Originally posted by elmo.
The NSA or National Security Agency recently established the NSA Mobility Program to focus on delivering secure mobile capability using commercial technologies to the United States Government (USG) and Department of Defense (DOD).
They have also identified 5 major categories of the mobile ecosystem in a document called Mobility Capability Package:
1. Secure Voice
2. OS/Apps & Mobile Device
3. Mobile Transport...
Thursday, March 22, 2012
Monday, March 19, 2012
The 2012 Cyber Defence University Challenge
Posted on Monday, March 19, 2012 by Red Horse
| No comments
Originally posted by elmo.
To raise awareness in cyber security, the Australian government in partnership with Australian universities and Telstra challenges university undergraduates to join in the Challenge.
The Challenge is 24 hour competition related to security and will start on April 3 and end on April 4, 2012.
The winner will have the opportunity to travel to Las Vegas, USA in July 2012 to join in Black Hat's 2012 Conference.
For...
Sunday, March 18, 2012
Double Winrar self-executable archive packed Fakeav
Posted on Sunday, March 18, 2012 by Red Horse
| No comments
Originally posted by marc.
Malware authors have been using packers/compression programs to confuse AV detection engines. Here's one mildly annoying technique that I stumbled upon last week.
Step 1. Pack file with Asprotect packer
Step 2. Create a password protected Winrar sfx archive using the file in step 1.
Step 3. Create another Winrar sfx archive using the file...
Tuesday, March 13, 2012
Fake Skype Vouchers website leads to Java Exploits
Posted on Tuesday, March 13, 2012 by Red Horse
| No comments
Originally posted by kazmot.
I stumbled upon a fake website that targets Skype users through vouchers or gift certificates. Below is the definition of Skype vouchers from their website:
Skype vouchers are electronic Skype Credit vouchers sold in various retail outlets. You don’t have to pay for the vouchers online and they make a great gift for family and friends...
Thursday, March 8, 2012
AV-TEST Report on Android Anti-Malware Solutions
Posted on Thursday, March 08, 2012 by Red Horse
| No comments
Originally posted by elmo.
AV-Test an independent IT security company recently published a test report on different anti-malware product available for android.
It is worth noting that they have tested 41 anti-malware products!
Too many in such a short period and some of the solutions have 0% detections.
So choose wisely and pick an anti-malware product in the top ha...
Wednesday, March 7, 2012
Justin Bieber Facebook Spam
Posted on Wednesday, March 07, 2012 by Red Horse
| No comments
Originally posted by elmo.
Title: LOL!!! There was a hidden c@mera in Justin's bedroo...
Tuesday, March 6, 2012
Fake Intuit Quickbooks Page Leads to Black Hole Exploit
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by kazmot.
The Blackhole Exploit kit is still a very popular attack on the web. Malwares use this exploit kit to propagate and infect unsuspecting users. Here is a detailed analysis of a fake Intuit page that leads to the exploit kit and the obfuscation technique used by the attack. In this specific targeted attack, we were able to download a Cridex...
AXMLPrinter2
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by elmo.
AXMLPrinter2 or AXMLPrinter version 2 is a tool that uses AXmlResourceParser to convert a binary xml file to readable xml document.
Prerequisite:
JDK (java development kit) needs to be installed in your system.
Download:
AXMLPrinter2.jar
Syntax:
1. go to the folder where you downloaded AXMLPrinter2
2. open a command prompt
3. type and execute "java -jar AXMLPrinter2.jar <location of xml file> >> <ouput...
Black Hole exploit kit
Posted on Tuesday, March 06, 2012 by Red Horse
| No comments
Originally posted by kazmot.
The Black Hole exploit kit is an unethical off-the-shelf Web application. The first instance - v.1.0.0 beta - has appeared on the black market and was advertised in August 2010 as a "System for network testing". As with most of the exploit kits, it is based on PHP and a MySQL backend. The payload of this kit usually targets Windows operating systems and applications installed on those systems,...
Monday, March 5, 2012
CrimePack exploit kit
Posted on Monday, March 05, 2012 by Red Horse
| No comments
Originally posted by kazmot.
CrimePack exploit kit is just like any other exploit kits. It contains various codes that exploit vulnerabilities in a system and also in some of the applications installed. Commonly, these exploit codes download and execute an arbitrary file in the system. We were able to download a Dorkbot Worm in one of the malicious link we got from malwaredomainlist.com (MD5 hash: 9210a2635c63a58af18ed5dffb8f01e8, VirusTotal...
Friday, March 2, 2012
Installing Ubuntu 10.04.1 LTS 64 bit, MongoDB 2.0.3, Lamp, and RockMongo
Posted on Friday, March 02, 2012 by Red Horse
| 1 comment
Originally posted by elmo.
1. Installing Ubuntu 10.04.1 LTS 64-bit
1.1 go to ubuntu download page1.2 select Ubuntu 10.04 LTS1.3 select 64-bit1.4 then click Start download (you will download an iso image)1.5 burn iso image to disc1.6 install Ubuntu using disc
Notes:
We have selected 64-bit as MongoDB only supports 2 GB of data for 32-bit builds.Another cool ubuntu installer is Wubi or Windows Ubuntu Installer which will allow you to install...
Thursday, March 1, 2012
Baksmali
Posted on Thursday, March 01, 2012 by Red Horse
| No comments
Originally posted by elmo.
Baksmali means disassembler in Icelandic language and it is used to dissassemble a dex file.
Prerequisite:
JDK (java development kit) needs to be installed in your system.
Download:
baksmali-x.x.x.jar
Syntax:
1. go to the folder where you downloaded baksmali
2. open a command prompt
3. type and execute "java -jar baksmali-x.x.x.jar <location of dex file>"
e.g. d:\tools>java -jar baksmali-1.3.2.jar d:\test\classes.dex
4....
Subscribe to:
Posts (Atom)