Article: 3057154 - Update to Harden Use of DES Encryption - Version: 1.1 - published almost 9 years ago. Content: Revision Note: V1.1 (December 8, 2015): Advisory updated to include more information about disabling DES by default in Windows 7 and Windows Server 2008 R2 and later operating systems. The update allows DES to be used between client and server to address scenarios in which DES is still required for application compatibility reasons.Summary: Microsoft is anno... https://technet.microsoft.com/en-us/library/security/3057154 Published: 2015 12 08 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: Modern Binary Attacks and Defences in the Windows Environment – Fighting Against Microsoft EMET in Seven Rounds by Zoltan L. Nemeth - published almost 9 years ago. Content: submitted by /u/turnersr [link] [comments] https://www.reddit.com/r/vrd/comments/3vgb0n/modern_binary_attacks_and_defences_in_the_windows/ Published: 2015 12 04 19:35:23 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
|
Article: MMD-0045-2015 - KDefend: a new ELF threat with a disclaimer - published almost 9 years ago. Content: https://blog.malwaremustdie.org/2015/12/mmd-0045-2015-kdefend-new-elf-threat.html Published: 2015 12 03 21:44:00 Received: 2021 06 06 09:04:55 Feed: Malware Must Die! Source: Malware Must Die! Category: Cyber Security Topic: Cyber Security |
|
Article: 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0 - published almost 9 years ago. Content: Revision Note: V1.0 (November 30, 2015): Advisory published.Summary: Microsoft is aware of unconstrained digital certificates from Dell Inc. for which the private keys were inadvertently disclosed. One of these unconstrained certificates could be used to issue other certificates, impersonate other domains, or sign code. In addition, these certificates could ... https://technet.microsoft.com/en-us/library/security/3119884 Published: 2015 11 30 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: Nmap 7 Released! - published about 9 years ago. Content: http://www.livehacking.com/2015/11/23/nmap-7-released/ Published: 2015 11 24 02:40:11 Received: 2021 06 06 09:04:45 Feed: LIVE HACKING Source: LIVE HACKING Category: Cyber Security Topic: Cyber Security |
|
Article: FLARE IDA Pro Script Series: Automating Function Argument Extraction - published about 9 years ago. Content: https://www.fireeye.com/blog/threat-research/2015/11/flare_ida_pro_script.html Published: 2015 11 16 13:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Security Alert for CVE-2015-4852 - 10 November 2015
- published about 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2015-4852-2763333.html Published: 2015 11 10 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: 3108638 - Update for Windows Hyper-V to Address CPU Weakness - Version: 1.0 - published about 9 years ago. Content: Revision Note: V1.0 (November 10, 2015): Advisory published.Summary: Microsoft is announcing the availability of a security update for Windows Hyper-V to protect against a denial of service condition that can be triggered with certain central processing unit (CPU) chipsets. Although the weakness resides in the chipset, Microsoft is issuing this security upda... https://technet.microsoft.com/en-us/library/security/3108638 Published: 2015 11 10 18:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Vulnerability Summary for the Week of November 2, 2015 - published about 9 years ago. Content: https://www.cisa.gov/news-events/bulletins/sb15-313 Published: 2015 11 09 21:11:41 Received: 2023 03 19 13:24:20 Feed: CISA Bulletins Source: Cybersecurity and Infrastructure Security Agency (CISA) Category: Bulletins Topic: Cyber Security |
Article: iBackDoor: High-Risk Code Hits iOS Apps - published about 9 years ago. Content: Introduction FireEye mobile researchers recently discovered potentially “backdoored” versions of an ad library embedded in thousands of iOS apps originally published in the Apple App Store. The affected versions of this library embedded functionality in iOS apps that used the library to display ads, allowing for potential malicious access to se... https://www.fireeye.com/blog/threat-research/2015/11/ibackdoor_high-risk.html Published: 2015 11 04 18:00:00 Received: 2022 05 23 16:06:45 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: XcodeGhost S: A New Breed Hits the US - published about 9 years ago. Content: Just over a month ago, iOS users were warned of the threat to their devices by the XcodeGhost malware. Apple quickly reacted, taking down infected apps from the App Store and releasing new security features to stop malicious activities. Through continuous monitoring of our customers’ networks, FireEye researchers have found that, despite the quick ... https://www.fireeye.com/blog/threat-research/2015/11/xcodeghost_s_a_new.html Published: 2015 11 03 12:27:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: iBackDoor: High-risk Code Sneaks into the App Store - published about 9 years ago. Content: The library embeds backdoors in unsuspecting apps that make use of it to display ads, exposing sensitive data and functionality. The backdoors can be controlled remotely by loading JavaScript code from remote servers to perform the following actions: Capture audio and screenshots. Monitor and upload device location. Read/delete/create/modify file... https://www.fireeye.com/blog/threat-research/2015/10/ibackdoor_high-risk.html Published: 2015 10 26 13:51:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Critical Patch Update Advisory - October 2015
- published about 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html Published: 2015 10 20 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: Simple Method To Bypass Cloudflare - published about 9 years ago. Content: I get asked this question a lot so I thought I'd finally publish my response here for the sake of everyone. Cloudflare is the name of a company who provide DDoS protection to websites. They do this by basically filtering out the attack traffic from legitimate traffic so your site remains unaffected. They do this by inserting a proxy between your website and ... http://trojan7malware.blogspot.com/2015/10/simple-method-to-bypass-cloudflare.html Published: 2015 10 20 16:54:00 Received: 2023 03 31 23:02:32 Feed: Trojan7Malware Source: Trojan7Malware Category: Cyber Security Topic: Cyber Security |
|
Article: [IRCCloud] History and Another XSS Bug Bounty - published about 9 years ago. Content: Personally, I have been a user of IRC since 2004 on some private networks and some other well-known ones such as Freenode. However, it was always inconvenient to have to set up an IRC Bouncer, so when IRCCloud came around, I was excited to try it and see if it provided me with a method of staying connected to all the required networks without having to downl... https://penturalabs.wordpress.com/2015/10/14/irccloud-history-and-another-xss-bug-bounty/ Published: 2015 10 14 10:50:15 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: 2960358 - Update for Disabling RC4 in .NET TLS - Version: 2.0 - published about 9 years ago. Content: Revision Note: V2.0 (October 13, 2015): Advisory revised to broaden the affected software list to include Windows 10 systems that are running .NET Framework 3.5 applications and systems with .NET Framework 4.6 installed that are running .NET Framework 4.5/4.5.1/4.5.2 applications, and to provide customers running these configurations with steps for manually ... https://technet.microsoft.com/en-us/library/security/2960358 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: 3097966 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 2.0 - published about 9 years ago. Content: Revision Note: V2.0 (October 13, 2015): Advisory revised to notify customers that an update is available that modifies the Code Integrity component in Windows to extend trust removal for the four digital certificates addressed by this advisory to also preclude kernel-mode code signing.Summary: Microsoft is aware of four digital certificates that were inadver... https://technet.microsoft.com/en-us/library/security/3097966 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: 3042058 - Update to Default Cipher Suite Priority Order - Version: 1.1 - published about 9 years ago. Content: Revision Note: V1.1 (October 13, 2015): Advisory revised to announce that the Default Cipher Suite Prioritization update (3042058), originally released May 12, 2015 via the Microsoft Download Center (DLC) only, is now also available via Microsoft Update (MU) and Windows Server Update Services (WSUS). This is an update offering venue change only. There were n... https://technet.microsoft.com/en-us/library/security/3042058 Published: 2015 10 13 17:00:00 Received: 2022 04 14 18:03:36 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: How to become a pentester - published about 9 years ago. Content: https://www.corelan.be/index.php/2015/10/13/how-to-become-a-pentester/?utm_source=rss&utm_medium=rss&utm_campaign=how-to-become-a-pentester Published: 2015 10 13 12:30:35 Received: 2023 01 18 09:44:47 Feed: Corelan Team Source: Corelan Team Category: News Topic: Hacking |
|
Article: [IRCCloud] Inadequate input validation on API endpoint leading to self denial of service and increased system load - published about 9 years ago. Content: So as you do, I was just looking around, manually fuzzing some Web Sockets requests, seeing if I could get any sort of XSS, Remote IRC Command Injection or SQLi mainly – ended up that I didn’t find much there that worse worth noting. So I started seeing if their logic was all alright, so one of their requests looked similar to: {“_reqid”:1234, “cid”:5678, “t... https://penturalabs.wordpress.com/2015/10/13/fuzzing-for-fun-and-profit/ Published: 2015 10 13 12:04:47 Received: 2021 06 06 09:04:46 Feed: Pentura Labs's Blog Source: Pentura Labs's Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How I hacked my IP camera, and found this backdoor account - published about 9 years ago. Content: The time has come. I bought my second IoT device - in the form of a cheap IP camera. As it was the most affordable among all others, my expectations regarding security was low. But this camera was still able to surprise me. Maybe I will disclose the camera model used in my hack in this blog later, but first, I will try to contact someone regarding these i... https://jumpespjump.blogspot.com/2015/09/how-i-hacked-my-ip-camera-and-found.html Published: 2015 09 26 12:02:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
|
Article: Paypal Mobile Verification And Payment Restrictions Bypass - published about 9 years ago. Content: In this post, i would like to share a very simple logic flaw I found earlier this year I have found a way to circumvent mobile verification by utilizing a different portal for logging into a paypal account. The flaw lies in the fact that paypal does not perform two step verification/authorization checks on all different portals that are used to log into ... http://www.rafayhackingarticles.net/2015/09/paypal-mobile-verification-bypass.html Published: 2015 09 25 19:03:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: 3083992 - Update to Improve AppLocker Publisher Rule Enforcement - Version: 1.0 - published about 9 years ago. Content: Revision Note: V1.0 (September 8, 2015): Summary: Microsoft is announcing the availability of a defense-in-depth update that improves the enforcement of publisher rules by Windows AppLocker in Windows 7, Windows Server 2008 R2, Windows 8, Windows Server 2012, Windows 8.1, and Windows Server 2012 R2. The improvement is part of ongoing efforts to bolster the e... https://technet.microsoft.com/en-us/library/security/3083992 Published: 2015 09 08 17:00:00 Received: 2022 04 14 18:03:37 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
Article: 2015 FLARE-ON Challenge Solutions - published about 9 years ago. Content: The first few challenges narrowed the playing field drastically, with most serious contestants holding firm through challenges 4-9. The last two increased the difficulty level and proved a difficult final series of challenges for a well-earned finish line. The FLARE On Challenge always reaches a very wide international audience. Outside of the USA, ... https://www.fireeye.com/blog/threat-research/2015/09/flare-on_challenges.html Published: 2015 09 08 14:56:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: How to secure your home against "Internet of Things" and FUD - published over 9 years ago. Content: TL;DR, most of the security news about IoT is full of FUD. Always put the risks in context - who can exploit this and what can the attacker do with it. Most story only covers the latter. Introduction There is rarely a day without news that another "Internet of Things" got hacked. "Smart" safes, "smart" rifles, "smart" cars, "smart" fridges, "smart" TVs,... https://jumpespjump.blogspot.com/2015/08/how-to-secure-your-home-against.html Published: 2015 08 20 11:37:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
Article: Potao Express samples - published over 9 years ago. Content: http://www.welivesecurity.com/2015/07/30/operation-potao-express/ http://www.welivesecurity.com/wp-content/uploads/2015/07/Operation-Potao-Express_final_v2.pdf TL; DR 2011- July 2015 Aka Sapotao and node69 Group - Sandworm / Quedagh APT Vectors - USB, exe as doc, xls Victims - RU, BY, AM, GE Victims - MMM group, UA gov truecryptrussia.ru has be... https://contagiodump.blogspot.com/2015/08/potao-express-samples.html Published: 2015 08 12 12:24:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
Article: DEFCON 23 Badge Challenge - published over 9 years ago. Content: https://potatohatsecurity.tumblr.com/post/126411303994 Published: 2015 08 11 08:21:59 Received: 2021 06 06 09:04:58 Feed: Team PotatoSec Source: Team PotatoSec Category: Cyber Security Topic: Cyber Security |
|
Article: Windows Management Instrumentation (WMI) Offense, Defense, and Forensics - published over 9 years ago. Content: Windows Management Instrumentation (WMI) is a remote management framework that enables the collection of host information, execution of code, and provides an eventing system that can respond to operating system events in real time. FireEye has recently seen a surge in attacker use of WMI to carry out objectives such as system reconnaissance, remote... https://www.fireeye.com/blog/threat-research/2015/08/windows_managementi.html Published: 2015 08 08 18:45:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Mythbusters: Is an open (unencrypted) WiFi more dangerous than a WPA2-PSK? Actually, it is not. - published over 9 years ago. Content: Introduction Whenever security professionals recommend the 5 most important IT security practices to average users, one of the items is usually something like: “Avoid using open Wifi” or “Always use VPN while using open WiFi” or “Avoid sensitive websites (e.g. online banking) while using open WiFI”, etc. What I think about this? It is bullshit. But le... https://jumpespjump.blogspot.com/2015/07/mythbusters-is-open-unencrypted-wifi.html Published: 2015 07 23 13:59:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
|
Article: Second Adobe Flash Zero-Day CVE-2015-5122 from HackingTeam Exploited in Strategic Web Compromise Targeting Japanese Victims - published over 9 years ago. Content: On July 14, FireEye researchers discovered attacks exploiting the Adobe Flash vulnerability CVE-2015-5122, just four days after Adobe released a patch. CVE-2015-5122 was the second Adobe Flash zero-day revealed in the leak of HackingTeam’s internal data. The campaign targeted Japanese organizations by using at least two legitimate Japanese websites... https://www.fireeye.com/blog/threat-research/2015/07/second_adobe_flashz.html Published: 2015 07 19 20:00:00 Received: 2022 05 23 16:06:46 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Building a exploit for CVE-2015-5090 - SYSTEM-level code execution in Adobe Reader - published over 9 years ago. Content: submitted by /u/RedmondSecGnome [link] [comments]... https://www.reddit.com/r/vrd/comments/3dibtp/building_a_exploit_for_cve20155090_systemlevel/ Published: 2015 07 16 14:36:46 Received: 2021 06 06 11:29:11 Feed: Vulnerability Research and Development Source: Vulnerability Research and Development Category: Alerts Topic: Vulnerabilities |
Article: Oracle Critical Patch Update Advisory - July 2015
- published over 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html Published: 2015 07 14 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
|
Article: 3074162 - Vulnerability in Microsoft Malicious Software Removal Tool Could Allow Elevation of Privilege - Version: 1.0 - published over 9 years ago. Content: Severity Rating: ImportantRevision Note: V1.0 (July 14, 2015): Advisory publishedSummary: Microsoft is releasing this security advisory to inform customers that an update to the Microsoft Malicious Software Removal Tool (MSRT) is available that addresses a security vulnerability that was reported to Microsoft. The vulnerability could allow elevation of privi... https://technet.microsoft.com/en-us/library/security/3074162 Published: 2015 07 14 17:00:00 Received: 2022 04 14 18:03:37 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Three New Masque Attacks against iOS: Demolishing, Breaking and Hijacking - published over 9 years ago. Content: In the recent release of iOS 8.4, Apple fixed several vulnerabilities including vulnerabilities that allow attackers to deploy two new kinds of Masque Attack (CVE-2015-3722/3725, and CVE-2015-3725). We call these exploits Manifest Masque and Extension Masque, which can be used to demolish apps, including system apps (e.g., Apple Watch, Health, Pay ... https://www.fireeye.com/blog/threat-research/2015/06/three_new_masqueatt.html Published: 2015 06 30 14:00:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: 2962393 - Update for Vulnerability in Juniper Networks Windows In-Box Junos Pulse Client - Version: 2.0 - published over 9 years ago. Content: Revision Note: V2.0 (June 9, 2015): Added the 3062760 update to the Juniper VPN Client Update section.Summary: Microsoft is announcing the availability of an update for the Juniper Networks Windows In-Box Junos Pulse Client for Windows 8.1 and Windows RT 8.1. The update addresses a vulnerability in the Juniper VPN client by updating the affected Juniper VPN ... https://technet.microsoft.com/en-us/library/security/2962393 Published: 2015 06 09 17:00:00 Received: 2022 04 14 18:03:37 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: List open ports and listening services - published over 9 years ago. Content: https://www.techrepublic.com/article/list-open-ports-and-listening-services/#ftag=RSS56d97e7 Published: 2015 06 04 17:35:00 Received: 2021 06 06 09:05:21 Feed: IT Security Blog | TechRepublic Source: IT Security Blog | TechRepublic Category: Cyber Security Topic: Cyber Security |
|
Article: NitlovePOS: Another New POS Malware - published over 9 years ago. Content: There has been a proliferation of malware specifically designed to extract payment card information from Point-of-Sale (POS) systems over the last two years. In 2015, there have already been a variety of new POS malware identified including a new Alina variant, FighterPOS and Punkey. During our research into a widespread spam campaign, we dis... https://www.fireeye.com/blog/threat-research/2015/05/nitlovepos_another.html Published: 2015 05 23 18:05:00 Received: 2022 05 23 16:06:47 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: PHP Security Training Video - published over 9 years ago. Content: Topics Of the Course !!! what is the threat ? How can you Analyze the threat ? what Types of threats Are out there? How bad is it ? what Threats Are Specific to PHP? what are some resources to find out more ?? what are the Consequences when a website is not protected Against Attack? Financial loss Loss of Service identity Theft website ... http://hacking-share.blogspot.com/2015/05/php-security-training-video.html Published: 2015 05 22 09:45:00 Received: 2024 02 07 05:20:18 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: SQLi Dumper - Advanced SQL Injection\Scanner Tool v7.0 Private Version - published over 9 years ago. Content: Designed to be automated to find and exploit web security vulnerabilities in mass from worldwide! It is robust, works in the background threads and is super faster. Uses an advanced search engine with 10 different online search services. Last release: 06/23/2014 v.7.0 SQLi Dumper Features: -Suports 20 methods of SQL Injection; -Suports Multi. Onl... http://hacking-share.blogspot.com/2015/05/sqli-dumper-advanced-sql.html Published: 2015 05 20 09:40:00 Received: 2024 02 07 05:20:18 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Android Browser All Versions - Address Bar Spoofing Vulnerability - CVE-2015-3830 - published over 9 years ago. Content: Introduction Google security team themselves state that "We recognize that the address bar is the only reliable security indicator in modern browsers" and if the only reliable security indicator could be controlled by an attacker it could carry adverse affects, For instance potentially tricking users into supplying sensitive information to a malicious ... http://www.rafayhackingarticles.net/2015/05/android-browser-address-bar-spoofing-vulnerability.html Published: 2015 05 18 18:14:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Article: Oracle Security Alert for CVE-2015-3456 - 15 May 2015
- published over 9 years ago. Content: http://www.oracle.com/technetwork/topics/security/alert-cve-2015-3456-2542656.html Published: 2015 05 15 19:30:54 Received: 2021 06 06 09:03:27 Feed: Oracle Security Alerts Source: Oracle Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Best Wordlist sites - published over 9 years ago. Content: Best sites to Download wordlist... http://cyberwarzone.com/cyberwarfare/pas...word-lists http://hashcrack.blogspot.de/p/wordlist-...ds_29.html http://www.skullsecurity.org/wiki/index.php/Passwords http://packetstormsecurity.org/Crackers/wordlists/ http://www.isdpodcast.com/resources/62k-...-passwords http://g0tmi1k.blogspot.com/2011/06/dict..... http://hacking-share.blogspot.com/2015/05/best-wordlist-sites.html Published: 2015 05 15 08:40:00 Received: 2024 02 07 05:20:19 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: An Overview of Exploit Packs (Update 25) May 2015 - published over 9 years ago. Content: Update May 12, 2015 Added CVE-2015-0359 and updates for CVE-2015-0336 Exploit kit table 2014- 2015 (Sortable HTML table) Reference table : Exploit References 2014-2015 Update March 20, 2015 Added CVE-2015-0336 ------------------------ Update February 19, 2015 Added Hanjuan Exploit kit and CVE-2015-3013 for Angler Update... https://contagiodump.blogspot.com/2010/06/overview-of-exploit-packs-update.html Published: 2015 05 12 04:30:00 Received: 2024 03 13 18:00:19 Feed: contagio Source: contagio Category: Cyber Security Topic: Cyber Security |
|
Article: SQL Injection Bypassing handbook - published over 9 years ago. Content: Content writers :-Chapter I::: SQL Injection: What is it? SQL Injection: An In-depth Explanation Why is it possible to pass SQL queries directly to a database that is hidden behind a firewall and any other security mechanism? Is my database at risk to SQL Injection? What is the impact of SQL Injection? Example of a SQLInjection Attack WebApplication... http://hacking-share.blogspot.com/2015/05/sql-injection-bypassing-handbook.html Published: 2015 05 07 04:05:00 Received: 2024 02 07 05:20:19 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: Many ways of malware persistence (that you were always afraid to ask) - published over 9 years ago. Content: TL;DR: Are you into red teaming? Need persistence? This post is not that long, read it ;) Are you into blue teaming? Have to find those pesky backdoors? This post is not that long, read it ;) In the previous post, I listed different ways how a Windows domain/forest can be backdoored. In this new post, I am digging a bit deeper, and list the most common/... https://jumpespjump.blogspot.com/2015/05/many-ways-of-malware-persistence-that.html Published: 2015 05 05 06:32:00 Received: 2024 03 12 23:22:33 Feed: Jump ESP, jump! Source: Jump ESP, jump! Category: Cyber Security Topic: Cyber Security |
|
Article: Best Deface pages Collection - published over 9 years ago. Content: Don't Have Time for designing A Deface page .. ?? dont worry here you can download Best Deface Pages, Just replace the Name and messgae with your own name and message !! [Click on Download And Copy The Code, Then Use it, for demo you can paste the code on Pastehtml.com How to edit and save it... ?? All html codes are shared on pastebin, copy it and pas... http://hacking-share.blogspot.com/2015/05/best-deface-pages-collection.html Published: 2015 05 04 03:18:00 Received: 2023 04 02 10:42:08 Feed: Hacking Share Source: Hacking Share Category: Cyber Security Topic: Cyber Security |
|
Article: 3062591 - Local Administrator Password Solution (LAPS) Now Available - Version: 1.0 - published over 9 years ago. Content: Revision Note: V1.0 (May 1, 2015): V1.0 (May 1, 2015): Advisory published.Summary: Microsoft is offering the Local Administrator Password Solution (LAPS) that provides a solution to the issue of using a common local account with an identical password on every computer in a domain. LAPS resolves this issue by setting a different, random password for the commo... https://technet.microsoft.com/en-us/library/security/3062591 Published: 2015 05 01 17:00:00 Received: 2022 04 14 18:03:37 Feed: Latest Security Advisories Source: Latest Security Advisories Category: Alerts Topic: Vulnerabilities |
|
Article: Sucuri WAF XSS Filter Bypass - published over 9 years ago. Content: Introduction Sucuri Cloud Proxy is a very well known WAF capable of preventing DOS, SQL Injection, XSS and malware detection and prevention. It acts as a reverse proxy which means that all the traffic sent to an application behind Sucuri WAF would be first sent to Sucuri's network which (based upon it's signature database) would check if a particular req... http://www.rafayhackingarticles.net/2015/04/sucuri-waf-xss-filter-bypass.html Published: 2015 04 25 14:10:00 Received: 2024 02 17 13:21:46 Feed: Ethical Hacking - Rafayhackingarticles Source: Ethical Hacking - Rafayhackingarticles Category: Cyber Security Topic: Cyber Security |
|
Click to Open Code Editor