In a recent PoC Exploit released via YouTube, Alexander Korznikov demonstrated a successful hijacking (using Task manager, service creation, as well as command line), along with Proof-of-Concept exploit. 296 more words
Tags » Exploit
Buffer Overflow adalah kerentanan (vulnerability) pada sebuah perangkat lunak akibat pemberian input data pada buffer yang diluar kapasitas yang dimilikinya. 2,573 more words
This is an interesting story to follow and learn how these hackers known as Turkish Crime Family were able to steal 300+ Million iPhone users information… 171 more words
In Security Now episode 603, Steve dives into the Vault 7 leaks. And while I trust Steve’s technical analysis of the information, the conversation takes a sharp turn into two completely unrelated topics: Cryptographic backdoors for law enforcement use, and the vulnerability equities process (VEP). 479 more words
Last week’s vulnerability news was full of web technologies with intriguing names, including Apache, Struts, Java, Jakarta and OGNL.
(In case you’re wondering, OGNL is short for… 992 more words