Exploitation

Mon
27
Jul

Mobile Malware

Created by Cameron Meyer

Mobile devices with networking capabilities are continuously increasing and users are utilizing these capabilities more. Just like traditional desktop and laptop computers, these mobile devices are vulnerable to attacks from hackers, viruses and other malware. As a result, mobile devices are being targeted by hackers, viruses and other malware entities at an alarming rate. The evolution of this malware has been rapid throughout its short lifespan thus far. This makes protection of mobile devices and preventing attacks and malicious programs imperative. The features of mobile devices allows them to function similarly to desktop and laptop computers and the information on them and transported by them must be protected with equal diligence.

This document is in PDF format. To view it click here.

Wed
22
Jul

JPEG Vulnerability: A day in the life of the JPEG Vulnerability

Contributed by Charles Hornat. An old paper I wrote over a decade ago.

This paper will provide a detailed analysis of the Buffer Overrun in JPEG Processing which started appearing on Microsoft software in September 2004.

Just a week prior to writing this paper, Microsoft announced a buffer overrun in JPEG processing in many of Microsoft’s software. This particular vulnerability increased the difficulty of patching for large organizations since it not only impacted operating systems, it also included many popular software packages such as Microsoft Office and development software such as Visual Studio .Net.

Tue
21
Jul

Stealing Passwords via Browser Refresh

Contributed by Karmendra Kohli and restored from the old Infosecwriters.com archive.

The browser’s back and refresh features can be used to steal passwords from insecurely written applications. This paper discusses the problem and the solution. We will show how a bad guy can access the user credentials of the previously logged in user by exploiting this feature, if the web application has not been developed securely.

This document is in PDF format. To view it click here.

Sat
18
Jul

All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS

Contributed by Mathy Vanhoef and Frank Piessens

We present new biases in RC4, break the Wi-Fi Protected Access Temporal Key Integrity Protocol (WPA-TKIP), and design a practical plaintext recovery attack against the Transport Layer Security (TLS) protocol. To empirically find new biases in the RC4 keystream we use statistical hypothesis tests. This reveals many new biases in the initial keystream bytes, as well as several new longterm biases. Our fixed-plaintext recovery algorithms are capable of using multiple types of biases, and return a list of plaintext candidates in decreasing likelihood.

Tue
14
Jul

HackingTeam's Remote Control System Whitepapers

Contributed by the anonymous hackers who exposed the HackingTeam

Here is a collection of papers created by the HackingTeam regarding Remote Control System. Remote Control System (RCS) is a solution designed to evade encryption by means of an agent directly installed on the device to monitor. Evidence collection on monitored devices is stealth and transmission of collected data from the device to the RCS server is encrypted and untraceable.

RCS installations are deployed at the Customer’s premises, thus guaranteeing to the Customer total control on its operations and security.

This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Exploitation