Quantcast
Channel: Security Obscurity Blog
Browsing latest articles
Browse All 25 View Live

Image may be NSFW.
Clik here to view.

Why this blog

Hi People,I've decide to open this blog because not always i can explain all thought a video and the relative description box.Remember... i'm NOT an expert or a regular blogger and i make videos only...

View Article



Joomla Plugin Exploit + PHP Malware

Garden Store has a vulnerable version (1.1.7) of virtuemart (Joomla plugin) and through a blind sql injection we can retrieve administrator credentials.We edit the main template and place into the...

View Article

Wordpress TimThumb Exploit (Remote Code Execution)

A lot of wordpress themes use timthumb script to resize images. From version 1.15 to 1.33 timthumb allow to external domains such as flickr.com to display remote images on your website .More detailed...

View Article

Image may be NSFW.
Clik here to view.

OsCommerce Malware Infection

Three months ago is started a huge site infection campaign with lens oscommerce, a famous cms for medium/little on-line stores. This cms suffers of few vulnerabilities that can lead an attacker to...

View Article

Wordpress XSS Vulnerability + IE 8 Exploit

The 30th December of 2010 a guy named sneak reported a persistent XSS vulnerability that affect the popular blog cms wordpress <= 3.0.3.The problem is located into the kses.php file which is the...

View Article


Image may be NSFW.
Clik here to view.

Have fun with scammers

A couple of days ago i've received this e-mail:After reading it i decided to go on and have some fun with him so i've replied and after one day i get the response.To convince me he attached four...

View Article

Image may be NSFW.
Clik here to view.

Ubuntu Server Exploit (Local Privilege Escalation)

Today we're gonna talk about an "old" vulnerability discovered by Dan Rosenberg in the linux kernel. This bug affect versions previous than 2.6.38 and permit to an user with low privileges to gain root...

View Article

Image may be NSFW.
Clik here to view.

Foxit Reader PDF Exploit + Windows 7 Backdoor

This video show you how it is easy to install a backdoor (Meterpreter Service) on a Windows 7 pc throught a pdf and with the support of metasploit.Our victim uses an outdated version of Foxit Reader...

View Article


Windows Exploit Development Remote Stack BoF

This time i made a video about basic exploit development process on windows. The target machine is a Windows Server 2003 R2 with DEP disabled running a vulnerable software called vserver.Basically the...

View Article


Image may be NSFW.
Clik here to view.

Build Metasploit Module (Windows Exploit Development)

This is the continuation of my previous post Windows Exploit Development (Remote Stack BoF).Let's try to convert the standalone exploit for vserver to a metasploit module. If you think that this task...

View Article

Image may be NSFW.
Clik here to view.

Poste Italiane phishing emails

Poste italiane is the government-owned postal service of Italy and spammers use phishing techniques to trick people to send their credentials of online accounts and credit cards.The first of april i...

View Article

Image may be NSFW.
Clik here to view.

CartaSi phising email part 1/2

CartaSi is a credit/charge card and can be used in Italy and abroad.The 31st of March i received an email from CartaSi_Informa@cartasi.it.It is a classic phishing email and it says to download the...

View Article

Image may be NSFW.
Clik here to view.

ARP/DNS Spoofing Steal Facebook Password (LAN Environment)

In this video i'll show you how an attacker can steal user credentials of every site (in this case will be facebook) in a LAN environment. First of all we use SET to clone the current facebook home...

View Article


Image may be NSFW.
Clik here to view.

Poste Italiane phishing emails 2

In this hours a "new" phishing attack is targetting Poste Italiane and his service called Postepay. In the previous article regarding poste italiane phishing email the phiser to convince the victim to...

View Article

Image may be NSFW.
Clik here to view.

CartaSi phishing email part 2/2

Behind this phishing emails there are several people or just one guy ?What i think is that there is only one guy because if you check the title of this script you see the write assembled by ME, if it...

View Article


Image may be NSFW.
Clik here to view.

From XSS to NT AUTHORITY

A lot of times i have seen Cross-site scripting vulnerabilities classified as low impact or not significant. Thus, this time i want to show you how an attacker can get administration privileges through...

View Article

Image may be NSFW.
Clik here to view.

Google winning award email scam

Just a quick post, because i've never seen this type of scam (using google as vector), but i think it's an old technique.I have won a cash price from google, but why gmail moved the email to spam...

View Article


Image may be NSFW.
Clik here to view.

Wordpress Cookie Grabber

In a previous video Wordpress XSS + Internet Explorer 8 Exploit i showed you how you can use a Cross-site scripting vulnerability to redirect a victim with Internet Explorer to a malicious site...

View Article

Image may be NSFW.
Clik here to view.

Java Exploit Code Obfuscation and Antivirus Bypass/Evasion (CVE-2012-4681)

Why not play a game where we try to make the latest (at time of writing) public java exploit (CVE-2012-4681) undetected by all antivirus and see who will be the last to detect it ?. I think it will be...

View Article

Image may be NSFW.
Clik here to view.

Attacking Windows 8 with Java Exploit and Metasploit

In the last post i was talking about how to obfuscate a Java exploit (CVE-2012-4681 link here), now i want to show you how an attacker can use this obfuscated exploit for a targeted attack.This is...

View Article

Image may be NSFW.
Clik here to view.

About the new java 0 day vulnerability (CVE-2013-0422)

A couple of hours ago @Kafeine discovered a new java 0 day exploit in the wild.This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is...

View Article


Image may be NSFW.
Clik here to view.

Deobfuscating Java 7u11 Exploit from Cool Exploit Kit (CVE-2013-0431)

At the beginning of the past week @EKWatcher has spotted Cool Exploit Kit using Java 7 update 11 vulnerability (CVE-2013-0431).This vulnerability was already reported by Security Explorations on...

View Article


Image may be NSFW.
Clik here to view.

32 AntiVirus versus the latest Java Exploit (CVE-2013-1493)

Image a scenario where someone wants to target your computer to get access to your files. This task can be accomplished in several ways and one of them is using a java exploit on a crafted/compromised...

View Article

Image may be NSFW.
Clik here to view.

The Latest Java Exploit with Security Prompt/Warning Bypass (CVE-2013-2423)

From Java SE 7 update 11 oracle has introduced a new security features called  security warning that prompts a window every time an applet request for execution.For example, if we want to execute...

View Article

Image may be NSFW.
Clik here to view.

Styxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities

Styxy Cool Exploit Kit is a particular kit because it is a "merge" between Cool and Styxy Exploit Kit.Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has...

View Article

Browsing latest articles
Browse All 25 View Live




Latest Images