense (DoD)-Defense Industrial Base (DIB) Voluntary Cyber Security and Information Assurance (CS/IA) Activities

Cisco Fixes DoS, Remote Code Execution Bugs in Six Products

Cisco Fixes DoS, Remote Code Execution Bugs in Six Products 

Danger USB! Malware infects UN Nuclear Agency computers

Danger USB! Malware infects UN Nuclear Agency computers

A Missed Chance for NATO’s Cybersecurity Future

A Missed Chance for NATO’s Cybersecurity Future 

Brute Force and Malware Attacks Rise in the Energy Sector

Brute Force and Malware Attacks Rise in the Energy Sector

LinkedIn Intro App a Man in the Middle Attack

LinkedIn Intro App a Man in the Middle Attack

The Battle for Power on the Internet - Bruce Schneier

The Battle for Power on the Internet - Bruce Schneier 

WordPress DailyDeal Themes Shell Upload Vulnerabillity

WordPress DailyDeal Themes Shell Upload Vulnerabillity 

LiveCart 1.4 Remote Code Execution

LiveCart 1.4 Remote Code Execution 

Battling with Cyber Warriors- Exploit Kits

Battling with Cyber Warriors- Exploit Kits 

Druapl 7.x Bean Cross Site Scripting (XSS)

Druapl 7.x Bean Cross Site Scripting (XSS)

Microsoft Word Protect Document Password Feature

Microsoft Word Protect Document Password Feature -