insanitybit.com
Guides Archives - InsanityBit
http://www.insanitybit.com/category/guide-2
Guides for setting up and maintaining systems. September 8, 2014. This is the fifth installment on a series of various sandboxing techniques that I’ve used in my own code to restrict an applications capabilities. You can find a shorter overview of these techniques here. This article will be discussing sandboxing with Apparmor. As discussed, root with full capabilities is quite dangerous – and in the case of SyslogParser quite a few of those capabilities are necessary. Etc/ld.so.cache mr,. Apparmor is inc...
scriptjunkie.us
Exploiting Ammyy Admin – developing an 0day « Thoughts on Security
https://www.scriptjunkie.us/2014/09/exploiting-ammyy-admin-developing-an-0day
Something about Network Security. Exploits, research profit! Laquo; Easy Smart Card SSH Setup. Replacing Passwords With EasyAuth. Exploiting Ammyy Admin – developing an 0day. For the past few years, a number of groups of scammers. As well as warnings from Ammyy itself on its website. Even though at least two groups have been prosecuted. Many more continue to operate. Ammyy Admin. The internet is also full of technical users who have trolled the scammers. Ammyy uses the same executable for sending and rec...