Quantcast
Channel: Expert Security Analysis
Browsing all 9 articles
Browse latest View live

Bitcoin “Brainwallets” and why they are a bad idea

// Decided to publish this after some misgivings about disclosure. After telling Asher about it earlier, it was decided to disclose it to make people aware of the issue. A week or two ago, I stumbled...

View Article



Image may be NSFW.
Clik here to view.

Injecting arbritary Metasploit payloads into Windows executables.

This is a very simple writeup, site demonstrating how simple it is to use Metasploit to inject arbritary code into a Windows executable, effectively backdooring said executable. By backdooring a...

View Article

Image may be NSFW.
Clik here to view.

Password Algorithms: Skype (Windows)

Introduction There’s a fantastic article by Fabrice Desclaux and Kostya Kortchinsky which describes the encryption and structures used but doesn’t provide any code. The article indicates it isn’t...

View Article

Image may be NSFW.
Clik here to view.

[Howto] Installing Nemesis on Ubuntu Linux

Ok. Nemesis is a very powerful Packet Crafting/Injection tool for Unix based systems. I have heard that ALLEGEDLY it can be installed/ran on Windows also, ailment but never felt like trying, as I do...

View Article

Image may be NSFW.
Clik here to view.

Memcached Remote Denial of Service PoC

A long time ago, in 2011, a rather serious vulnerability was reported in Memcached. It is now 2013, and the vulnerability still exists in the latest version on the memcached Google Code page. The...

View Article


Image may be NSFW.
Clik here to view.

Password Algorithms: Internet Explorer 10 (Windows Vault)

Introduction Microsoft added a new feature to Windows 7 called ‘Vault’ which you can access through the Credential Manager in control panel or vaultcmd from command line. It works very similar to Gnome...

View Article

Image may be NSFW.
Clik here to view.

Hydra IRC bot, the 25 minute overview of the kit.

Hydra IRC bot, the 25 minute overview of the kit. (25 minutes to write and “do”, not to read!) The Hydra IRC botnet kit is a very interesting sample that we have in our collection. It is, essentially,...

View Article

Image may be NSFW.
Clik here to view.

Android Application Reverse Engineering. Reversing Angry Birds.

Parasite may reinstall itself multiple times if you don’t delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut...

View Article


Why Upgrade your Password Protection

In this article we will explain why and how to upgrade your password protection. The post Why Upgrade your Password Protection appeared first on Expert Security Analysis.

View Article

Browsing all 9 articles
Browse latest View live


Latest Images