Latest exploits & pocs
Latest forum posts
Latest security news
  • Solarwinds Firewall Security Manager 6.6.5 Client Session Handling
  • Novell ZenWorks Configuration Management 11.3.1 Code Execution / Traversal
  • MS Windows (HTTP.sys) HTTP Request Parsing DoS (MS15-034)
  • Adobe Flash Player casi32 Integer Overflow
  • Exploiting CVE-2015-0311: A Use-After-Free in Adobe Flash Player
  • LizardSquad DDoS Stresser Cross Site Scripting / Session Tampering
  • WordPress Simple Security 1.1.5 Cross Site Scripting
  • Facebook Open Redirect Old & New
  • Facebook Mobile Parameter Tampering Bypass
  • Microsoft Windows NtApphelpCacheControl Improper Authorization Check
  • [CTF] Teaser CONFidence CTF 2015
  • Penetration Tester Interview Questions
  • OWASP ZAP Reconnaissance – Without Permission!
  • Setting Up a Pentest Lab with pfSense in VirtualBox
  • Beta Bot Trojan
  • PoS Malware is More Effective and Dangerous
  • Zero Access Malware
  • Cryptography Fundamentals, Part 5 – Certificate Authentication
  • DNA Cryptography and Information Security
  • Defeating Cryptography: Solutions to Net-Force CTF Challenges using Practical Cryptan
  • The Interpol designs its own virtual currency scheme, for crime prevention
  • Security Affairs newsletter Round 5 – Best of the week from best sources
  • Punkey, a new POS Malware in the criminal ecosystem
  • APT28 Russian hackers exploited two zero-day flaws in the wild
  • TheRealDeal black Marketplace Offers Zero-Day Exploits
  • Safari cookie access vulnerability affects a billion iThings
  • Java – New vulnerabilities affects million applications
  • How to move YouTube comments from any video to another
  • In-flight Wi-Fi can be an open door for hackers
  • Wikileaks released documents from Sony hack, the company condemned it

Beebone botnet has been shut down by an international operation

The Beebone botnet has been shut down in a joint operation between U.S. and European law enforcement and a number of private security companies. A new joint operation run by US and European law enforcement and a number of private security firms took down the polymorphic Beebone botnet, also known as AAEH. The operation was carried out by the FBI, the Department...

Read More

71 percent of organizations were victims of successfully cyber attacks in 2014 according to the “2015 Cyberthreat Defense Report” report

The CyberEdge Group published an interesting report, titled “2015 Cyberthreat Defense Report” that in line with similar studies confirms the increase in the number of successful cyber attacks against organizations. The report analyzed data provided by 814 organizations, it surveyed IT security decision makers and practitioners in 19 industries across...

Read More

Underdist Challange solved

Underdist challenge flag >>> /root/flag.txt  The first step we loaded the virtual machine and starting the challenge!Run the netdiscover to get the target I : Code: netdiscover - i wlan1 -r 192.168.1.1/24 1 netdiscover - i wlan1 -r 192.168.1.1/24 The...

Read More

Password cracking experts decipher elusive Equation Group crypto hash

Mystery solved after crackers find Arabic word that dogged Kaspersky for weeks. Unraveling a mystery that eluded the researchers analyzing the highly advanced Equation Group the world learned about Monday, password crackers have deciphered a cryptographic hash buried in one of the hacking crew’s exploits. It’s Arabic for...

Read More

Testing wordpress scanners.

Read More