Monthly Archives: agosto 2012

Dr. Fu’s Security Blog: Malware Analysis Tutorial 32: Exploration of Botnet Client

Learning Goals: Practice WinDbg for Inspecting Kernel Data Structure • Use Packet Sniffer to Monitor Malware Network Activities • Understand Frequently Used Network Activities by Malware • Expose Hidden/Unreachable Control Flow of Malware Applicable to: Operating Syst… http://fumalwareanalysis.blogspot.kr/2012/08/malware-analysis-tutorial-32.html

Anatomy of a Hack

Source: Talking Identity, 7th August 2012 An excellent example of how a seemingly unimportant Twitter hack can lead to more serious issues and fraud… http://www.thefraudtube.com/news-2/2012/08/15/anatomy-of-a-hack/

WATOBO v0.9.10 Released

WATOBO is intended to enable security professionals to perform highly efficient (semi-automated ) web application security audits. We are convinced that the semi-automated approach is the best way to perform an accurate audit and to identify most of the vulnerabilities. Features http://www.toolswatch.org/2012/08/watobo-v0-9-10-released/

Cracking Passwords & Hashes goes in the Cloud with CloudCracker

An online password cracking service for penetration testers and network auditors who need to check the security of WPA protected wireless networks, crack password hashes, or break document encryption. Whether it’s a WPA2 network, NTLM hashes, Unix hashes, or an encrypted PDF file, one thing’s f… http://www.toolswatch.org/2012/08/cracking-passwords-hashes-goes-in-the-cloud-with-cloudcracker/

Article: NetworkMiner The Packet Analyzer v1.4 released

NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner… http://www.toolswatch.org/2012/08/networkminer-the-packet-analyzer-v1-4-released/ Sent via Flipboard

Rooting out rumors, epidemics, and crime – with math

10.08.12 – A team of EPFL scientists has developed an algorithm that can identify the source of an epidemic or information circulating within a network, a method that could also be used to help with criminal investigations. Investigators are well aware of how difficult it is to t… http://actu.epfl.ch/news/rooting-out-rumors-epidemics-and-crime-with-math/

More human than human – Flame’s code injection techniques

Flame aka Flamer aka Skywiper is a sophisticated trojan application discovered in 2012. Since then it has been the subject of extensive analysis by malware research community. The trojan has been recognized as extraordinarily complicatied, with a modular design and advanced algorithms. The degree… http://www.cert.pl/news/5874/langswitch_lang/en

Reference Guide to Reverse Engineering & Malware Analysis Training

http://securityxploded.com/malware-analysis-training-reference.php

Burp Suite v1.4.12 in the wild with the support of Android SSL Analysis

Burp Suite is an integrated platform for performing security testing of web applications. Its various tools work seamlessly together to support the entire testing process, from initial mapping and analysis of an application’s attack surface, through to finding and exploiting security vulne… http://www.toolswatch.org/2012/08/burp-suite-v1-4-12-in-the-wild-with-the-support-of-android-ssl-analysis/

Article: Web Application Exploiter (WAppEx) v1.0 in the wild

WAppEx is an integrated platform for performing penetration testing and exploiting of web applications on Windows or Linux. It can automatically check for all type of security vulnerabilities in the given target and then let you to run various payloads to exploit and take advantages of the… http://www.toolswatch.org/2012/08/web-application-exploiter-wappex-v1-0/