-
Oct 24, 2016
Using an IMSI-catcher and a Femtocell The security researcher Wanqiao Zhang of Qihoo 360 has published a research about a vulnerability in LTE networks. The attacks work through a series of messages sent between malicious base stations and targeted phones.… read more »
-
Oct 24, 2016
“If you know your enemies and know yourself, you will not be imperiled in a hundred battles” (Yes, it’s a quote by Sun Tzu) The GitHub account of infosecguerrilla is a precious source of information about malware. Into two repositories is… read more »
-
Oct 21, 2016
Any user can become root in less than 5 seconds! The bug has existed since Linux kernel version 2.6.22 and was found by Phil Oester. Exploitation of this bug does not leave any trace of anything abnormal happening to the logs. So… read more »
-
Oct 21, 2016
“Because understanding blockchains should not be a difficult task!” A very interesting Node.js project developed by Lauri Hartikka. Blockchain is a distributed database that maintains a continuously-growing list of records called blocks secured from tampering and revision. The blockchain format… read more »
-
Oct 20, 2016
A priceless resource! By chance I came across this site: [embed]http://maurogiuliani.free.fr/en/[/embed] If you omit to comment the extremely dated graphic, you can find out that it is a priceless resource that contains almost all production for guitar of Mauro Giuliani,… read more »
-
Oct 19, 2016
Yes, only []()!+ JSFuck is an esoteric programming language with a very limited set of characters: (,), [, ], +, !. The name is derived from Brainfuck, but the only similarity to Brainfuck is having a minimalistic alphabet. The challenge in JSFuck… read more »
-
Oct 18, 2016
The tool utilizes the Windows function ReadProcessMemory() in order to extract plain-text passwords from various target processes mimikittenz (the younger brother of Mimikatz?) provides a user-level extraction tool for sensitive data, focusing on running process memory address space: once a… read more »
-
Oct 17, 2016
This technique should improve the efficacy of existing correlation attacks with the monitoring of DNS traffic from Tor exit relays. Researchers at the KTH Royal Institute of Technology in Stockholm and Princeton University in the USA have unveiled a new attack… read more »