Writeup on how I solved that Danish Intelligence CrackMe that was posted a while ago with Radare2 and Custom plugins.
http://ift.tt/2g0FxNg
Submitted August 22, 2017 at 05:08AM by safiire
via reddit http://ift.tt/2ikgjKv
http://ift.tt/2g0FxNg
Submitted August 22, 2017 at 05:08AM by safiire
via reddit http://ift.tt/2ikgjKv
safiire.github.io
Solving a Danish Defense Intelligence Puzzle - Irken Kitties
While I was browsing the Reverse Engineering sub on Reddit a few months ago, I came across a puzzle that the poster said came from a Danish newspaper …
[TUTORIAL] Custom x86 linux shellcode encoding
http://ift.tt/2winzMJ
Submitted August 22, 2017 at 04:51AM by _____WINTERMUTE_____
via reddit http://ift.tt/2x7eSCA
http://ift.tt/2winzMJ
Submitted August 22, 2017 at 04:51AM by _____WINTERMUTE_____
via reddit http://ift.tt/2x7eSCA
A Look at JS_POWMET, a Completely Fileless Malware
http://ift.tt/2uZlRyu
Submitted August 22, 2017 at 07:07AM by RingZeroLabs
via reddit http://ift.tt/2vYvEU7
http://ift.tt/2uZlRyu
Submitted August 22, 2017 at 07:07AM by RingZeroLabs
via reddit http://ift.tt/2vYvEU7
TrendLabs Security Intelligence Blog
A Look at JS_POWMET, a Completely Fileless Malware - TrendLabs Security Intelligence Blog
As cybercriminals start to focus on pulling off attacks without leaving a trace, fileless malware will become a more common attack method. However, many of these malware are fileless only while entering a user’s system, as they eventually reveal themselves…
Seamless Campaign Uses RIG EK to Drop Ramnit Trojan
http://ift.tt/2xmxkGx
Submitted August 22, 2017 at 07:04AM by majorllama
via reddit http://ift.tt/2vYy70Q
http://ift.tt/2xmxkGx
Submitted August 22, 2017 at 07:04AM by majorllama
via reddit http://ift.tt/2vYy70Q
MALWARE BREAKDOWN
Seamless Campaign Uses RIG EK to Drop Ramnit Trojan
Below is a partial and edited flowchart of the malvertising chain that I got during this infection: An edited image of the infection chain is shown below: You can see that the Ramnit sample seems t…
Awesome Security Gists : A curated list of cool GitHub gists related to security
http://ift.tt/2xmwABj
Submitted August 22, 2017 at 07:41AM by bnchandrapal
via reddit http://ift.tt/2xmcAPg
http://ift.tt/2xmwABj
Submitted August 22, 2017 at 07:41AM by bnchandrapal
via reddit http://ift.tt/2xmcAPg
GitHub
Hack-with-Github/Awesome-Security-Gists
Contribute to Awesome-Security-Gists development by creating an account on GitHub.
Return of WannaCry? LG Hit by Ransomware Attack
http://ift.tt/2x671VB
Submitted August 22, 2017 at 12:12PM by InfoSecCrazy
via reddit http://ift.tt/2wzkBTI
http://ift.tt/2x671VB
Submitted August 22, 2017 at 12:12PM by InfoSecCrazy
via reddit http://ift.tt/2wzkBTI
itsecuritycentral.teramind.co
Return of WannaCry? LG Hit by Ransomware Attack | IT Security Central
On Wednesday August 16th representatives for LG South Korea have confirmed they were the victim of a cyber attack, which hit them on Monday morning. The
Bitdefender Anti-Virus: Heap Buffer Overflow via 7z LZMA
http://ift.tt/2vZRXJ2
Submitted August 22, 2017 at 05:38PM by landave
via reddit http://ift.tt/2wjCJ4g
http://ift.tt/2vZRXJ2
Submitted August 22, 2017 at 05:38PM by landave
via reddit http://ift.tt/2wjCJ4g
landave's blog
Bitdefender: Heap Buffer Overflow via 7z LZMA
Blog about anti-virus software and its issues.
The Rise of Chinese DDoS Platforms
http://ift.tt/2wb7LuB
Submitted August 22, 2017 at 06:05PM by RingZeroLabs
via reddit http://ift.tt/2ilSVfy
http://ift.tt/2wb7LuB
Submitted August 22, 2017 at 06:05PM by RingZeroLabs
via reddit http://ift.tt/2ilSVfy
Talosintelligence
Booters with Chinese Characteristics: The Rise of Chinese Online DDoS Platforms
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
A Non-Interactive Zero-Knowledge Capture the Flag Platform
http://ift.tt/2vjHOoB
Submitted August 22, 2017 at 07:38PM by Kinost
via reddit http://ift.tt/2wv0FCd
http://ift.tt/2vjHOoB
Submitted August 22, 2017 at 07:38PM by Kinost
via reddit http://ift.tt/2wv0FCd
reddit
A Non-Interactive Zero-Knowledge Capture the Flag Platform • r/netsec
2 points and 0 comments so far on reddit
shadow v2 - jemalloc heap exploitation framework
http://ift.tt/2vViMjf
Submitted August 22, 2017 at 09:28PM by secaggr
via reddit http://ift.tt/2vWbn3j
http://ift.tt/2vViMjf
Submitted August 22, 2017 at 09:28PM by secaggr
via reddit http://ift.tt/2vWbn3j
Census-Labs
CENSUS | IT Security Works
About four months ago (April 2017), Vasilis Tsaousoglou and myself presented our work on exploiting Android's libc allocator at the 2017 INFILTRATE conference (Miami, Florida). Since version 5.0, Android has adopted the jemalloc allocator as its default libc…
Hijacking Control of Wireless Mice and Keyboards
http://ift.tt/2x9zESb
Submitted August 22, 2017 at 09:25PM by ForgottenWatchtower
via reddit http://ift.tt/2vbtrn4
http://ift.tt/2x9zESb
Submitted August 22, 2017 at 09:25PM by ForgottenWatchtower
via reddit http://ift.tt/2vbtrn4
Toshellandback
Peripheral Pwnage
On internal engagements, poisoning name resolution requests on the local network (à la Responder) is one of the tried and true methods of obtaining that coveted set of initial Domain credentials. While this approach has worked on many clients, what if Link…
Exploiting Industrial Collaborative Robots
http://ift.tt/2wAfl25
Submitted August 22, 2017 at 09:22PM by didnotseethatcoming
via reddit http://ift.tt/2wBcBSi
http://ift.tt/2wAfl25
Submitted August 22, 2017 at 09:22PM by didnotseethatcoming
via reddit http://ift.tt/2wBcBSi
Ioactive
Exploiting Industrial Collaborative Robots
By Lucas Apa (@lucasapa) Traditional industrial robots are boring. Typically, they are autonomous or operate with limited guidance and e...
The ROPEMAKER Email Exploit
http://ift.tt/2xq8Qfq
Submitted August 23, 2017 at 02:17AM by campuscodi
via reddit http://ift.tt/2wCisqC
http://ift.tt/2xq8Qfq
Submitted August 23, 2017 at 02:17AM by campuscodi
via reddit http://ift.tt/2wCisqC
Turn Kali Linux into an Intercepting Router
http://ift.tt/2xqWLGS
Submitted August 23, 2017 at 06:18AM by koentje987
via reddit http://ift.tt/2wwxZc4
http://ift.tt/2xqWLGS
Submitted August 23, 2017 at 06:18AM by koentje987
via reddit http://ift.tt/2wwxZc4
GitHub
koenbuyens/kalirouter
kalirouter - intercepting kali router
Adapting Burp Extensions for Tailored Pentesting
http://ift.tt/2ip8yTu
Submitted August 23, 2017 at 07:17PM by albinowax
via reddit http://ift.tt/2ir4ceK
http://ift.tt/2ip8yTu
Submitted August 23, 2017 at 07:17PM by albinowax
via reddit http://ift.tt/2ir4ceK
blog.portswigger.net
Adapting Burp Extensions for Tailored Pentesting
Burp Suite is privileged to serve as a platform for numerous extensions developed and shared by our community of users. These expand Burp’s ...
Analyzing Obfuscated Locky Ransomware Downloader
http://ift.tt/2xdOZku
Submitted August 24, 2017 at 03:56AM by RingZeroLabs
via reddit http://ift.tt/2xdLCdn
http://ift.tt/2xdOZku
Submitted August 24, 2017 at 03:56AM by RingZeroLabs
via reddit http://ift.tt/2xdLCdn
Ringzerolabs
Analyzing Obfuscated Locky Ransomware Downloader
Today we analyze a malicious HTML document that claims the user must download a compatibility plugin in order to view the UPS receipt.
Sysmon View: Tracking and Visualizing Sysmon Logs
http://ift.tt/2wG9Gri
Submitted August 24, 2017 at 03:03AM by myvrcosplay
via reddit http://ift.tt/2irFUkB
http://ift.tt/2wG9Gri
Submitted August 24, 2017 at 03:03AM by myvrcosplay
via reddit http://ift.tt/2irFUkB
Cyber Security Guides, Reviews and News
Sysmon View: Tracking and Visualizing Sysmon Logs - Cyber Security Guides, Reviews and News
Sysmon Shell can aid in writing and applying Sysmon XML configuration through a simple GUI interface, it can also be used to learn more about Sysmon config
Why free AntiVirus is better than no AV and worse than paid AV
http://ift.tt/2xuPNk6
Submitted August 24, 2017 at 11:37AM by cryptoaustralia
via reddit http://ift.tt/2istjxz
http://ift.tt/2xuPNk6
Submitted August 24, 2017 at 11:37AM by cryptoaustralia
via reddit http://ift.tt/2istjxz
CryptoAUSTRALIA Blog
Why free AntiVirus is better than no AV and worse than paid AV
Most people favour free AV, because it is free but don't
understand the difference between them and paid stuff. This post
compares free AVs to paid AVs.
understand the difference between them and paid stuff. This post
compares free AVs to paid AVs.
CoMisSion - Python CMS Whitebox analysis
http://ift.tt/2uX7dJH
Submitted August 24, 2017 at 05:14PM by Upils
via reddit http://ift.tt/2wItdaI
http://ift.tt/2uX7dJH
Submitted August 24, 2017 at 05:14PM by Upils
via reddit http://ift.tt/2wItdaI
GitHub
Intrinsec/comission
comission - WhiteBox CMS analysis
Bypassing VirtualBox Process Hardening on Windows
http://ift.tt/2g5qDoT
Submitted August 24, 2017 at 06:53PM by albinowax
via reddit http://ift.tt/2itjGi9
http://ift.tt/2g5qDoT
Submitted August 24, 2017 at 06:53PM by albinowax
via reddit http://ift.tt/2itjGi9
googleprojectzero.blogspot.co.uk
Bypassing VirtualBox Process Hardening on Windows
Posted by James Forshaw, Project Zero Processes on Windows are securable objects, which prevents one user logged into a Windows machine...
Most Frequent Errors in Checkpoint Firewall Administration and How to Avoid Them
http://ift.tt/2xfFj92
Submitted August 24, 2017 at 08:20PM by Holylander
via reddit http://ift.tt/2w0Sgoz
http://ift.tt/2xfFj92
Submitted August 24, 2017 at 08:20PM by Holylander
via reddit http://ift.tt/2w0Sgoz