Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Dynamic analysis of Android applications :
Deploying release candidate
This is a guide to get DroidBox running. The release has only been tested on Linux and Mac OS. If you do not have the Android SDK, download it from http://developer.android.com/sdk/index.html. The following libraries are required: http://www.scipy.org/PyLab'>pylab and http://matplotlib.sourceforge.net/'>matplotlib to provide visualization of the analysis result.
1) Export the path for the SDK tools
export PATH=$PATH:/path/to/android-sdk/tools/ export PATH=$PATH:/path/to/android-sdk/platform-tools/
2) Download necessary files and uncompress it anywhere wget http://droidbox.googlecode.com/files/DroidBox411RC.tar.gz
3) Setup a new AVD targeting Android 4.1.2 and choose Nexus 4 as device as well as ARM as CPU type by running: android
4) Start the emulator with the new AVD: ./startemu.sh <AVD name>
5) When emulator has booted up, start analyzing samples (please use the absolute path to the apk): ./droidbox.sh <file.apk> <duration in secs (optional)>
6) The analysis is currently not automated except for installing and starting packages. Ending the analysis is simply done by pressing Ctrl-C. A package will also be implemented soon to populate the emulator with data prior to performing analysis.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Dynamic analysis of Android applications :
Deploying release candidate
This is a guide to get DroidBox running. The release has only been tested on Linux and Mac OS. If you do not have the Android SDK, download it from http://developer.android.com/sdk/index.html. The following libraries are required: http://www.scipy.org/PyLab'>pylab and http://matplotlib.sourceforge.net/'>matplotlib to provide visualization of the analysis result.
1) Export the path for the SDK tools
export PATH=$PATH:/path/to/android-sdk/tools/ export PATH=$PATH:/path/to/android-sdk/platform-tools/
2) Download necessary files and uncompress it anywhere wget http://droidbox.googlecode.com/files/DroidBox411RC.tar.gz
3) Setup a new AVD targeting Android 4.1.2 and choose Nexus 4 as device as well as ARM as CPU type by running: android
4) Start the emulator with the new AVD: ./startemu.sh <AVD name>
5) When emulator has booted up, start analyzing samples (please use the absolute path to the apk): ./droidbox.sh <file.apk> <duration in secs (optional)>
6) The analysis is currently not automated except for installing and starting packages. Ending the analysis is simply done by pressing Ctrl-C. A package will also be implemented soon to populate the emulator with data prior to performing analysis.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Android Developers
Download Android Studio & App Tools - Android Developers
Android Studio provides app builders with an integrated development environment (IDE) optimized for Android apps. Download Android Studio today.
π΅Cross Site Request Forgery vulnerability in McAfee :
https://dailycve.com/cross-site-request-forgery-vulnerability-mcafee
https://dailycve.com/cross-site-request-forgery-vulnerability-mcafee
Forwarded from UNDERCODE NEWS
CES 2021 is going to open online soon. Intel will take the opportunity to warm up the desktop Core.
#Technologies
#Technologies
Forwarded from UNDERCODE NEWS
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Automation FOrensics Tool (AFOT) is an automation tool build in Python and used for Windows Forensics in order to combine the following tools:
> AnalyzePESig (http://didierstevens.com/files/software/AnalyzePESig_V0_0_0_2.zip)
> National Software Reference Library reduced set (http://www.nsrl.nist.gov/RDS/rds_2.52/rds_252m.zip)
>NSRL Tool (http://didierstevens.com/files/software/nsrl_V0_0_2.zip)
>VirusTotal Search Tool (http://didierstevens.com/files/software/virustotal-search_V0_1_2.zip)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) https://github.com/harris21/afot
2) cd https://github.com/harris21/afot
3) now run python afot.py in your terminal.
So the procedure is pretty straight-forward:
The user provides the path, which will be used to analyze all the executables included in those folders/subfolders.
AnalyzePESig looks for signed executables, whom certificate will soon be revoked.
AFOT will collect all the non-signed executables and cross-check them with NSRL's hashset database, using the NSRL tool.
Last but not least, if any hashes were found to be in NSRL's hashset database too, we cross-check those hashes with VirusTotal, using the VirusTotal Search tool.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦The Automation FOrensics Tool (AFOT) is an automation tool build in Python and used for Windows Forensics in order to combine the following tools:
> AnalyzePESig (http://didierstevens.com/files/software/AnalyzePESig_V0_0_0_2.zip)
> National Software Reference Library reduced set (http://www.nsrl.nist.gov/RDS/rds_2.52/rds_252m.zip)
>NSRL Tool (http://didierstevens.com/files/software/nsrl_V0_0_2.zip)
>VirusTotal Search Tool (http://didierstevens.com/files/software/virustotal-search_V0_1_2.zip)
πΈπ½π π π°π»π»πΈπ π°π πΈπΎπ½ & π π π½ :
1) https://github.com/harris21/afot
2) cd https://github.com/harris21/afot
3) now run python afot.py in your terminal.
So the procedure is pretty straight-forward:
The user provides the path, which will be used to analyze all the executables included in those folders/subfolders.
AnalyzePESig looks for signed executables, whom certificate will soon be revoked.
AFOT will collect all the non-signed executables and cross-check them with NSRL's hashset database, using the NSRL tool.
Last but not least, if any hashes were found to be in NSRL's hashset database too, we cross-check those hashes with VirusTotal, using the VirusTotal Search tool.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅FPWIN Pro provided by Panasonic Corporation contains an out-of-bounds read vulnerability:
https://dailycve.com/fpwin-pro-provided-panasonic-corporation-contains-out-bounds-read-vulnerability
https://dailycve.com/fpwin-pro-provided-panasonic-corporation-contains-out-bounds-read-vulnerability
Dailycve
FPWIN Pro provided by Panasonic Corporation contains an out-of-bounds read vulnerability. | CVE
Details:
FPWIN Pro is a PLC software programming application provided by Panasonic Corporation. FPWIN Pro has an out-of-bounds read loophole (CWE-125) that allows a user to open a specially designed project file to execute arbitrary javascript.
Vulnerability:β¦
FPWIN Pro is a PLC software programming application provided by Panasonic Corporation. FPWIN Pro has an out-of-bounds read loophole (CWE-125) that allows a user to open a specially designed project file to execute arbitrary javascript.
Vulnerability:β¦
Forwarded from UNDERCODE NEWS
OnePlus 8T devices are suffering from a serious error reported several times by users. Here's what happens and how to fix.
#Bugs
#Bugs
Forwarded from UNDERCODE NEWS
The 2021 Nest home surveillance camera product line is about to be launched by Google.
#Technologies
#Technologies
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DNS SPECIAL UTILITIES :
Β» dnsgram (https://doc.powerdns.com/md/manpages/dnsgram.1/): dnsgram is a debugging tool for intermittent resolver failures. it takes one or more input PCAP files and generates statistics on 5 second segments allowing the study of intermittent resolver issues.
Β» dnsreplaY (https://doc.powerdns.com/md/manpages/dnsreplay.1/): Dnsreplay takes recorded questions and answers and replays them to the specified nameserver and reporting afterwards which percentage of answers matched, were worse or better. Then compares the answers and some other metrics with the actual ones with those found in the dumpfile.
Β» dnsscan (https://doc.powerdns.com/md/manpages/dnsscan.1/): dnsscan takes one or more INFILEs in PCAP format and generates a list of the number of queries per query type.
Β» dnsscope (https://doc.powerdns.com/md/manpages/dnsscope.1/): dnsscope takes an input PCAP and generates some simple statistics outputs these to console.
Β» dnswasher (https://doc.powerdns.com/md/manpages/dnswasher.1/): dnswasher takes an input file in PCAP format and writes out a PCAP file, while obfuscating end-user IP addresses. This is useful to share data with third parties while attempting to protect the privacy of your users.
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦DNS SPECIAL UTILITIES :
Β» dnsgram (https://doc.powerdns.com/md/manpages/dnsgram.1/): dnsgram is a debugging tool for intermittent resolver failures. it takes one or more input PCAP files and generates statistics on 5 second segments allowing the study of intermittent resolver issues.
Β» dnsreplaY (https://doc.powerdns.com/md/manpages/dnsreplay.1/): Dnsreplay takes recorded questions and answers and replays them to the specified nameserver and reporting afterwards which percentage of answers matched, were worse or better. Then compares the answers and some other metrics with the actual ones with those found in the dumpfile.
Β» dnsscan (https://doc.powerdns.com/md/manpages/dnsscan.1/): dnsscan takes one or more INFILEs in PCAP format and generates a list of the number of queries per query type.
Β» dnsscope (https://doc.powerdns.com/md/manpages/dnsscope.1/): dnsscope takes an input PCAP and generates some simple statistics outputs these to console.
Β» dnswasher (https://doc.powerdns.com/md/manpages/dnswasher.1/): dnswasher takes an input file in PCAP format and writes out a PCAP file, while obfuscating end-user IP addresses. This is useful to share data with third parties while attempting to protect the privacy of your users.
β β β Uππ»βΊπ«Δπ¬πβ β β β
Forwarded from DailyCVE
π΅IBM WebSphere Extreme Scale CVE-2020-4336 :
https://dailycve.com/ibm-websphere-extreme-scale-cve-2020-4336
https://dailycve.com/ibm-websphere-extreme-scale-cve-2020-4336
Dailycve
IBM WebSphere Extreme Scale CVE-2020-4336 | CVE
Details:
IBM WebSphere Extreme Size stores private URL information.
About criteria. This can lead to disclosure of data if unauthorized parties do not using server logs, referrer headers or browser history, you have access to URLs.
Vulnerability:
β¦
IBM WebSphere Extreme Size stores private URL information.
About criteria. This can lead to disclosure of data if unauthorized parties do not using server logs, referrer headers or browser history, you have access to URLs.
Vulnerability:
β¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
They threw away hard drives containing 7,500 Bitcoins as garbage!
#International
#International
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Some good hacking plugins:
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Burp.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Chrome.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Firefox.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Immunity.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Volatility-Framework.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/OllyDbg.md
β β β Uππ»βΊπ«Δπ¬πβ β β β
π¦Some good hacking plugins:
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Burp.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Chrome.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Firefox.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Immunity.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/Volatility-Framework.md
https://github.com/Hack-with-Github/Powerful-Plugins/blob/master/OllyDbg.md
β β β Uππ»βΊπ«Δπ¬πβ β β β
GitHub
Powerful-Plugins/Burp.md at master Β· Hack-with-Github/Powerful-Plugins
Powerful plugins and add-ons for hackers. Contribute to Hack-with-Github/Powerful-Plugins development by creating an account on GitHub.
Forwarded from DailyCVE
Dailycve
41 bugs in Riot os | CVE
Details:
RIOT is a real-time multi-threading operating system that supports a range of devices that are typically found in the Internet of Things (IoT): 8-bit, 16-bit and 32-bit microcontrollers.
RIOT is based on the following design principles: energyβ¦
Forwarded from UNDERCODE NEWS
Forwarded from UNDERCODE NEWS
Forwarded from DailyCVE
π΅Multiple vulnerabilities in Delta Electronics HMI software:
https://dailycve.com/multiple-vulnerabilities-delta-electronics-hmi-software
https://dailycve.com/multiple-vulnerabilities-delta-electronics-hmi-software
Dailycve
Multiple vulnerabilities in Delta Electronics HMI software | CVE
Details:
There are multiple vulnerabilities in DOPSoft and CNCSoft ScreenEditor provided by Delta Electronics.
Vulnerabilities:
Out -of- bounds writing ( CWE-787 ) --CVE-2020-27275
CVSS v3 CVSS: 3.0 / AV: L / AC: L / PR: N / UI: R / S: U / C: H / I:β¦
There are multiple vulnerabilities in DOPSoft and CNCSoft ScreenEditor provided by Delta Electronics.
Vulnerabilities:
Out -of- bounds writing ( CWE-787 ) --CVE-2020-27275
CVSS v3 CVSS: 3.0 / AV: L / AC: L / PR: N / UI: R / S: U / C: H / I:β¦
Forwarded from UNDERCODE NEWS
In the first half of the year, Apple placed orders for suppliers to produce more than 95 million iPhones.
#Technologies
#Technologies