by admin
Monday, February 23rd, 2015 at 11:29 am
CVE-2015-0240 is a security flaw in the smbd file server daemon. It can be exploited by a malicious Samba client, by sending specially-crafted packets to the Samba server. No authenticated is required to exploit this flaw. It can result in remotely controlled execution of arbitrary code as root.
more info: https://securityblog.redhat.com/2015/02/23/samba-vulnerability-cve-2015-0240/
by admin
Sunday, July 13th, 2014 at 3:48 pm

Veil Framework recently added a payload delivery tool Veil-Catapult. Works like SMBexec with utilizing Veil-Evasion to generate AV-evading binaries, impacket to upload/host the binaries, and the passing-the-hash toolkit to trigger execution using temporary SMB server. :::Read more here::: & :::here:::
by admin
Friday, July 4th, 2014 at 1:28 pm

This Recon 2014 talk presents a firmware attack on an off-the-shelf hard drive. The implemented backdoor is capable of exfiltrating any data stored on the hard drive, through a network connection, without any modification of the system’s operating system or software. The talk laid out how the hard drive’s firmware is designed, and how the backdoor can interact with the firmware, and then explain how the backdoor can be remote-controlled, p. ex., through an installed web server.
Recon14_HDD.pdf
by admin
Friday, July 4th, 2014 at 1:00 pm

LIFX bulbs connect to a WiFi network in order to allow them to be controlled using a smart phone application. The research presented was performed against version 1.1 of the LIFX firmware.
::: Click Here :::
by admin
Sunday, November 3rd, 2013 at 6:03 pm
For Win2k/XP you can use this modified GINA stub. More information about how GINA works can be found in his excellent blog post.
For Vista/7 you can use this custom credential provider More information can be found in his blog post.
by admin
Tuesday, September 24th, 2013 at 10:20 pm
In April 2013, a piece of malware was found embedded in Freedom Hosting’s darknet server that would exploit a security hole in a particular web browser and execute code on the user’s computer. This code gathered some information about the user and sent it to a server in Virginia and then crashed – it had no obvious malicious intent that is so characteristic of malware. It was therefore theorised that the FBI, who have offices in Virginia, and who have ‘form’ for writing malware, may have authored it – this now appears to be true.
http://oweng.myweb.port.ac.uk/fbi-tor-malware-analysis/
by admin
Friday, September 13th, 2013 at 12:16 pm
Neat little trick to get internal IP address using HTML5 WebRTC from 2x.io blog. Which also can be used for nasty javascript to do internal attacks, on your router for instance. Check out the :::DEMO:::.
by admin
Friday, September 13th, 2013 at 10:59 am
carnal 0wnage blog has an “evil pass filter” .dll example that logs passwords to a textfile or http post every time someone changes their password on a windows box. Works on Windows 2000, XP all the way up to Windows 8 & 2012.
by admin
Thursday, May 30th, 2013 at 7:53 pm
by admin
Saturday, February 2nd, 2013 at 11:41 am