Improving Security with URL Rewriting

Thursday, April 9th, 2009

Most web application security experts frown on the practice of passing session or authentication tokens in a URL through the use of URL rewriting. Usually these tokens are passed between the server and the browser through HTTP cookies, but in cases where users configure their browsers to not accept cookies, ...

Windows Kernel Again Found Vulnerable

Thursday, April 9th, 2009

Recently, our APAC threat intelligence team discovered a couple of Windows kernel zero-day vulnerabilities in the field, which could be potentially used for malicious purposes. These were discovered in some discussion forums in China. One of these issues exists in Windows NT/2000/XP according to the description provided. The issue arises ...

Conficker wakes up, updates via P2P, drops payload

Wednesday, April 8th, 2009

The Conficker worm is finally doing something--updating via peer-to-peer between infected computers and dropping a mystery payload on infected computers, Trend Micro said on Wednesday. Researchers were analyzing the code of the software that is being dropped onto infected computers but suspect that it is a keystroke logger or some other ...

Zero-Day PowerPoint Attacks Under Way

Saturday, April 4th, 2009

Microsoft's PowerPoint application is being used in a new attack that exploits an unpatched vulnerability in the popular Office app. The software giant yesterday issued a security alert confirming "limited and targeted attacks" were under way using malicious PowerPoint files that exploit the flaw. The exploits carry a Trojan, according to ...

Windows AUTOPWN (winAUTOPWN)

Wednesday, April 1st, 2009

Autohack your targets with least possible interaction. Features : - Contains already custom-compiled executables of famous and effective exploits alongwith a few original exploits. - No need to debug, script or compile the source codes. - Scans all ports 1 - 65535 after taking the IP address and tries all possible exploits according to ...