contagiodump.blogspot.com
contagio: OnionDuke samples
http://contagiodump.blogspot.com/2014/11/onionduke-samples.html
Mobile and print friendly view. Saturday, November 15, 2014. Research: F-Secure: OnionDuke: APT Attacks Via the Tor Network. Download. Email me if you need the password. Https:/ www.virustotal.com/en/file/366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b/analysis/. 2014-11-15 18:37:30 UTC ( 8 hours, 44 minutes ago ). Trojan.Win32.Agent.adYf. Backdoor.Win32.MiniDuke.x. Https:/ www.virustotal.com/en/file/366affd094cc63e2c19c5d57a6866b487889dab5d1b07c084fff94262d8a390b/analysis/. Aka "take a ...
contagiodump.blogspot.com
contagio: AlienSpy Java RAT samples and traffic information
http://contagiodump.blogspot.com/2014/11/alienspy-java-rat-samples-and-traffic.html
Mobile and print friendly view. Monday, November 17, 2014. AlienSpy Java RAT samples and traffic information. AlienSpy Java based cross platform RAT is another reincarnation of ever popular Unrecom/Adwind and Frutas RATs that have been circulating through 2014. The samples, pcaps, and traffic protocol information are available below. File: DB46ADCFAE462E7C475C171FBE66DF82 paymentadvice.jar. File: 01234.exe (Pony loader dropped by FAB8DE636D6F1EC93EEECAADE8B9BC68 - Transfer.jar. The following RAT config s...
pralab.diee.unica.it
home | PRA Lab
https://pralab.diee.unica.it/en
Skip to main content. Pattern Recognition and Applications LAB. Works on the development of next generation pattern recognition systems for real applications such as biometric authentication, text categorization, and intrusion detection in computer networks. PRA mission. Is to address fundamental issues for the development of future pattern recognition systems, in the context of real applications. We use Machine learning and Pattern recognition techniques in Multimedia Classification and Retrieval. On-li...
strazzere.com
Gather packets from your Android without ARP spoofing… | strazzere.com
http://www.strazzere.com/blog?p=286
Gather packets from your Android without ARP spoofing…. August 30, 2009, Tim. So a while back I had written about gathering packets from the android phone – often using simple ARP spoofing and Wireshark to grab all the traffic. Sadly I kept postponing this post and then just forgot to put it up, showing how to grab the packets in a much easier way, which doesn’t even require you to put your android phone on a WIFI network. On your computers shell/cmd;. Adb shell tcpdump -vv -s 0 -w /sdcard/output.cap.
mobilehackingexposed.com
Mobile Hacking Exposed Blog
http://mobilehackingexposed.com/category/mobile-hacking-exposed-blog
Resources & News. IPhone 5 fingerprint reader/Touch ID articles. September 24, 2013. A few articles (many quoting colleagues) with information on the new iPhone 5 fingerprint reader (aka. Apple Touch ID):. ARS Technica: TouchID Hacking commentary. Summary: it’s not easy). CNN – How iPhone 5S makes your finger into a password. ABC News – Does the iPhone 5S Fingerprint Sensor Make it More Secure? Ars Technica – Fingerprints as passwords: New iPhone Touch ID gets mixed security verdict. September 3, 2013.
hauntit.blogspot.com
Haunt IT: March 2015
http://hauntit.blogspot.com/2015_03_01_archive.html
HauntIT Blog - security testing and exploit development. Monday, 2 March 2015. EN] Analysing malicious PDF - part 2. This time we will check 2 PDFs (because I decide that it will be more fun than just posting about one ;) . Beside that - those 2 files contains different method for delivering the payload, so we will check all of them. Sunday, 1 March 2015. EN] Analyzing Malicious PDF. I found few examples of malicious PDF files. Today we will check one of them. :). Lets examine this by object 7.
hauntit.blogspot.com
Haunt IT: [EN] Analyzing Malicious PDF
http://hauntit.blogspot.com/2015/03/en-analyzing-malicious-pdf.html
HauntIT Blog - security testing and exploit development. Sunday, 1 March 2015. EN] Analyzing Malicious PDF. I found few examples of malicious PDF files. Today we will check one of them. :). During PDF analysis many times we will use peepdf. Also this time, those tool will help us to understand what's going on with. Let's run peepdf on this file. As we can see there is some JavaScript object. Let's examine this by " object 7". Now we will save this object in 1.txt. Shows us some encoded payload. Simple te...
iim-scb.blogspot.com
いろいろメモ: 2011/07
http://iim-scb.blogspot.com/2011_07_01_archive.html
Android Benchmark - Android 端末、スマートフォンやタブレットのベンチマークリスト. Android Benchmark - Android 端末、スマートフォンやタブレットのベンチマークリスト. Google Music betaにInvitation Requestを送った INITIAL M. Google Music betaにInvitation Requestを送った INITIAL M. ProXPN Create a FREE VPN account. ProXPN Create a FREE VPN account. Win32 QuickFixEngineering Class (Windows). Win32 QuickFixEngineering Class (Windows). Are All of My Servers Really Up to Date? Jonathan's Virtual Blog - Site Home - TechNet Blogs. Are All of My Servers Really Up to Date?
hauntit.blogspot.com
Haunt IT: [EN] Obfuscated case - JSredirector
http://hauntit.blogspot.com/2015/03/en-obfuscated-case-jsredirector.html
HauntIT Blog - security testing and exploit development. Sunday, 1 March 2015. EN] Obfuscated case - JSredirector. Today we'll check some "obfuscated" JavaScript code. I found this example (named. JSredirector') on this site. So Unzip the file and you will find index.html with JS code. Indexhtml contains encoded JS code:. Decoding (1st obfuscated) unescape(). Second one - trcat(). We can try to check by analysing code in JSDetox. Now, again using Burp, we will decode this string:. What do You think?
strazzere.com
strazzere.com | …it all can be reversed
http://www.strazzere.com/blog
Follow up on Android LKMs. 24 Jul 2014, Tim. As promised, I’ve posted a few Android LKMs over on github just now. Hopefully as time allows I’ll be able to commit more of my LKMs, however for the time being only two are ready to see the light of day. 8211; hopefully with just a little modification to the Makefile, you can have it compiling in no time. The second was an attempt to do. On a bit of a specific note, lots of LKM chatter is about rootkiting devices and how to get the. 20 Jul 2014, Tim. These ar...
SOCIAL ENGAGEMENT