Category: Proof of Concept
-
Making BitCoin with Bots
In this article we will cover how to quickly setup a trading bot for crypto-currencies. As the difficulty for BTC continues to rise the profit in mining coins continues to drop. A good method to make up those losses is with a trading bot which will work to increase your profit margin by making the […]
-
From $40k to Free – The Carberp source leak
Very interesting source code leak today for the Carberp malware family. This black market malware once being offered for $40k will surely be of interest to anyone who conducts malware & botnet analysis. The leak included a few other tools that helped make it so successful like the bootloader, MC obfuscate, along with various functions […]
-
Cisco PIX & ASA Multiple DoS, ACL Bypass, & Authentication Bypass Vulnerabilities (Bugtraq ID:34429)
Some fairly critical issues disclosed on a very popular security product. Cisco PIX Security Appliance and ASA 5500 Series Adaptive Security Appliance are prone to multiple denial-of-service vulnerabilities, an ACL-bypass vulnerability, and an authentication-bypass vulnerability. Read More Here … An attacker can use readily available network utilities to exploit these issues. The following example data […]
-
LSYiPDT: Download Torrents to your home server from anywhere!
Really this needs no introduction more than this video can provide! One of the first products of the Android Bounty program hosted by Androidandme this not only blows the iPhone’s torrent (download to local storage) program out of the water but just shows the power of open source! And to think the bounty the developer […]
-
Excerpt from “The Truth About Identity Theft”
It is common to read about various social engineering attack scenario’s in many of today’s IT security based books. None the less just like the need to constantly drill this information into the minds of the non tech users of many organizations. It makes for a better story when the scenario can be drawn from […]
-
Exploiting Intel CPU cache mechanism
Since I did not get out to Black Hat DC last month I was just reviewing the papers and came across one very interesting one. Aside from the white paper I also enjoy the story about the new “Friends” disclosing such an exploit brings. All in all a good read and just more wood for […]
-
Scientists show off 1st commercial network with unbreakable quantum encryption
Rather than base the encryption on complex maths, such systems use the laws of quantum theory – in particular, the Heisenberg Uncertainty Principle, which says quantum information cannot be measured without disturbing it. More Info…