Why this blog
Hi People,I've decide to open this blog because not always i can explain all thought a video and the relative description box.Remember... i'm NOT an expert or a regular blogger and i make videos only...
View ArticleJoomla Plugin Exploit + PHP Malware
Garden Store has a vulnerable version (1.1.7) of virtuemart (Joomla plugin) and through a blind sql injection we can retrieve administrator credentials.We edit the main template and place into the...
View ArticleWordpress TimThumb Exploit (Remote Code Execution)
A lot of wordpress themes use timthumb script to resize images. From version 1.15 to 1.33 timthumb allow to external domains such as flickr.com to display remote images on your website .More detailed...
View ArticleOsCommerce Malware Infection
Three months ago is started a huge site infection campaign with lens oscommerce, a famous cms for medium/little on-line stores. This cms suffers of few vulnerabilities that can lead an attacker to...
View ArticleWordpress XSS Vulnerability + IE 8 Exploit
The 30th December of 2010 a guy named sneak reported a persistent XSS vulnerability that affect the popular blog cms wordpress <= 3.0.3.The problem is located into the kses.php file which is the...
View ArticleHave fun with scammers
A couple of days ago i've received this e-mail:After reading it i decided to go on and have some fun with him so i've replied and after one day i get the response.To convince me he attached four...
View ArticleUbuntu Server Exploit (Local Privilege Escalation)
Today we're gonna talk about an "old" vulnerability discovered by Dan Rosenberg in the linux kernel. This bug affect versions previous than 2.6.38 and permit to an user with low privileges to gain root...
View ArticleFoxit Reader PDF Exploit + Windows 7 Backdoor
This video show you how it is easy to install a backdoor (Meterpreter Service) on a Windows 7 pc throught a pdf and with the support of metasploit.Our victim uses an outdated version of Foxit Reader...
View ArticleWindows Exploit Development Remote Stack BoF
This time i made a video about basic exploit development process on windows. The target machine is a Windows Server 2003 R2 with DEP disabled running a vulnerable software called vserver.Basically the...
View ArticleBuild Metasploit Module (Windows Exploit Development)
This is the continuation of my previous post Windows Exploit Development (Remote Stack BoF).Let's try to convert the standalone exploit for vserver to a metasploit module. If you think that this task...
View ArticlePoste Italiane phishing emails
Poste italiane is the government-owned postal service of Italy and spammers use phishing techniques to trick people to send their credentials of online accounts and credit cards.The first of april i...
View ArticleCartaSi phising email part 1/2
CartaSi is a credit/charge card and can be used in Italy and abroad.The 31st of March i received an email from CartaSi_Informa@cartasi.it.It is a classic phishing email and it says to download the...
View ArticleARP/DNS Spoofing Steal Facebook Password (LAN Environment)
In this video i'll show you how an attacker can steal user credentials of every site (in this case will be facebook) in a LAN environment. First of all we use SET to clone the current facebook home...
View ArticlePoste Italiane phishing emails 2
In this hours a "new" phishing attack is targetting Poste Italiane and his service called Postepay. In the previous article regarding poste italiane phishing email the phiser to convince the victim to...
View ArticleCartaSi phishing email part 2/2
Behind this phishing emails there are several people or just one guy ?What i think is that there is only one guy because if you check the title of this script you see the write assembled by ME, if it...
View ArticleFrom XSS to NT AUTHORITY
A lot of times i have seen Cross-site scripting vulnerabilities classified as low impact or not significant. Thus, this time i want to show you how an attacker can get administration privileges through...
View ArticleGoogle winning award email scam
Just a quick post, because i've never seen this type of scam (using google as vector), but i think it's an old technique.I have won a cash price from google, but why gmail moved the email to spam...
View ArticleWordpress Cookie Grabber
In a previous video Wordpress XSS + Internet Explorer 8 Exploit i showed you how you can use a Cross-site scripting vulnerability to redirect a victim with Internet Explorer to a malicious site...
View ArticleJava Exploit Code Obfuscation and Antivirus Bypass/Evasion (CVE-2012-4681)
Why not play a game where we try to make the latest (at time of writing) public java exploit (CVE-2012-4681) undetected by all antivirus and see who will be the last to detect it ?. I think it will be...
View ArticleAttacking Windows 8 with Java Exploit and Metasploit
In the last post i was talking about how to obfuscate a Java exploit (CVE-2012-4681 link here), now i want to show you how an attacker can use this obfuscated exploit for a targeted attack.This is...
View ArticleAbout the new java 0 day vulnerability (CVE-2013-0422)
A couple of hours ago @Kafeine discovered a new java 0 day exploit in the wild.This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is...
View ArticleDeobfuscating Java 7u11 Exploit from Cool Exploit Kit (CVE-2013-0431)
At the beginning of the past week @EKWatcher has spotted Cool Exploit Kit using Java 7 update 11 vulnerability (CVE-2013-0431).This vulnerability was already reported by Security Explorations on...
View Article32 AntiVirus versus the latest Java Exploit (CVE-2013-1493)
Image a scenario where someone wants to target your computer to get access to your files. This task can be accomplished in several ways and one of them is using a java exploit on a crafted/compromised...
View ArticleThe Latest Java Exploit with Security Prompt/Warning Bypass (CVE-2013-2423)
From Java SE 7 update 11 oracle has introduced a new security features called security warning that prompts a window every time an applet request for execution.For example, if we want to execute...
View ArticleStyxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities
Styxy Cool Exploit Kit is a particular kit because it is a "merge" between Cool and Styxy Exploit Kit.Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has...
View Article
More Pages to Explore .....