/dev/random: [SANS ISC Diary] How your pictures may affect your website...
I published the following diary on isc.sans.org: “How your pictures may affect your website reputation“.In a previous diary, I explained why the automatic processing of IOC’s (“Indicator of...
View ArticleUn informático en el lado del mal: Mis "charlas" para la semana que viene y...
Con la resaca de la semana del Mobile World Congress y la RootedCON, hoy he decidido dejaros solo la lista de las próximas citas para la que se nos avecina entrado ya Marzo. Mañana comienzo a...
View ArticleMcAfee Avert Labs: Taking a Look at W32/Ramnit
Today we’re going to take a look at an interesting file-infector virus. W32/Ramnit infects EXE, DLL and HTML files. That last one is right; W32/Ramnit also infects HTML files to replicate itself.Let’s...
View Articlehoneyblog: 2011 Honeynet Project Security Workshop Slides + Videos
The slides and videos from the 2011 Honeynet Project Security Workshop (Paris) are now available! You can get the material from http://www.honeynet.org/SecurityWorkshops/2011_Paris. About the...
View ArticleUn informático en el lado del mal: DirtyTooth Hack: It´s only Rock'n Roll but...
Hace ya un tiempo, participé en unas jornadas en Barcelona con una conferencia en la que recopilé todos los hacks conocidos hasta ese momento para atacar terminales iPhone. La llamé Protege tu iPhone:...
View ArticleDidier Stevens: Update: re-search.py Version 0.0.3
A very small update to re-search.py: I added a regular expression for strings to the library:re-search_V0_0_3.zip (https) MD5: 6C4F59C4BA5DAC1D16D3E09D1E333FD0 SHA256:...
View ArticleDidier Stevens: New Tool: sets.py
It’s a tool I started years ago, and I’m releasing it now.sets.py allows you to perform operations on sets: union, intersection, subtraction and exclusive or. A set is a list of lines in a file, or a...
View ArticleSANS Internet Storm Center, InfoCON: green: Another example of maldoc string...
I had to help out someone with this sample.It contains obfuscated strings like these:Notice the Like operator. This is a strong indication that the strings are obfuscated by adding extra characters...
View ArticleUn informático en el lado del mal: DirtyTooth Hack: It´s only Rock'n Roll but...
Tras lo escrito en la primera parte de esta serie dedicada al DirtyTooth Hack, podríamos decir que de momento hemos visto que hay varias cosas que un atacante, utilizando un dispositivo BlueTooth...
View ArticleDidier Stevens: Update: cut-bytes.py Version 0.0.5
I just updated the manual of this version, to explain here documents.cut-bytes_V0_0_5.zip (https) MD5: B20B9758D50C846CD0E0AEB9E0B15101 SHA256:...
View ArticleInfosec Events: Week 10 In Review – 2017
TechniquesHacking Unicorns with Web Bluetooth– www.contextis.com Researchers discovered an unsecured MongoDB server that exposed sensitive CloudPets customer data. My research focused on the toy...
View ArticleSANS Internet Storm Center, InfoCON: green: ISC Stormcast For Monday, March...
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
View ArticleDarknet - The Darkside: mongoaudit – MongoDB Auditing & Pen-testing Tool
mongoaudit is a CLI tool for MongoDB auditing of servers, detecting poor security settings and performing automated penetration testing. It is widely known that there are quite a few holes in MongoDB’s...
View ArticleSANS Internet Storm Center, InfoCON: green: A very convincing Typosquatting +...
This is a guest diary submitted by Renato MarinhoDistracted users mistyping the first n when accessing www.santanderempresarial.com.br are subject to banking credentials theft and a very convincing...
View ArticleFortinet FortiGuard Blog: FortiGuard Labs Telemetry – Roundup and Comparison...
Attacks targeting and originating from IoT devices began grabbing news headlines toward the last quarter of 2016. Insecure IoT devices became the low-hanging fruit for threat actors to easily exploit....
View ArticleUn informático en el lado del mal: DirtyTooth Hack: It´s only Rock'n Roll but...
Vistos en las partes anteriores todos los detalles que tiene la conexión de un terminal iPhone a un dispositivo BlueTooth, y cómo gestiona su comportamiento ante el acceso a la agenda de contactos o el...
View ArticleLost In Security: El último superviviente (II) - iOS
En el pasado artículo estuvimos revisando los puntos débiles que tiene un malware a la hora de sobrevivir un reinicio del sistema, y nos centramos en OSX. Ahora toca el turno a iOS, que al ser una...
View ArticleKPNC: vulnerability in… WinCalc (Win7, x64)
I will never go out of business in this country. thanks to Microsoft. who would have thought that wincalcis vulnerable? I have not checked all systems yet, so this is my configuration: Windows 7...
View ArticlePandaLabs: PowerLocker
PowerLocker, also called PrisonLocker, is a new family of ransomware which in addition to encrypting files on the victim’s computer (as with other such malware) threatens to block users’ computers...
View ArticleArsTechnica: Security Content: This hard drive will self destruct....
Enlarge (credit: William Warby)Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is...
View Article