On Wed, May 20, 2009 at 6:12 AM, saphex wrote:
> I think this is interesting, http://myf00.net/?p=18
>
> ___
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http:/
Oh so you have a blog ...
http://g-laurent.blogspot.com/
2009/5/25 laurent gaffie
> =
> - Release date: May 24th, 2009
> - Discovered by: Laurent GaffiƩ
> - Severity: critical
> =
>
> I. VULNERABILITY
> -
Are we missing DNS stuff ? Are plugins signed ? is NoScript being used by
end users ?
Maybe an evilgrade plugin is comming
[]s Fosforo
On Mon, May 25, 2009 at 3:24 PM, FUDder Guy wrote:
> On Mon, May 25, 2009 at 8:26 PM, saphex wrote:
> > This isn't about making the user install a malware
Hi List,
I just finished a new article showing some ideas to detect the version
of a web application by using file fingerprinting:
http://sucuri.net/?page=docs&title=webapp-version-detection
Thanks,
--dd
___
Full-Disclosure - We believe in it.
Chart
Original advisory: http://www.davidsopas.com/2009/05/25/arcade-trade-script-xss/
Arcade Trade Script is a full arcade site CMS (Content Management
System) with easy customization and advanced traffic trading system
built in. With ATS you will hardly ever have to FTP anything. Almost
all files, pag
For anyone who missed the AusCERT 2009 conference, the recorded conference
audio is online this year!
The conference audio
http://risky.biz/netcasts/rb2
The AusCERT 2009 conference schedule
http://conference.auscert.org.au/conf2009/program_schedule.html
__
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 200905-07
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
http://security.gentoo.org/
- - - - - -
=
- Release date: May 24th, 2009
- Discovered by: Laurent GaffiƩ
- Severity: critical
=
I. VULNERABILITY
-
Soulseek 157 NS * & 156.* Remote Distributed Search Code Execution
II. BACKGRO
On Mon, May 25, 2009 at 8:26 PM, saphex wrote:
> This isn't about making the user install a malware add-on. It's about
> gaining access to the system trough an exploit, or physical access,
> modify an existing add-on with your code. And Firefox wont even
> notice. Instead of installing a fancy roo
Hi,
>> - RL!unpack
>> http://ap0x.jezgra.net/unpackers.html
Second download entry on that page : RL!Unpack
--
http://blog.zoller.lu
Thierry Zoller
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charte
> Hi Piotr,
>
Hey,
> Any information with regards to how MMMBoB performs when trying to
> unpack a bit more obfuscated/aggressive packers like Themida / VMprotect ?
As stated in section 7 (Limitations) my unpacker will not be much help when
unpacking a virtual machine based protector like Them
Hi Piotr,
Any information with regards to how MMMBoB performs when trying to
unpack a bit more obfuscated/aggressive packers like Themida / VMprotect ?
On a side note:
I see often that some generic unpackers are rarely cited/referenced,
although they are interesting and perform astonishin
ABSTRACT
Nowadays most of the malware applications are either packed or protected.
This techniques are applied especially to evade signature based detectors
and also to complicate the job of reverse engineers or security analysts.
The time one must spend on unpacking or decrypting malware laye
> From: saphex
> Date: Wed, 20 May 2009 01:42:16 +0100
>
> I think this is interesting, http://myf00.net/?p=18
>
So, how does someone manage to edit the overlay file?
Are they going to use some javascript from a malicious website to edit
the overlay file of an addon? Or are they supplying a malw
14 matches
Mail list logo