Bitcoin “Brainwallets” and why they are a bad idea
// Decided to publish this after some misgivings about disclosure. After telling Asher about it earlier, it was decided to disclose it to make people aware of the issue. A week or two ago, I stumbled...
View ArticleInjecting arbritary Metasploit payloads into Windows executables.
This is a very simple writeup, site demonstrating how simple it is to use Metasploit to inject arbritary code into a Windows executable, effectively backdooring said executable. By backdooring a...
View ArticlePassword Algorithms: Skype (Windows)
Introduction There’s a fantastic article by Fabrice Desclaux and Kostya Kortchinsky which describes the encryption and structures used but doesn’t provide any code. The article indicates it isn’t...
View Article[Howto] Installing Nemesis on Ubuntu Linux
Ok. Nemesis is a very powerful Packet Crafting/Injection tool for Unix based systems. I have heard that ALLEGEDLY it can be installed/ran on Windows also, ailment but never felt like trying, as I do...
View ArticleMemcached Remote Denial of Service PoC
A long time ago, in 2011, a rather serious vulnerability was reported in Memcached. It is now 2013, and the vulnerability still exists in the latest version on the memcached Google Code page. The...
View ArticlePassword Algorithms: Internet Explorer 10 (Windows Vault)
Introduction Microsoft added a new feature to Windows 7 called ‘Vault’ which you can access through the Credential Manager in control panel or vaultcmd from command line. It works very similar to Gnome...
View ArticleHydra IRC bot, the 25 minute overview of the kit.
Hydra IRC bot, the 25 minute overview of the kit. (25 minutes to write and “do”, not to read!) The Hydra IRC botnet kit is a very interesting sample that we have in our collection. It is, essentially,...
View ArticleAndroid Application Reverse Engineering. Reversing Angry Birds.
Parasite may reinstall itself multiple times if you don’t delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut...
View ArticleWhy Upgrade your Password Protection
In this article we will explain why and how to upgrade your password protection. The post Why Upgrade your Password Protection appeared first on Expert Security Analysis.
View Article