Techniques
- Kaspersky Antivirus Certificate handling path traversal – code.google.com
When Kaspersky https inspection is enabled, temporary certificates are created in %PROGRAMDATA% for validation. I observed that the naming pattern is {CN}.cer.
- Breaking into and Reverse Engineering iOS Photo Vaults – blog.ioactive.com
For whatever reason, a lot of people store risqué pictures on their devices. Why they feel the need to do that is left for another discussion. This behavior has fueled a desire to protect photos on mobile devices.
- Sleepy Puppy Extension for Burp Suite – techblog.netflix.com
Netflix recently open sourced Sleepy Puppy – a cross-site scripting (XSS) payload management framework for security assessments. One of the most frequently requested features for Sleepy Puppy has been for an extension for Burp Suite, an integrated platform for web application security testing.
Resources
- Introducing Chuckle and the importance of SMB signing – www.nccgroup.trust
Service Message Block (SMB) is a protocol used for accessing shared resources; most corporate Windows networks use SMB to access shared folders and printers.
- Microsoft Security Intelligence Report Volume 19 is now available – blogs.microsoft.com
This includes threat data from the first half of 2015 as well as longer term trend data on the industry vulnerabilities, exploits, malware, and malicious websites that your organization should use to assess your current security posture. We are also providing threat data for over 100 countries/regions.
- DeepSec 2015
- 50 Shades of WAF – blog.c22.cc
- File Format Fuzzing in Android – Giving a Stagefright to the Android Installer – blog.c22.cc
- How to Break XML Encryption – Automatically – blog.c22.cc
- Hacking Cookies in Modern Web Applications and Browsers – blog.c22.cc
- Can societies manage the SIGINT monster? – blog.c22.cc
- HackFest 2015 – files.sans.org
- PHP static code analysis vs ~1000 top wordpress plugins = 103 vulnerable plugins found – blog.cinu.pl
Most of reported plugins are already patched, some are not. Vulnerable and not patched plugins are already removed from official wordpress plugin repository.
Tools
- dnscat2: now with crypto! – github.com
This change introduces cryptography to dnscat2! All connections are now encrypted by default.
- MassBleed – github.com
MassBleed SSL Vulnerability Scanner
- Nmap 7 Released – nmap.org
The Nmap Project is pleased to announce the immediate, free availability of the Nmap Security Scanner version 7.00. It is the product of three and a half years of work, nearly 3200 code commits, and more than a dozen point releases since the big Nmap 6 release in May 2012.
- PwnBin – github.com
PwnBin is a webcrawler which searches public pastebins for specified keywords. All pastes are then returned after sending completion signal ctrl+c.
- Aircrack-ng 1.2 Release Candidate 3 – aircrack-ng.blogspot.com
Third release candidate and hopefully this should be the last one. It contains a ton of bug fixes, code cleanup, improvements and compilation fixes everywhere. Some features were added: AppArmor profiles, better FreeBSD support, including an airmon-ng for FreeBSD
Vulnerabilities
- PNG pongs: critical bug patched in ubiquitous libpng – www.theregister.co.uk
This will not be fun: the graphics processing library libpng has a vulnerability and needs to be patched. The problem for that is that libpng is everywhere – in browsers, anything that processes photos to produce thumbnails, file browsers, music players, in applications in every operating system.
- Siri’s Flaw: Apple’s Personal Assistant Leaks Personal Data – blog.trendmicro.com
Siri for iOS devices has made everyday tasks easier; whether it is getting directions to the nearest gas station or staying in contact with growing social media networks. iOS users can just call out a contact’s name and the device will populate with a telephone number and email address. However, convenience comes with a price: personal information.
- TrueCrypt
The Fraunhofer Institute for Secure Information Technology (SIT) was commissioned by the Federal Office for Security in Information Technology Encryption Software (BSI) TrueCrypt investigated. It is safe in the opinion of the researchers, as it suggest previous analyzes. The cryptographic functions are only “in very rare cases, be attacked”.
- Comcast Xfinity Wi-Fi discloses customer names and addresses – www.csoonline.com
The disclosure of such information increases an already exposed attack surface, by allowing anyone with malicious intent to selectively target their marks.
Other News
- California’s Cyber Security Policy Is Now the Strongest in the U.S. – tech.co
Technology solves a lot of problems, but it can also help contribute to new ones. Cyber attacks are on the rise and they don’t appear to be letting up. One of the dilemmas that the digital age has created is the conundrum concerning the extent to which digital content can be considered private.
- Exploit Vendor Publishes 0-Day Bugs Price List, iOS Valued Above Android – news.softpedia.com
Having previously paid $1 million / €0.93 million for the first iOS 9 jailbreak, Zerodium has now gone one step further and published a list of prices it will dish out to security researchers and hackers for their undisclosed zero-day bugs.
Leave A Comment