All Articles

Ordered by Date Published
and by Page: << < 8,709 (of 8,729) > >>

Total Articles in this collection: 436,476

Navigation Help at the bottom of the page
Article: Attacking financial malware botnet panels - Zeus - published almost 11 years ago.
Content: I played with leaked financial malware recently. When I saw these panels are written in PHP, my first idea was to hack them. The results are the work of one evening, please don't expect a full pentest report with all vulns found :-)The following report is based on Zeus 2.0.8.9, which is old, but I believe a lot of Zeus clones (and C&amp;C panels) depend on t...
https://jumpespjump.blogspot.com/2014/02/attacking-financial-malware-botnet.html   
Published: 2014 02 14 10:09:00
Received: 2021 06 06 09:04:53
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: Attacking financial malware botnet panels - Zeus - published almost 11 years ago.
Content: I played with leaked financial malware recently. When I saw these panels are written in PHP, my first idea was to hack them. The results are the work of one evening, please don't expect a full pentest report with all vulns found :-)The following report is based on Zeus 2.0.8.9, which is old, but I believe a lot of Zeus clones (and C&amp;C panels) depend on t...
https://jumpespjump.blogspot.com/2014/02/attacking-financial-malware-botnet.html   
Published: 2014 02 14 10:09:00
Received: 2021 06 06 09:04:53
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website - published almost 11 years ago.
Content: On February 11, FireEye identified a zero-day exploit (CVE-2014-0322)  being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a strategic Web compromise targeting American military personnel amid a paralyzing snowstorm at the U.S. Capitol in the days leading up to the Presidents Day holiday weekend. Ba...
https://www.fireeye.com/blog/threat-research/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html   
Published: 2014 02 13 23:06:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Operation SnowMan: DeputyDog Actor Compromises US Veterans of Foreign Wars Website - published almost 11 years ago.
Content: On February 11, FireEye identified a zero-day exploit (CVE-2014-0322)  being served up from the U.S. Veterans of Foreign Wars’ website (vfw[.]org). We believe the attack is a strategic Web compromise targeting American military personnel amid a paralyzing snowstorm at the U.S. Capitol in the days leading up to the Presidents Day holiday weekend. Ba...
https://www.fireeye.com/blog/threat-research/2014/02/operation-snowman-deputydog-actor-compromises-us-veterans-of-foreign-wars-website.html   
Published: 2014 02 13 23:06:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Cyber Tzar Free Score Certificate
Article: Swarm Testing by Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen, and John Regehr [PDF] - published almost 11 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1xgdid/swarm_testing_by_alex_groce_chaoqiang_zhang_eric/   
Published: 2014 02 09 19:45:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Swarm Testing by Alex Groce, Chaoqiang Zhang, Eric Eide, Yang Chen, and John Regehr [PDF] - published almost 11 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1xgdid/swarm_testing_by_alex_groce_chaoqiang_zhang_eric/   
Published: 2014 02 09 19:45:14
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: How to install and use Veil-Catapult in backtrack? - published almost 11 years ago.
Content: Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install ...
https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html   
Published: 2014 02 08 20:04:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to install and use Veil-Catapult in backtrack? - published almost 11 years ago.
Content: Today we are gonna talk about Veil-Catapult.Veil-Catapult is payload delivery for when metasploit’s psexec getting caught by AV.It utilizes Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution.It officially supported on kali linux only.I`m going to show you how to install ...
https://tipstrickshack.blogspot.com/2014/02/how-to-install-and-use-veil-catapult-in.html   
Published: 2014 02 08 20:04:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Summary
Cyber Tzar Score Summary
Article: SMB penny stretching 101: Making the most of your security budget - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/smb-penny-stretching-101-making-the-most-of-your-security-budget/#ftag=RSS56d97e7   
Published: 2014 02 06 15:34:58
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: SMB penny stretching 101: Making the most of your security budget - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/smb-penny-stretching-101-making-the-most-of-your-security-budget/#ftag=RSS56d97e7   
Published: 2014 02 06 15:34:58
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: The Virtual Graffiti Project - published almost 11 years ago.
Content:
http://www.zone-h.org/news/id/4745   
Published: 2014 02 03 22:47:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Article: The Virtual Graffiti Project - published almost 11 years ago.
Content:
http://www.zone-h.org/news/id/4745   
Published: 2014 02 03 22:47:00
Received: 2021 06 06 09:05:22
Feed: Zone-H.org News
Source: Zone-H.org News
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Droidpak: A sneak attack on Android devices via PC malware - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/droidpak-a-sneak-attack-on-android-devices-via-pc-malware/#ftag=RSS56d97e7   
Published: 2014 02 03 21:29:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Droidpak: A sneak attack on Android devices via PC malware - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/droidpak-a-sneak-attack-on-android-devices-via-pc-malware/#ftag=RSS56d97e7   
Published: 2014 02 03 21:29:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Hacking Windows 95, part 1 - published almost 11 years ago.
Content: During a CTF game, we came across very-very old systems. Turns out, it is not that easy to hack those dinosaur old systems, because modern tools like Metasploit do not have sploits for those old boxes and of course our "133t h4cking skillz" are useless without Metasploit... :) But I had an idea: This can be a pretty good small research for fun. The rules...
https://jumpespjump.blogspot.com/2014/02/hacking-windows-95-part-1.html   
Published: 2014 02 02 11:11:00
Received: 2024 03 12 23:22:36
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: Hacking Windows 95, part 1 - published almost 11 years ago.
Content: During a CTF game, we came across very-very old systems. Turns out, it is not that easy to hack those dinosaur old systems, because modern tools like Metasploit do not have sploits for those old boxes and of course our "133t h4cking skillz" are useless without Metasploit... :) But I had an idea: This can be a pretty good small research for fun. The rules...
https://jumpespjump.blogspot.com/2014/02/hacking-windows-95-part-1.html   
Published: 2014 02 02 11:11:00
Received: 2024 03 12 23:22:36
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Cyber Tzar Gold Score Certificate
Cyber Tzar Gold Score Certificate
Article: Malicious intent can turn Chrome speech recognition into spying device - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/malicious-intent-can-turn-chrome-speech-recognition-into-spying-device/#ftag=RSS56d97e7   
Published: 2014 01 29 19:43:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Malicious intent can turn Chrome speech recognition into spying device - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/malicious-intent-can-turn-chrome-speech-recognition-into-spying-device/#ftag=RSS56d97e7   
Published: 2014 01 29 19:43:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Impact Distribution
Cyber Tzar Risk Impact Distribution
Article: Episode #174: Lightning Lockdown - published almost 11 years ago.
Content: Hal firewalls fast Recently a client needed me to quickly set up an IP Tables firewall on a production server that was effectively open on the Internet. I knew very little about the machine, and we couldn't afford to break any of the production traffic to and from the box. It occurred to me that a decent first approximation would be to simply look at the n...
http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html   
Published: 2014 01 28 10:00:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #174: Lightning Lockdown - published almost 11 years ago.
Content: Hal firewalls fast Recently a client needed me to quickly set up an IP Tables firewall on a production server that was effectively open on the Internet. I knew very little about the machine, and we couldn't afford to break any of the production traffic to and from the box. It occurred to me that a decent first approximation would be to simply look at the n...
http://blog.commandlinekungfu.com/2014/01/episode-174-lightning-lockdown.html   
Published: 2014 01 28 10:00:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Cyber Tzar Score Analysis
Cyber Tzar Score Analysis
Article: How Encryption Enables Crucial Data Control - published almost 11 years ago.
Content:
https://www.securitymagazine.com/articles/85167-how-encryption-enables-crucial-data-control   
Published: 2014 01 28 05:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: How Encryption Enables Crucial Data Control - published almost 11 years ago.
Content:
https://www.securitymagazine.com/articles/85167-how-encryption-enables-crucial-data-control   
Published: 2014 01 28 05:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Researchers describe tool that manipulates RAM, misleads cybercrime investigators - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/researchers-describe-tool-that-manipulates-ram-misleads-cybercrime-investigators/#ftag=RSS56d97e7   
Published: 2014 01 27 20:55:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Researchers describe tool that manipulates RAM, misleads cybercrime investigators - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/researchers-describe-tool-that-manipulates-ram-misleads-cybercrime-investigators/#ftag=RSS56d97e7   
Published: 2014 01 27 20:55:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: Leveraging the Power of Solutions and Intelligence - published almost 11 years ago.
Content: Welcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One of the aspects of the new company that I find most exciting is our increased threat intelligence capabilities. This post will briefly explore what that means for our customers, prospects, and the public. By it...
http://www.fireeye.com/blog/threat-research/2014/01/leveraging-power-solutions-intelligence.html   
Published: 2014 01 27 20:40:15
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Leveraging the Power of Solutions and Intelligence - published almost 11 years ago.
Content: Welcome to my first post as a FireEye™ employee! Many of you have asked me what I think of FireEye's acquisition of Mandiant. One of the aspects of the new company that I find most exciting is our increased threat intelligence capabilities. This post will briefly explore what that means for our customers, prospects, and the public. By it...
http://www.fireeye.com/blog/threat-research/2014/01/leveraging-power-solutions-intelligence.html   
Published: 2014 01 27 20:40:15
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: DNSSEC, from an end-user perspective, part 3 - published almost 11 years ago.
Content: In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases? The following list are the attack types from the first post, where DNSSEC c...
https://jumpespjump.blogspot.com/2014/01/dnssec-from-end-user-perspective-part-3.html   
Published: 2014 01 25 12:47:00
Received: 2023 03 31 10:02:50
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: DNSSEC, from an end-user perspective, part 3 - published almost 11 years ago.
Content: In the first post of this DNSSEC series, I have shown the problem (DNS vulnerabilities), and in the second post, the "solution." In this third post, I am going to analyze DNSSEC. Can DNSSEC protect the users against all of the attacks? Or just part of them? What about corner cases? The following list are the attack types from the first post, where DNSSEC c...
https://jumpespjump.blogspot.com/2014/01/dnssec-from-end-user-perspective-part-3.html   
Published: 2014 01 25 12:47:00
Received: 2023 03 31 10:02:50
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Risk Impact Assesment
Cyber Tzar Risk Impact Assesment
Article: Internet of Things botnet may include TVs and a fridge - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/internet-of-things-botnet-may-include-tvs-and-a-fridge/#ftag=RSS56d97e7   
Published: 2014 01 21 17:44:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Internet of Things botnet may include TVs and a fridge - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/internet-of-things-botnet-may-include-tvs-and-a-fridge/#ftag=RSS56d97e7   
Published: 2014 01 21 17:44:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Android.HeHe: Malware Now Disconnects Phone Calls - published almost 11 years ago.
Content: FireEye Labs has recently discovered six variants of a new Android threat that steals text messages and intercepts phone calls. We named this sample set “Android.HeHe” after the name of the activity that is used consistently across all samples. Here is a list of known bot variants: MD5 VirusTotal Detection Ratio 1caa...
https://www.fireeye.com/blog/threat-research/2014/01/android-hehe-malware-now-disconnects-phone-calls.html   
Published: 2014 01 21 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Android.HeHe: Malware Now Disconnects Phone Calls - published almost 11 years ago.
Content: FireEye Labs has recently discovered six variants of a new Android threat that steals text messages and intercepts phone calls. We named this sample set “Android.HeHe” after the name of the activity that is used consistently across all samples. Here is a list of known bot variants: MD5 VirusTotal Detection Ratio 1caa...
https://www.fireeye.com/blog/threat-research/2014/01/android-hehe-malware-now-disconnects-phone-calls.html   
Published: 2014 01 21 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Your Score Explained
Cyber Tzar Your Score Explained
Article: Inside A Malware Campaign - published almost 11 years ago.
Content: A while back I received some spam email with the theme of adding new friends of facebook. This is how I became aware of the campaign now known as the "Aqua VPN" campaign. World renowned and internationally respected anti virus vendor MalwareBytes also blogged about this campaign here (thanks to @paperghost) After gaining admin rights to the web panel I bui...
http://trojan7malware.blogspot.com/2014/01/inside-malware-campaign.html   
Published: 2014 01 20 12:12:00
Received: 2024 03 20 04:23:50
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Inside A Malware Campaign - published almost 11 years ago.
Content: A while back I received some spam email with the theme of adding new friends of facebook. This is how I became aware of the campaign now known as the "Aqua VPN" campaign. World renowned and internationally respected anti virus vendor MalwareBytes also blogged about this campaign here (thanks to @paperghost) After gaining admin rights to the web panel I bui...
http://trojan7malware.blogspot.com/2014/01/inside-malware-campaign.html   
Published: 2014 01 20 12:12:00
Received: 2024 03 20 04:23:50
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Risk Groups Explained
Cyber Tzar Risk Groups Explained
Article: JS-Binding-Over-HTTP Vulnerability and JavaScript Sidedoor: Security Risks Affecting Billions of Android App Downloads - published almost 11 years ago.
Content: Third-party libraries, especially ad libraries, are widely used in Android apps. Unfortunately, many of them have security and privacy issues. In this blog, we summarize our findings related to the insecure usage of JavaScript binding in ad libraries. First, we describe a widespread security issue with using JavaScript binding (addJavascriptInterface...
https://www.fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html   
Published: 2014 01 17 00:45:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: JS-Binding-Over-HTTP Vulnerability and JavaScript Sidedoor: Security Risks Affecting Billions of Android App Downloads - published almost 11 years ago.
Content: Third-party libraries, especially ad libraries, are widely used in Android apps. Unfortunately, many of them have security and privacy issues. In this blog, we summarize our findings related to the insecure usage of JavaScript binding in ad libraries. First, we describe a widespread security issue with using JavaScript binding (addJavascriptInterface...
https://www.fireeye.com/blog/threat-research/2014/01/js-binding-over-http-vulnerability-and-javascript-sidedoor.html   
Published: 2014 01 17 00:45:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Namecheap exposed: official press release - published almost 11 years ago.
Content: Official press notice regarding namecheap corruption:Legal disclaimer: any articles linked or people mentioned are in no way affiliated and or associated with this press release. The companies and or person(s) are in no way responsible for the content in this press release Recently, I noticed a spam campaign exploiting the "new friend on Facebook" email temp...
http://trojan7malware.blogspot.com/2014/01/namecheap-exposed-official-press-release.html   
Published: 2014 01 16 10:36:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Namecheap exposed: official press release - published almost 11 years ago.
Content: Official press notice regarding namecheap corruption:Legal disclaimer: any articles linked or people mentioned are in no way affiliated and or associated with this press release. The companies and or person(s) are in no way responsible for the content in this press release Recently, I noticed a spam campaign exploiting the "new friend on Facebook" email temp...
http://trojan7malware.blogspot.com/2014/01/namecheap-exposed-official-press-release.html   
Published: 2014 01 16 10:36:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Fake security messages more believable than real warnings research shows - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/fake-security-messages-more-believable-than-real-warnings-research-shows/#ftag=RSS56d97e7   
Published: 2014 01 14 20:53:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Fake security messages more believable than real warnings research shows - published almost 11 years ago.
Content:
https://www.techrepublic.com/article/fake-security-messages-more-believable-than-real-warnings-research-shows/#ftag=RSS56d97e7   
Published: 2014 01 14 20:53:00
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Oracle Critical Patch Update Advisory - January 2014 - published almost 11 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html   
Published: 2014 01 14 19:30:54
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Article: Oracle Critical Patch Update Advisory - January 2014 - published almost 11 years ago.
Content:
http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html   
Published: 2014 01 14 19:30:54
Received: 2021 06 06 09:03:27
Feed: Oracle Security Alerts
Source: Oracle Security Alerts
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Trends in Targeted Attacks: 2013 - published almost 11 years ago.
Content: FireEye has been busy over the last year. We have tracked malware-based espionage campaigns and published research papers on numerous advanced threat actors. We chopped through Poison Ivy, documented a cyber arms dealer, and revealed that Operation Ke3chang had targeted Ministries of Foreign Affairs in Europe. Worldwide, security experts made ma...
https://www.fireeye.com/blog/threat-research/2014/01/trends-in-targeted-attacks-2013.html   
Published: 2014 01 13 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Trends in Targeted Attacks: 2013 - published almost 11 years ago.
Content: FireEye has been busy over the last year. We have tracked malware-based espionage campaigns and published research papers on numerous advanced threat actors. We chopped through Poison Ivy, documented a cyber arms dealer, and revealed that Operation Ke3chang had targeted Ministries of Foreign Affairs in Europe. Worldwide, security experts made ma...
https://www.fireeye.com/blog/threat-research/2014/01/trends-in-targeted-attacks-2013.html   
Published: 2014 01 13 10:00:00
Received: 2022 05 23 16:06:48
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Target data breach exposes serious threat of POS malware and botnets - published about 11 years ago.
Content:
https://www.techrepublic.com/article/target-data-breach-exposes-serious-threat-of-pos-malware-and-botnets/#ftag=RSS56d97e7   
Published: 2014 01 10 02:49:02
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Article: Target data breach exposes serious threat of POS malware and botnets - published about 11 years ago.
Content:
https://www.techrepublic.com/article/target-data-breach-exposes-serious-threat-of-pos-malware-and-botnets/#ftag=RSS56d97e7   
Published: 2014 01 10 02:49:02
Received: 2021 06 06 09:05:21
Feed: IT Security Blog | TechRepublic
Source: IT Security Blog | TechRepublic
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Vulnerability Summary for the Week of December 30, 2013 - published about 11 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb14-006   
Published: 2014 01 06 21:11:14
Received: 2023 03 17 18:04:35
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Article: Vulnerability Summary for the Week of December 30, 2013 - published about 11 years ago.
Content:
https://www.cisa.gov/news-events/bulletins/sb14-006   
Published: 2014 01 06 21:11:14
Received: 2023 03 17 18:04:35
Feed: CISA Bulletins
Source: Cybersecurity and Infrastructure Security Agency (CISA)
Category: Bulletins
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Deliver powershell payload using macro. - published about 11 years ago.
Content: In past we saw method of direct shell code execution in Ms word or Excel using macro;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload. Advantages of this method:- (1)Persistence (2)Migration is not needed (3)AV...
https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html   
Published: 2014 01 06 13:57:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Deliver powershell payload using macro. - published about 11 years ago.
Content: In past we saw method of direct shell code execution in Ms word or Excel using macro;but if document is closed then we will lose our shell so we have to migrate to other process and sometimes migration is pick up by AV. So in this tutorial we are going to use powershell payload. Advantages of this method:- (1)Persistence (2)Migration is not needed (3)AV...
https://tipstrickshack.blogspot.com/2014/01/deliver-powershell-payload-using-macro.html   
Published: 2014 01 06 13:57:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: DNSSEC, from an end-user perspective, part 2 - published about 11 years ago.
Content: In our previous blog post, we have discussed some of the threats against current DNS systems, where the result was that the victim landed on a different resource/website as he/she originally supposed to visit. Since this is not a guide for DNS server operators about DNSSEC implementation, let's jump to the user side and see what you should know if you vi...
https://jumpespjump.blogspot.com/2014/01/dnssec-from-end-user-perspective-part-2.html   
Published: 2014 01 06 11:44:00
Received: 2023 03 31 10:02:51
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: DNSSEC, from an end-user perspective, part 2 - published about 11 years ago.
Content: In our previous blog post, we have discussed some of the threats against current DNS systems, where the result was that the victim landed on a different resource/website as he/she originally supposed to visit. Since this is not a guide for DNS server operators about DNSSEC implementation, let's jump to the user side and see what you should know if you vi...
https://jumpespjump.blogspot.com/2014/01/dnssec-from-end-user-perspective-part-2.html   
Published: 2014 01 06 11:44:00
Received: 2023 03 31 10:02:51
Feed: Jump ESP, jump!
Source: Jump ESP, jump!
Category: Cyber Security
Topic: Cyber Security
Article: Episode #173: Tis the Season - published about 11 years ago.
Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you: function t { for ((i=0; $i &lt; $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j &lt;= $e; j++)); do [ $j -ge $s ] &amp;&amp; echo -n '^' || echo -n ' '; done; echo; done } function T { for ((i=0; $i &lt; $1; i++)); do for ((j=...
http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html   
Published: 2013 12 31 10:00:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #173: Tis the Season - published about 11 years ago.
Content: Hal finds some cheer From somewhere near the borders of scriptistan, we send you: function t { for ((i=0; $i &lt; $1; i++)); do s=$((8-$i)); e=$((8+$i)); for ((j=0; j &lt;= $e; j++)); do [ $j -ge $s ] &amp;&amp; echo -n '^' || echo -n ' '; done; echo; done } function T { for ((i=0; $i &lt; $1; i++)); do for ((j=...
http://blog.commandlinekungfu.com/2013/12/episode-173-tis-season.html   
Published: 2013 12 31 10:00:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Photo - published about 11 years ago.
Content:
https://potatohatsecurity.tumblr.com/post/70673517569   
Published: 2013 12 21 10:42:58
Received: 2021 06 06 09:04:58
Feed: Team PotatoSec
Source: Team PotatoSec
Category: Cyber Security
Topic: Cyber Security
Article: Photo - published about 11 years ago.
Content:
https://potatohatsecurity.tumblr.com/post/70673517569   
Published: 2013 12 21 10:42:58
Received: 2021 06 06 09:04:58
Feed: Team PotatoSec
Source: Team PotatoSec
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Best of the Best in 2013: The Armory - published about 11 years ago.
Content: Everyone likes something for free. And there is no better place to go to get free analysis, intelligence and tools than The Armory on M-Unition. During the past year, we've offered intelligence and analysis on new threat activity, sponsored open source projects and offered insight on free tools like Redline™, all of which has been high...
http://www.fireeye.com/blog/threat-research/2013/12/2013-armory.html   
Published: 2013 12 20 21:48:44
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Best of the Best in 2013: The Armory - published about 11 years ago.
Content: Everyone likes something for free. And there is no better place to go to get free analysis, intelligence and tools than The Armory on M-Unition. During the past year, we've offered intelligence and analysis on new threat activity, sponsored open source projects and offered insight on free tools like Redline™, all of which has been high...
http://www.fireeye.com/blog/threat-research/2013/12/2013-armory.html   
Published: 2013 12 20 21:48:44
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Change Over Time (Extended)
Cyber Tzar Change Over Time (Extended)
Article: Creating custom username list & wordlist for bruteforciing. - published about 11 years ago.
Content: During brute-forcing every time you need custom  password list &amp; username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration. Creating custom username list:...
https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html   
Published: 2013 12 18 08:34:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Creating custom username list & wordlist for bruteforciing. - published about 11 years ago.
Content: During brute-forcing every time you need custom  password list &amp; username list. Username list is as well as important as password list, it should be unique for every organization.If we use traditional large number of username list , then it will be tedious process.Custom username list also useful in username enumeration. Creating custom username list:...
https://tipstrickshack.blogspot.com/2013/12/creating-custom-username-list-wordlist.html   
Published: 2013 12 18 08:34:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Re-Score Report
Cyber Tzar Re-Score Report
Article: Affiliate System Drops ZeroAccess. - published about 11 years ago.
Content: I was recently looking around on darkode and I found this affiliate. This affiliate was recently covered by @kafeine here. I began talking to the owner/operator of this affiliate system and after a few edits to cracked Blackhole (lol) i sent him my faked stats and I was quickly accepted. Whats an affiliate? An affiliate is a system were a content owner pays...
http://trojan7malware.blogspot.com/2013/12/affiliate-system-drops-zeroaccess.html   
Published: 2013 12 17 17:31:00
Received: 2024 03 20 04:23:50
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Affiliate System Drops ZeroAccess. - published about 11 years ago.
Content: I was recently looking around on darkode and I found this affiliate. This affiliate was recently covered by @kafeine here. I began talking to the owner/operator of this affiliate system and after a few edits to cracked Blackhole (lol) i sent him my faked stats and I was quickly accepted. Whats an affiliate? An affiliate is a system were a content owner pays...
http://trojan7malware.blogspot.com/2013/12/affiliate-system-drops-zeroaccess.html   
Published: 2013 12 17 17:31:00
Received: 2024 03 20 04:23:50
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: OpenIOC Series: Investigating with Indicators of Compromise (IOCs) – Part I - published about 11 years ago.
Content: Written by Devon Kerr &amp; Will Gibb The Back to Basics: OpenIOC blog series previously discussed how Indicators of Compromise (IOCs) can be used to codify information about malware or utilities and describe an attacker's methodology. Also touched on were the parts of an IOC, such as the metadata, references, and definition sec...
http://www.fireeye.com/blog/threat-research/2013/12/openioc-series-investigating-indicators-compromise-iocs.html   
Published: 2013 12 16 20:58:10
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: OpenIOC Series: Investigating with Indicators of Compromise (IOCs) – Part I - published about 11 years ago.
Content: Written by Devon Kerr &amp; Will Gibb The Back to Basics: OpenIOC blog series previously discussed how Indicators of Compromise (IOCs) can be used to codify information about malware or utilities and describe an attacker's methodology. Also touched on were the parts of an IOC, such as the metadata, references, and definition sec...
http://www.fireeye.com/blog/threat-research/2013/12/openioc-series-investigating-indicators-compromise-iocs.html   
Published: 2013 12 16 20:58:10
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Taming ROP on Sandy Bridge - Georg Wicherski (May 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/1s15el/taming_rop_on_sandy_bridge_georg_wicherski_may/   
Published: 2013 12 03 23:17:28
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Taming ROP on Sandy Bridge - Georg Wicherski (May 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]...
https://www.reddit.com/r/vrd/comments/1s15el/taming_rop_on_sandy_bridge_georg_wicherski_may/   
Published: 2013 12 03 23:17:28
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns - Mateusz "j00ru" Jurczyk and Gynvael Coldwind (May 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1s14rw/bochspwn_exploiting_kernel_race_conditions_found/   
Published: 2013 12 03 23:10:59
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Bochspwn: Exploiting Kernel Race Conditions Found via Memory Access Patterns - Mateusz "j00ru" Jurczyk and Gynvael Coldwind (May 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1s14rw/bochspwn_exploiting_kernel_race_conditions_found/   
Published: 2013 12 03 23:10:59
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: PS4 jailbreak - published about 11 years ago.
Content: I'm taking NO CREDIT for this jailbreak. This jailbreak was done by @reckz0r ______                 _             _____        | ___ \               | |           |  _  |       | |_/ /   ___    ___  | | __  ____  | |/' |  _ __ |    /   / _ \  / __| | |/ / |_  /  |  /| | | '__|| |\ \  |  __/ | (__  |   &lt;   / /   \ |_/ / | |   2011-present\_| \_|  \___|  \_...
http://trojan7malware.blogspot.com/2013/12/ps4-jailbreak.html   
Published: 2013 12 01 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: PS4 jailbreak - published about 11 years ago.
Content: I'm taking NO CREDIT for this jailbreak. This jailbreak was done by @reckz0r ______                 _             _____        | ___ \               | |           |  _  |       | |_/ /   ___    ___  | | __  ____  | |/' |  _ __ |    /   / _ \  / __| | |/ / |_  /  |  /| | | '__|| |\ \  |  __/ | (__  |   &lt;   / /   \ |_/ / | |   2011-present\_| \_|  \___|  \_...
http://trojan7malware.blogspot.com/2013/12/ps4-jailbreak.html   
Published: 2013 12 01 11:45:00
Received: 2021 06 06 09:05:03
Feed: Trojan7Malware
Source: Trojan7Malware
Category: Cyber Security
Topic: Cyber Security
Article: Sigreturn Oriented Programming (Erik Bosman's OHM2013 work) - published about 11 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpvzh/sigreturn_oriented_programming_erik_bosmans/   
Published: 2013 11 29 17:19:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: Sigreturn Oriented Programming (Erik Bosman's OHM2013 work) - published about 11 years ago.
Content: submitted by /u/turnersr [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpvzh/sigreturn_oriented_programming_erik_bosmans/   
Published: 2013 11 29 17:19:55
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: KASLR Bypass Mitigations in Windows 8.1 - Alex Ionescu (November 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpsj5/kaslr_bypass_mitigations_in_windows_81_alex/   
Published: 2013 11 29 16:29:41
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Article: KASLR Bypass Mitigations in Windows 8.1 - Alex Ionescu (November 2013) - published about 11 years ago.
Content: submitted by /u/HockeyInJune [link] [comments]
https://www.reddit.com/r/vrd/comments/1rpsj5/kaslr_bypass_mitigations_in_windows_81_alex/   
Published: 2013 11 29 16:29:41
Received: 2021 06 06 11:29:11
Feed: Vulnerability Research and Development
Source: Vulnerability Research and Development
Category: Alerts
Topic: Vulnerabilities
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: XPATH Injection Tutorial - published about 11 years ago.
Content: XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner. We are gonna learn using simple example. Downloa...
https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html   
Published: 2013 11 29 13:14:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: XPATH Injection Tutorial - published about 11 years ago.
Content: XPath is a language that has been designed and developed to operate on data that is described with XML. The XPath injection allows an attacker to inject XPath elements in a query that uses this language. Some of the possible goals are to bypass authentication or access information in an unauthorized manner. We are gonna learn using simple example. Downloa...
https://tipstrickshack.blogspot.com/2013/11/xpath-injection-tutorial.html   
Published: 2013 11 29 13:14:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Episode #172: Who said bigger is better? - published about 11 years ago.
Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &amp;c), ...
http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html   
Published: 2013 11 26 09:18:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Episode #172: Who said bigger is better? - published about 11 years ago.
Content: Tim sweats the small stuff Ted S. writes in: "I have a number of batch scripts which turn a given input file into a configurable amount of versions, all of which will contain identical data content, but none of which, ideally, contain the same byte content. My problem is, how do I, using *only* XP+ cmd (no other scripting - PowerShell, jsh, wsh, &amp;c), ...
http://blog.commandlinekungfu.com/2013/11/episode-172-who-said-bigger-is-better.html   
Published: 2013 11 26 09:18:00
Received: 2023 03 31 08:44:32
Feed: Command Line Kung Fu
Source: Command Line Kung Fu
Category: News
Topic: Security Tooling
Article: Broken Authentication & Session Management in Mutillidae - published about 11 years ago.
Content: Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection. Authentication Bypass Privilege Escalation Username Enumeration We have already covered Username enumeration in last article &amp; we got valid username list which exist in database. Today we are going to use a...
https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html   
Published: 2013 11 20 08:34:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Broken Authentication & Session Management in Mutillidae - published about 11 years ago.
Content: Broken Authentication and Session Management is on number 2 in OWASP Top 10 vulnerability list 2013. In mutillidae , it contain three subsection. Authentication Bypass Privilege Escalation Username Enumeration We have already covered Username enumeration in last article &amp; we got valid username list which exist in database. Today we are going to use a...
https://tipstrickshack.blogspot.com/2013/11/broken-authentication-session.html   
Published: 2013 11 20 08:34:00
Received: 2024 02 20 16:42:59
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Critical Infrastructure Beyond the Power Grid - published about 11 years ago.
Content: The term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital Pearl Harbor," "Cyber 9/11," "SCADA" and "Stuxnet." With "critical infrastructure" thrown about in references to cyber threats nearly every week, we thought it was time for a closer look at just what the te...
http://www.fireeye.com/blog/threat-research/2013/11/critical-infrastructure-power-grid.html   
Published: 2013 11 19 21:26:40
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Article: Critical Infrastructure Beyond the Power Grid - published about 11 years ago.
Content: The term "critical infrastructure" has earned its spot on the board of our ongoing game of cyber bingo--right next to "Digital Pearl Harbor," "Cyber 9/11," "SCADA" and "Stuxnet." With "critical infrastructure" thrown about in references to cyber threats nearly every week, we thought it was time for a closer look at just what the te...
http://www.fireeye.com/blog/threat-research/2013/11/critical-infrastructure-power-grid.html   
Published: 2013 11 19 21:26:40
Received: 2021 06 06 09:05:12
Feed: FireEye Blog
Source: FireEye Blog
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: How Cyber Insurance Can Guard Enterprises Against Class Action Lawsuits - published about 11 years ago.
Content:
https://www.securitymagazine.com/articles/84951-how-cyber-insurance-can-guard-enterprises-against-class-action-lawsuits   
Published: 2013 11 18 06:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: How Cyber Insurance Can Guard Enterprises Against Class Action Lawsuits - published about 11 years ago.
Content:
https://www.securitymagazine.com/articles/84951-how-cyber-insurance-can-guard-enterprises-against-class-action-lawsuits   
Published: 2013 11 18 06:00:00
Received: 2021 04 25 02:14:07
Feed: Security Magazine – Reports
Source: Security Magazine
Category: Reports
Topic: Cyber Security
Article: How to solve compile error in veil? - published about 11 years ago.
Content: As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload. pure windows/meterpreter/reverse_tcp stager, no shellcode pure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcode...
https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html   
Published: 2013 11 16 11:59:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: How to solve compile error in veil? - published about 11 years ago.
Content: As you know, veil is AV evasion framework for metasploit payload. On the 15th of every month, for the next year, at least one new payload module will be released.Yesterday they released two new payload. pure windows/meterpreter/reverse_tcp stager, no shellcode pure windows/meterpreter/reverse_tcp windows service stager compatible with psexec, no shellcode...
https://tipstrickshack.blogspot.com/2013/11/how-to-solve-compile-error-in-veil.html   
Published: 2013 11 16 11:59:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: Username Enumeration in Mutillidae using Burpe Intruder. - published about 11 years ago.
Content: Mutillidae  is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account. In M...
https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html   
Published: 2013 11 11 07:46:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: Username Enumeration in Mutillidae using Burpe Intruder. - published about 11 years ago.
Content: Mutillidae  is a free, open source, vulnerable web-application providing a target for web-security tester. Mutillidae can be installed on Linux and Windows using LAMP, WAMP, and XAMMP. Username Enumeration :- We have an application that will reveal to us when a username exists on the system which can be used in further step like brute-force account. In M...
https://tipstrickshack.blogspot.com/2013/11/username-enumeration-in-mutillidae.html   
Published: 2013 11 11 07:46:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Marketplace Benchmark
Cyber Tzar Marketplace Benchmark
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained
Article: List of Differnet AV evasion Frameworks. - published about 11 years ago.
Content: Today we are gonna talk about different AV evasion frameworks for metasploit payload &amp; how to use them? It`s very imporatant when you know which AV you have to bypass, because we don`t have to worry about FUD. Some payload can bypass specific AV ; while other AV can not be bypassed using that payload. (1)Veil:- Veil is python based tool which create ...
https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html   
Published: 2013 10 30 10:20:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Article: List of Differnet AV evasion Frameworks. - published about 11 years ago.
Content: Today we are gonna talk about different AV evasion frameworks for metasploit payload &amp; how to use them? It`s very imporatant when you know which AV you have to bypass, because we don`t have to worry about FUD. Some payload can bypass specific AV ; while other AV can not be bypassed using that payload. (1)Veil:- Veil is python based tool which create ...
https://tipstrickshack.blogspot.com/2013/10/list-of-differnet-av-evasion-frameworks.html   
Published: 2013 10 30 10:20:00
Received: 2024 02 20 16:43:00
Feed: Hacking and Tricks
Source: Hacking and Tricks
Category: Cyber Security
Topic: Cyber Security
Cyber Tzar Benchmark Summary
Cyber Tzar Benchmark Summary
Cyber Tzar Top Ten Vulnerabilities Explained
Cyber Tzar Top Ten Vulnerabilities Explained

All Articles

Ordered by Date Published
Page: << < 8,709 (of 8,729) > >>

Total Articles in this collection: 436,476


  • "All Articles" links back to the front page, effectivly the Planet "Home Page"; shows all articles, with no selections, or groupings.
  • Default date ordering is by "Received Date" (due to not all RSS feeds having a "Published Date").
  • Only Published Date selections use the articles Published Date.
  • The first page always shows fifty items plus from zero to up to a remaining forty-nine items, before they are commited permently to the next page.
  • All subsequent pages show fifty items.
  • Pagination is in reverse ordering (so that pages are permamenent links, aka "permalinks", to their content).
  • "<<" moves you to the first page (aka newest articles)
  • ">>" moves you to the last page (aka oldest articles)
  • "<" moves you to the previous page (aka newer articles)
  • ">" moves you to the next page (aka older articles)
  • Return to the top of this page Go Now

Custom HTML Block

Click to Open Code Editor