Heap Exploitation
This short book is written for people who want to understand the internals of 'heap memory', particularly the implementation of glibc's 'malloc' and 'free' procedures, and also for security researchers who want to get started in the field of heap exploitation.
https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details
This short book is written for people who want to understand the internals of 'heap memory', particularly the implementation of glibc's 'malloc' and 'free' procedures, and also for security researchers who want to get started in the field of heap exploitation.
https://www.gitbook.com/book/dhavalkapil/heap-exploitation/details
GitBook
Heap Exploitation · GitBook
heap-exploitation: This book on heap exploitation is a guide to understanding the internals of glibc's heap. It also describes, in detail, various attacks possible on the heap structure.
Locky ha vuelto. Esta vez vía spam robando más de 23 millones de email en solo 24 horas. https://t.co/YGykOS6Ayr #locky #spam
Bankinfosecurity
Locky Returns via Spam and Dropbox-Themed Phishing Attacks
A massive Locky ransomware campaign has been infecting devices via malware-laced spam messages as well as through fake Dropbox phishing pages. More than 23 million
Los #DDoS ya no son problema sólo para grandes empresas. Se han convertido en una amenaza también para #pymes https://t.co/qk5fOvJjXZ #DDoS
Dark Reading
7 Things to Know About Today's DDoS Attacks
DDoS attacks are no longer something that just big companies in a few industries need to worry about. They have become a threat to every business.
Server Directory Traversal at Huawei HG255s
https://youtu.be/n02toTFkLOU
https://youtu.be/n02toTFkLOU
YouTube
Server Directory Traversal at Huawei HG255s
Modem software version:
V100R001C163B025SP02
Exploit:
https://www.exploit-db.com/exploits/42634/
V100R001C163B025SP02
Exploit:
https://www.exploit-db.com/exploits/42634/
ShellBags Explorer 0.9.5.0 released!
https://binaryforay.blogspot.com.tr/2017/09/shellbags-explorer-0950-released.html
https://binaryforay.blogspot.com.tr/2017/09/shellbags-explorer-0950-released.html
Blogspot
ShellBags Explorer 0.9.5.0 released!
Changes in this version include: NEW: Additional GUIDs added NEW: Several new Shellbag types and extension blocks added NEW: SBECmd.exe ...
Tips for Reverse-Engineering Malicious Code – A New Cheat Sheet
https://zeltser.com/reverse-engineering-malicious-code-tips/
https://zeltser.com/reverse-engineering-malicious-code-tips/
Lenny Zeltser
Tips for Reverse-Engineering Malicious Code
Reversing malicious Windows executables involves examining static properties, identifying suspicious strings and API calls, performing behavioral analysis, and using disassemblers and debuggers. Key areas include understanding x86/x64 registers, common assembly…
The #ShadowBrokers Hacking Group Leaks #UNITEDRAKE, Another #Windows #Hacking Tool Stolen from #NSA 's Arsenal
https://thehackernews.com/2017/09/shadowbrokers-unitedrake-hacking.html
https://thehackernews.com/2017/09/shadowbrokers-unitedrake-hacking.html
The Hacker News
Shadow Brokers Leaks Another Windows Hacking Tool Stolen from NSA’s Arsenal
The Shadow Brokers hacking group has released UNITEDRAKE windows hacking malware to its monthly dump service subscribers.
Vulnerabilidad de ejecución de código en i-SENS SmartLog Diabetes Management Software #SCI https://t.co/754txSVJas
CERTSI
Vulnerabilidad de ejecución de código en i-SENS SmartLog Diabetes Management Software
El investigador independiente Mark Cross ha identificado en el producto de i-SENS una vulnerabilidad de ruta de busqueda no controlada, cuya explotación puede permitir a un atacante local ejecutar arbitrariamente código en el dispositivo afectado.
#Android #Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs - by @campuscodi
https://t.co/4muJRL4WGM
https://t.co/4muJRL4WGM
BleepingComputer
Android Oreo Bug Bypasses WiFi to Use Mobile Data and Incur Extra Costs
A bug discovered in the recently launched Android 8.0 Oreo spends users' mobile data allowance, even when the phone's mobile WiFi connection is enabled.
🎥 Entrevista de Marta Peirano a Edward Snowden:
1ª parte: https://www.youtube.com/watch?v=Glz2AqqDxao
2ª parte: https://www.youtube.com/watch?v=szDGHSAkA3k
#Filtraciones #Anonimato #Privacidad
1ª parte: https://www.youtube.com/watch?v=Glz2AqqDxao
2ª parte: https://www.youtube.com/watch?v=szDGHSAkA3k
#Filtraciones #Anonimato #Privacidad
YouTube
Edward Snowden en eldiario.es - primera parte
Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.
Un collectif #anonymous indique une #cyberattaque massive contre le #gouvernement Français le 12 septembre ! https://t.co/no02syA4wi https://t.co/jMdrGYKjwy
ZATAZ
Opération Anonymous contre le gouvernement Français, le 12 septembre - ZATAZ
Opération Anonymous : une cyberattaque d'envergure contre le gouvernement Français, le 12 septembre 2017.
#Google #Chrome Will Soon Warn You of Software That Performs #MitM Attacks - by @campuscodi
https://t.co/XALc7EOqMk
https://t.co/XALc7EOqMk
BleepingComputer
Google Chrome Will Soon Warn You of Software That Performs MitM Attacks
Google Chrome 63 will include a new security feature that will detect when third-party software is performing a Man-in-the-Middle (MitM) attack that hijacks the user's Internet connection.
A Beginner’s Guide to #Ethereum! #Bitcoin #Payments #Blockchain #Fintech #P2P #infosec #cryptocurrency #finserv #DLT #PX #Banking #Finance https://t.co/6MwuNMsoRS
Twitter
Social Fave
A Beginner’s Guide to #Ethereum! #Bitcoin #Payments #Blockchain #Fintech #P2P #infosec #cryptocurrency #finserv #DLT #PX #Banking #Finance