Monday, April 7th, 2008
In the tiger team operations we have been involved with, I often end up hacking through the least interesting systems. If you ask AP, a password-cracking ninja and master of hacking through simplicity, the less interesting the system is, the higher the chances to be insecure. A successful exploitation of ...
Posted in Hardware, Security, Software | No Comments
Sunday, April 6th, 2008
I've just recently caught wind of a Firefox plugin called FormFox. Here's the description from the website:
Do you know where your form information is going? This extension displays the form action (the site to which the information you've entered is being sent.) In any place where you can enter data, ...
Posted in Internet, Security, Software | No Comments
Sunday, April 6th, 2008
Some useful syntax reminders for SQL Injection into MySQL databases...
This post is part of a series of SQL Injection Cheat Sheets. In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend. This helps to ...
Posted in Coding, Internet, Networking, Privacy, Security, Software | No Comments
Sunday, April 6th, 2008
Adobe's flagship product, Photoshop, will become a 64-bit application in the next major revision to the company's bundle of creative pro applications, Creative Suite 4. However, the 64-bit version will only be available to Windows users because of a change Apple made at its Worldwide Developers Conference (WWDC) in 2007.
The ...
Posted in Software, Windows | No Comments
Friday, April 4th, 2008
We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...
Posted in Coding, Internet, Privacy, Security, Software | No Comments