From China, With Love
Lest anyone think that D-Link is the only vendor who puts backdoors in their products, here’s one that can be exploited with a single ...
Burp SessionAuth Extension
Overview Normally a web application should identify a logged in user by data which is stored on the server side in some kind of session ...
Android Hack-Tool Steals PC Info
Over the weekend, Yeh, one of our Security Response Analysts, came across some interesting analysis on a Chinese language forum about an ...
The most sophisticated Android Trojan
Recently, an Android application came to us for analysis. At a glance, we knew this one was special. All strings in the DEX file were en...
Cracking Credit Card Hashes with PowerShell
As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...
Stupid Little IPv6 Tricks
With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...
Steps Toward Weaponizing the Android Platform
The mobile and tablet market have been flooded by millions upon millions of Android based devices. I wonder if Ken Thompson or Dennis Ritch...
Flexible Home Layout
Downloads[two]
Media[left]
Books[right]
Photos[carousel](6)
Accessories[combine]
Zebronics
Advertisements
Popular Posts
-
Anonymous What is Information security? Security means surety of not breaching personal information. It is also known as safegu...
-
With the IPv6 Summit on Friday, various IPv6 related topics are of course on my mind. So I figured to put together a quick laundry list o...
-
A total of 112 government websites in India were hacked from December to February, a federal minister said Wednesday, reflecting India...
-
Cybercriminals are uploading malicious Chrome browser extensions to the official Chrome Web Store and use them to hijack Facebook ac...
-
As penetration testers, we are frequently engaged to do penetration tests for PCI compliance. As a part of these penetration tests, w...
-
WSDL (Web Services Description Language) files are XML formatted descriptions about the operations of web services between clients and se...
-
Linux is a hacker’s dream computer operating system. It supports tons of tools and utilities for cracking passwords, scanning network ...
-
Today I want to share a little experience I had in reversing Samsung Smat TV's Firmware . I am not going to explain every step in det...
-
Many Facebook users were assaulted by the following message earlier today, seemingly shared by their online friends: There is a vi...
-
Top 5 Hot Security Jobs in 2012 for Hackers Information security is one of those rare fields - it has more job openings than people...