Cyber Security & ...
Follow
19.4K views | +75 today
 

From around the web

Your new post is loading...
Your new post is loading...
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Malware Analysis *Self-Overwriting COM Loading for Remote Loading DLL / Dr. Fu's Security Blog.

Malware Analysis *Self-Overwriting COM Loading for Remote Loading DLL / Dr. Fu's Security Blog. | Cyber Security &  Digital Forensics | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Enabling SSL (HTTPS) on SAP Gateway

Enabling SSL (HTTPS) on SAP Gateway | Cyber Security &  Digital Forensics | Scoop.it
Enabling SSL (HTTPS) on SAP Gateway Topics CommonCryptoLibMaintain Instance Profile ParameterMaintain Certificates in STRUSTTesting OData Service with HTTPS connectionProper System Certificate Signi...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

WATOBO - The Web Application Security Auditing Toolbox / Darknet .

WATOBO - The Web Application Security Auditing Toolbox / Darknet . | Cyber Security &  Digital Forensics | Scoop.it
WATOBO - The Web Application Security Auditing Toolbox - enables security professionals to perform highly efficient web application security audits.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

A Look at the Inner Workings of NSA's XKEYSCORE - The Intercept

A Look at the Inner Workings of NSA's XKEYSCORE - The Intercept | Cyber Security &  Digital Forensics | Scoop.it
A key piece of the NSA's global Internet surveillance network is powered by a somewhat clunky piece of software running on clusters of Linux servers. Based on documents provided by NSA whistleblower Edward Snowden, The Intercept is shedding light on the inner workings of XKEYSCORE, one of the most extensive programs of mass surveillance in human history.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Win32/Lethic Botnet Analysis - InfoSec Institute

Win32/Lethic Botnet Analysis - InfoSec Institute | Cyber Security &  Digital Forensics | Scoop.it
Introduction Lethic is a spam botnet consisting of an estimated 210 000 - 310 000 individual machines which are mainly involved in pharmaceutical and repli
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Dino – the latest spying malware from an allegedly French espionage group analyzed

Dino – the latest spying malware from an allegedly French espionage group analyzed | Cyber Security &  Digital Forensics | Scoop.it
Dino contains interesting technical features, and also a few hints that the developers are French speaking.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Automated and Anonymous SQL Injection with SQLMap and Tor / Zero Security.

Automated and Anonymous SQL Injection with SQLMap and Tor / Zero Security. | Cyber Security &  Digital Forensics | Scoop.it
Automated and Anonymous SQL Injection with SQLMap and Tor
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

How to Hack WiFi Using a WPS Pixie Dust Attack

How to Hack WiFi Using a WPS Pixie Dust Attack | Cyber Security &  Digital Forensics | Scoop.it
Long time reader, first time 'How To' poster. This tutorial has been highly requested. Here are the steps to perform a Pixie Dust attack to crack a WiFi password that has WPS enabled. Please note, this attack is very specific in nature. I've had a lot of success running this attack against Ralink and RealTek chipsets. And very spotty success against Broadcom chipsets. This might not work against all routers, but is definitely worth trying before using a brute force attack against WPS Let's Begin!!! Step 1: Download All Dependencies It's important to download all dependencies from the
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Attacking Ruby Gem Security with CVE-2015-3900 / SpiderLabs..

Attacking Ruby Gem Security with CVE-2015-3900 / SpiderLabs.. | Cyber Security &  Digital Forensics | Scoop.it
A Ruby gem is a standard packaging format used for Ruby libraries and applications. This packaging format allows Ruby software developers a clearly defined format in which they can reliably build and distribute software. Developers push Ruby gems to a...
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from "Computação Forense"
Scoop.it!

Malicious Documents - PDF Analysis in 5 steps

Malicious Documents - PDF Analysis in 5 steps | Cyber Security &  Digital Forensics | Scoop.it
Mass mailing or targeted campaigns that use common files to host or exploit code have been and are a very popular vector of attack. In other words, a malicious PDF or MS Office document received vi...

Via João Carvalho
more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from "Computação Forense"
Scoop.it!

Segu-Info: Análisis forense en sistemas Mac OS X

Segu-Info: Análisis forense en sistemas Mac OS X | Cyber Security &  Digital Forensics | Scoop.it

Via João Carvalho
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Best Free and Open Source SQL Injection Tools - InfoSec Institute

Best Free and Open Source SQL Injection Tools - InfoSec Institute | Cyber Security &  Digital Forensics | Scoop.it
SQL injection is one of the most common attacks against web applications. This is used against websites which use SQL to query data from the database serve
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

System level Access and Plain Text Passwords using Bypass UAC and Mimikatz

System level Access and Plain Text Passwords using Bypass UAC and Mimikatz | Cyber Security &  Digital Forensics | Scoop.it
If you can get a remote shell during a penetration test, Metasploit's Bypass UAC module is great for disabling that pesky UAC and escalating an account with admin privileges to the all powerful Sys...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Bypassing iPad’s restrictions code with the Rubbery Ducky

Bypassing iPad’s restrictions code with the Rubbery Ducky | Cyber Security &  Digital Forensics | Scoop.it
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

PowerShell Remoting without administrator rights * Thu, July 2, 2015/ By Michael Pietroforte

PowerShell Remoting without administrator rights * Thu, July 2, 2015/ By Michael Pietroforte | Cyber Security &  Digital Forensics | Scoop.it

https://4sysops.com/archives/powershell-remoting-without-administrator-rights/

more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1 | SANS Institute

Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1 | SANS Institute | Cyber Security &  Digital Forensics | Scoop.it
SANS Penetration Testing blog pertaining to Modifying Android Apps: A SEC575 Hands-on Exercise, Part 1
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Cujo: Efficient Detection and Prevention o Drive-by-Download Attacks.pdf

more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

The Critical Security Controls fo Effective Cyber Defense.pdf

more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

Recovering Deleted MS Windows EVTX Event-Logs

Recovering Deleted MS Windows EVTX Event-Logs | Cyber Security &  Digital Forensics | Scoop.it
Back in 2012 I wrote an EnScript to recover deleted MS Windows EVTX event-logs. I’d forgotten about it till today, when it occurred to me that the script wasn’t available through EnCase App...
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

By the Numbers: The Deep Web / Trend Micro USA.

By the Numbers: The Deep Web / Trend Micro USA. | Cyber Security &  Digital Forensics | Scoop.it
Some of the most interesting numbers gathered from Trend Micro's latest research into the Deep Web, including prices of illegal goods and criminal services, and the value of hacked accounts.
more...
No comment yet.
Scooped by Constantin Ionel Milos / Milos Constantin
Scoop.it!

HEURISTICS FOR IMPROVED ENTERPRISE INTRUSION DETECTION.pdf

more...
No comment yet.
Rescooped by Constantin Ionel Milos / Milos Constantin from "Computação Forense"
Scoop.it!

Ghiro - automated digital image forensics tool

Ghiro - automated digital image forensics tool | Cyber Security &  Digital Forensics | Scoop.it

Via João Carvalho
more...
No comment yet.