sabato 2 novembre 2013

Proof. Cool & Free Tools / by Christos Beretas

Christos Beretas  Professional Web Site

Proof. Cool & Free Tools / by Christos Beretas

Christos Beretas  Professional Web Site

How to Erase Yourself From the Internet

How to Erase Yourself From the Internet

Critical Intel: Three Steps to Preventing USB Data Breaches

Critical Intel: Three Steps to Preventing USB Data Breaches 

Top 10 Wireshark Filters

Top 10 Wireshark Filters 

IGHASHGPU-SHA1/MD5/MD4 Bruteforcer for ATI & nVidia GPUs

SHA1/MD5/MD4 bruteforcer for ATI and nVidia GPUs

New Mac malware opens secure reverse shell | MacFixIt

New Mac malware opens secure reverse shell 

Malware Analysis with Dynamic Sandboxing

Malware Analysis with Dynamic Sandboxing

A Malware Classification

A Malware Classification -Kaspersky Daily | 

The badBIOS Analysis Is Wrong. at RootWyrm's Corner

The badBIOS Analysis Is Wrong. at RootWyrm's Corner

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Ethical Hacking and security tips

Error Based SQL Injection - Tricks In The Trade | Learn How To Hack - Ethical Hacking and security tips

venerdì 1 novembre 2013

The danger of cybersecurity 'ghettos'

The danger of cybersecurity 'ghettos' 

The Clean Theory | Symantec Connect Community

The Clean Theory | Symantec Connect Community

PCI Security Standards Council's Validated Point-To-Point Encryption

PCI Security Standards Council's Validated Point-To-Point Encryption

Resources for Aspiring Penetration Testers - NetSPI Blog

Resources for Aspiring Penetration Testers - NetSPI Blog

Network Intelligence Gathering - InfoSec Institute

Network Intelligence Gathering - InfoSec Institute

ImpressPages CMS v3.6 Remote Arbitrary File Deletion Vulnerability

ImpressPages CMS v3.6 Remote Arbitrary File Deletion Vulnerability 

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps |

Running Hyper-V Inside of VMWare Fusion

Running Hyper-V Inside of VMWare Fusion

Security Strategies Against Hacking Attacks

Security Strategies Against Hacking Attacks 

Hacking a Reporter: Writing Malware For Fun and Profit (Part 1 of 3) - SpiderLabs Anterior

Hacking a Reporter: Writing Malware For Fun and Profit (Part 1 of 3) - SpiderLabs Anterior

Me, You and the EU Cyber Security Directive | The State of Security

Me, You and the EU Cyber Security Directive | The State of Security

Errata Security: #badBIOS features explained

Errata Security: #badBIOS features explained

giovedì 31 ottobre 2013

SCADA Systems: Myths, Inaccuracies and Chaos Surrounding Our Critical Infrastructure

 SCADA Systems: Myths, Inaccuracies and Chaos Surrounding Our Critical Infrastructure

The Dark Side of Technology

The Dark Side of Technology

Blackhole, Supreme No More - F-Secure Weblog :

Blackhole, Supreme No More - F-Secure Weblog 

Cisco IPsec VPN breakage on Windows 8[.1] and OS X 10.9

Cisco IPsec VPN breakage on Windows 8[.1] and OS X 10.9

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

Meet “badBIOS,” the mysterious Mac and PC malware that jumps airgaps

5 Common Windows Hardening Misconfigurations

5 Common Windows Hardening Misconfigurations

Verifying Windows Kernel Vulnerabilities

Verifying Windows Kernel Vulnerabilities 

5 Steps to Turn Your PC into an Impenetrable Fortress.

5 Steps to Turn Your PC into an Impenetrable Fortress.

mercoledì 30 ottobre 2013

Cryptolocker Ransomware: What You Need To Know

Cryptolocker Ransomware: What You Need To Know 

PHP Hack Redirects To Magnitude Exploit Kit

PHP Hack Redirects To Magnitude Exploit Kit 

NIST updating Smart Grid Cybersecurity Guidelines

NIST updating Smart Grid Cybersecurity Guidelines 

sup MUA Command Injection

sup MUA Command Injection 

WordPress Curvo Shell Upload

WordPress Curvo Shell Upload 

sup Remote Command Execution

sup Remote Command Execution 

Google Play Billing Bypass

Google Play Billing Bypass 

Olat CMS 7.8.0.1 Cross Site Scripting

Olat CMS 7.8.0.1 Cross Site Scripting 

ProcessMaker Open Source Authenticated PHP Code Execution

ProcessMaker Open Source Authenticated PHP Code Execution 

martedì 29 ottobre 2013

The Ultimate Command Cheat Sheet for Metasploit's Meterpreter, Part 1

The Ultimate Command Cheat Sheet for Metasploit's Meterpreter, Part 1 «

Create Hidden Reverse Shell -by reusing an Open Port

Create hidden reverse shell by reusing an open port 

Command-line Forensics of hacked PHP.net

Command-line Forensics of hacked PHP.net 

Infection Rates and End of Support for Windows XP

Infection rates and end of support for Windows XP -

How to set up Web-based Network Traffic Monitoring System on Linux

 How to set up web-based network traffic monitoring system on Linux

Apache / PHP 5.x Remote Code Execution Exploit

Apache / PHP 5.x Remote Code Execution Exploit

Cannot Patch? Compensate, Mitigate, Terminate!

Cannot Patch? Compensate, Mitigate, Terminate!

Ransomware and Its Effect on IT

 Ransomware and Its Effect on IT

vFeed Open Source Aggregated Vulnerability Database v0.4.5 released (Support of CWE 2.5, OWASP- Snort ...

Vulnerability Database v0.4.5 released (support of CWE 2.5, OWASP Top 2013 & Snort rules)

Hunting FTP Password Stealer Malware

 Hunting FTP Password Stealer Malware

Netgear ReadyNAS Remote Command Execution

Netgear ReadyNAS Remote Command Execution 

User tracking with HTTP Redirect

User tracking with HTTP Redirect

MobileIron 4.5.4 Cross Site Scripting

MobileIron 4.5.4 Cross Site Scripting 

Stack and heap overflow detection at runtime via behavior analysis and PIN

Stack and heap overflow detection at runtime via behavior analysis and PIN