Article: Did It Execute? - published about 11 years ago. Content: You found a malicious executable! Now you've got a crucial question to answer: did the file execute? We'll discuss a few sources of evidence you can use to answer this question. In this post, we will focus on static or "dead drive" forensics on Windows systems. We will cover four main sources of evidence: Windows Prefetch, Registry, Lo... http://www.fireeye.com/blog/threat-research/2013/08/execute.html Published: 2013 08 27 22:26:05 Received: 2021 06 06 09:05:12 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Exploit Oracle Endeca Server with metasploit. - published about 11 years ago. Content: This module exploits a command injection vulnerability on the Oracle Endeca Server 7.4.0. The vulnerability exists on the createDataStore method from the controlSoapBinding web service. The vulnerable method only exists on the 7.4.0 branch and isn't available on the 7.5.5.1 branch. On the other hand, the injection has been found to be Windows specific. T... https://tipstrickshack.blogspot.com/2013/08/exploit-oracle-endeca-server-with.html Published: 2013 08 27 07:51:00 Received: 2024 02 20 16:43:02 Feed: Hacking and Tricks Source: Hacking and Tricks Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor