Hacking Wisdom
Follow
Find
5.7K views | +10 today
Hacking Wisdom
Your new post is loading...
Your new post is loading...
Scooped by Hacking Wisdom
Scoop.it!

Content-Based Blind Injection Using By Double Substring

Vulnerability analysis papers, Tutorials and articles from the Exploit Database
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Window Kernel - Bitmap Handling Use-After-Free MS15-061 #2 - Exploits Database

Window Kernel - Bitmap Handling Use-After-Free (MS15-061) #2. CVE-2015-1722. Dos exploit for win32 platform
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Cisco AnyConnect Secure Mobility Client 3.1.08009 - Privilege Escalation - Exploits Database

Cisco AnyConnect Secure Mobility Client 3.1.08009 - Privilege Escalation. CVE-2015-6305. Local exploit for windows platform
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Cryptokiller | POC for Cryptolocker malwares

Cryptokiller | POC for Cryptolocker malwares | Hacking Wisdom | Scoop.it

POC tool called Cryptokiller (tested on Windows 7 Enterprise SP1 x86) which is able to detect and stop the infection and also kills the infected process. Tested on 5 different Cryptolocker malwares.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Apple speaks out on XcodeGhost malware as infected app count hits 4,000- The Inquirer

Apple speaks out on XcodeGhost malware as infected app count hits 4,000- The Inquirer | Hacking Wisdom | Scoop.it
Developers advised to check they are using a legitimate version of Xcode,Security,Security ,Security,Apple
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Hacker Lexicon: A Guide to Ransomware, the Scary Hack That's on the Rise | WIRED

Hacker Lexicon: A Guide to Ransomware, the Scary Hack That's on the Rise | WIRED | Hacking Wisdom | Scoop.it
Ransomware is malware that locks your keyboard or computer to prevent you from accessing your data until you pay a ransom.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Lock screen flaw found in Android - BBC News

Lock screen flaw found in Android - BBC News | Hacking Wisdom | Scoop.it
A security flaw that lets people bypass the lock screen on a mobile device is discovered in Android's Lollipop system.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Heartbleed still affects 200,000 devices because vendors are lazy. Maybe- The Inquirer

Heartbleed still affects 200,000 devices because vendors are lazy. Maybe- The Inquirer | Hacking Wisdom | Scoop.it
Won't somebody find a tourniquet?,Security,Security ,Hacking,Security
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Mozilla admits Bugzilla account hack led to Firefox attacks

Mozilla admits Bugzilla account hack led to Firefox attacks | Hacking Wisdom | Scoop.it
Firm promises improvements to security systems
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Firefox < 39.03 - pdf.js Same Origin Policy Exploit - Exploits Database

Firefox < 39.03 - pdf.js Same Origin Policy Exploit. CVE-2015-4495. Local exploits for multiple platform

Hacking Wisdom's insight:

Based upon https://github.com/vincd/CVE-2015-4495

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

How to stop a leak - the WebRTC notifier - webrtcHacks

Chad Hart and Philipp Hancke discuss the how & why WebRTC can expose a local IP address without a user's consent and present a Chrome Extension to fix that
Hacking Wisdom's insight:

The “IP Address Leakage” topic has turned into a public relations issue for WebRTC. It is a fact that the WebRTC API’s can be used to share one’s private IP address(es) without any user consent today. Nefarious websites could potentially use this information to fingerprint individuals who do not want to be tracked. Why is this an issue? Can this be stopped? Can I tell when someone is trying to use WebRTC without my knowledge? We try to cover those questions below along with a walkthrough of a Chrome extension that you can install or modify for yourself that provides a notification if WebRTC is being used without your knowledge.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

New virus created that can completely wreck Apple computers

New virus created that can completely wreck Apple computers | Hacking Wisdom | Scoop.it

Two security consultants have created a new computer worm, the Thunderstrike 2, that attacks the core hardware of a Mac computer once unleashed. The worm was designed to expose vulnerabilities in the once-assumed airtight security of Apple products.

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Android Shellcode Telnetd with Parameters - Exploits Database

Android Shellcode Telnetd with Parameters. Shellcode exploit for android platform
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

IKEView.exe R60 - .elg Local SEH Exploit - Exploits Database

IKEView.exe R60 - .elg Local SEH Exploit - Exploits Database | Hacking Wisdom | Scoop.it

IKEView.exe R60 - .elg Local SEH Exploit. Local exploit for windows platform

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Cisco AnyConnect 3.1.08009 - Privilege Escalation via DMG Install Script - Exploits Database

Cisco AnyConnect 3.1.08009 - Privilege Escalation via DMG Install Script. CVE-2015-6306. Local exploit for osx platform

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Serious Imgur bug exploited to execute worm-like attack on 8chan users | Ars Technica

Serious Imgur bug exploited to execute worm-like attack on 8chan users | Ars Technica | Hacking Wisdom | Scoop.it

Visitors' browsers hail command-and-control server even after attack is shut down.

Hacking Wisdom's insight:

XSS Exploit via HTML5 local storage feature

more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

The Tricky Encryption That Could Stump Quantum Computers | WIRED

The Tricky Encryption That Could Stump Quantum Computers | WIRED | Hacking Wisdom | Scoop.it
In the drive to safeguard data from future quantum computers, cryptographers have stumbled upon a thin red line between security and efficiency.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

DHS websites vulnerable to exploits amid lacking cybersecurity training - SC Magazine

DHS websites vulnerable to exploits amid lacking cybersecurity training - SC Magazine | Hacking Wisdom | Scoop.it
The Office of Inspect General issued a report on the Department of Homeland Security's cybersecurity practices earlier this week.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Hack Brief: Upgrade to iOS 9 to Avoid a Bluetooth iPhone Attack | WIRED

Hack Brief: Upgrade to iOS 9 to Avoid a Bluetooth iPhone Attack | WIRED | Hacking Wisdom | Scoop.it
A just-patched wireless attack represents a rare risk to Apple's carefully restricted mobile operating system.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Hackers spread malware via Yahoo ads

Hackers spread malware via Yahoo ads | Hacking Wisdom | Scoop.it
Hackers who previously exploited vulnerabilities in Adobe Flash have now used advertising on Yahoos largest websites to distribute malware to billions.
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Files on Seagate wireless disks can be poisoned, purloined – thanks to hidden login

Files on Seagate wireless disks can be poisoned, purloined – thanks to hidden login | Hacking Wisdom | Scoop.it
Download everything, seed with malware, move on
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Firefox exploit found in the wild

Firefox exploit found in the wild | Hacking Wisdom | Scoop.it
Yesterday morning, August 5, a Firefox user informed us that an advertisement on a news site in Russia was serving a Firefox exploit that searched ...
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

What happened when we got subpoenaed over our Tor exit node

What happened when we got subpoenaed over our Tor exit node | Hacking Wisdom | Scoop.it
We've run a Tor exit-node for years. In June, we got the nightmare Tor operator scenario: a federal subpoena (don't worry, it ended surprisingly well!)
more...
No comment yet.
Scooped by Hacking Wisdom
Scoop.it!

Mt. Gox ran out of money six months before going bust | The Japan Times

Mt. Gox ran out of money six months before going bust | The Japan Times | Hacking Wisdom | Scoop.it
Bitcoin exchange Mt. Gox Co. apparently ran out of money six months before it announced in February 2014 that it was filing for bankruptcy after tens of mi
more...
No comment yet.