Resources

  • VulnVoIP (Vulnerable VoIP) – The Fundamentals of VoIP Hacking – rebootuser.com

    VulnVoIP is based on a relatively old AsteriskNOW distribution and has a number of weaknesses. The aim is to locate VoIP users, crack their passwords and gain access to the Support account voicemail.

  • Owning Computers Without Shell Access – accuvant.com

    What’s This All About? Consultants often upload and execute a binary payload to a remote system during penetration tests for the purpose of footprinting the target, gathering information, and leveraging that information to compromise additional hosts.

  • A Preview of the Bitsquatting PCAPs – blog.dinaburg.org

    Recently I decided to make public the packet captures (PCAPs) of DNS traffic from my bitsquatting experiment (dnslogs.tar.7z, 56Mb, 7zip compressed). Currently I am working on an in-depth analysis of the PCAP data, including distribution of request types, domains, source addresses and more. In the meantime I wanted to share some interesting findings.

Tools

Techniques

  • XSS by uploading/including a SWF file – soroush.secproject.com

    As you may already know, it is possible to make a website vulnerable to XSS if you can upload/include a SWF file into that website. I am going to represent this SWF file that you can use in your PoCs.

  • HTTP Pass the Hash with Python – labs.neohapsis.com

    When assessing a Windows domain environment, the ability to “pass the hash” is invaluable. The technique was pioneered by Paul Ashton way back in ’97, and things have only gotten better since. Fortunately, we no longer need to patch Samba, but have reasonably functional tools like Pass-The-Hash Toolkit and msvctl.

  • Anatomy of an Attack: How I Hacked StackOverflow – blog.ircmaxell.com

    Almost two years ago I had stumbled upon a pretty significant vulnerability in the StackExchange network. I say stumbled, because I wasn’t actually trying to attack the site. Circumstance just showed me a door. The actual attack is pretty interesting, and it holds a lesson for everybody who builds or maintains websites or server infrastructure.

  • Playing with the JVM from Linux – anfractuosity.com

    Just playing with the JVM from Linux.

Vendor/Software Patches

  • Assessing risk for the November 2012 security updates – blogs.technet.com
    Today we released six security bulletins addressing 19 CVE’s. Four of the bulletins have a maximum severity rating of Critical, one has a maximum severity rating of Important, and one has a maximum severity rating of Moderate.
  • New 0day Exploits: Novell File Reporter Vulnerabilities – community.rapid7.com

    Today, we present to you several new vulnerabilities discovered in Novell File Reporter 1.0.2, which “helps organizations more effectively manage network storage by providing administrators the ability to access comprehensive network storage information so that they can determine the best means of addressing their storage content”. Following our standard disclosure policy, we notified both Novell and CERT.

  • SE-2012-01 – Details – security-explorations.com
    This page presents details of security vulnerabilities and attack techniques discovered as a result of our Java SE security research project. These details are provided in a form of a technical report and presentation slides for the talk that was given by Adam Gowdiak on 14 Nov 2012 at Devoxx Java Community Conference in Antwerp.

Vulnerabilities

Other News

  • Obama Signs Cyberwar Directive
  • The hacking of a general’s mistress – erratasec.blogspot.com
    This news story claims “Anonymous” (the well known hacker collective) may have hacked the account of Petraeus mistress. That’s because her e-mail account, paulabroadwell@yahoo.com, was included in Stratfor email hack last year.
  • Hardcoded passwords leave Telstra routers wide open – scmagazine.com.au
    Hardcoded usernames and passwords have been discovered in a recent line of Telstra broadband routers that could allow attackers access to customer networks.