«
Expand/Collapse
81 items tagged "bug"
Related tags:
read [+],
ExploitsVulnerabilities [+],
vulnerability [+],
facebook [+],
Skype [+],
txt [+],
hacks [+],
darknet [+],
urls [+],
url [+],
twitter [+],
sop [+],
smb client [+],
smb [+],
pseudo [+],
paul bhm [+],
partition tables [+],
partition [+],
microsoft [+],
memory corruption [+],
mac os x [+],
mac os [+],
mac [+],
linux kernels [+],
ldm [+],
firefox [+],
directory server [+],
development environments [+],
development [+],
day [+],
code authors [+],
chaos communication congress [+],
bugtraq [+],
buffer overflow bug [+],
android [+],
windows [+],
webkit [+],
video [+],
usa [+],
sqlinjection [+],
security bug [+],
security [+],
rce [+],
radio [+],
proof of concept [+],
php [+],
nova [+],
jbcrypt [+],
hotmail [+],
firmware [+],
execution [+],
entropy [+],
critical [+],
code execution [+],
code [+],
cms [+],
character encoding [+],
bug zapper [+],
attackers [+],
ascii characters [+],
Bugs [+],
zero day [+],
zero [+],
zaps [+],
zapper [+],
windows xp sp2 [+],
windows works [+],
windows pcs [+],
windows machines [+],
wild [+],
wearable [+],
wave fm [+],
vulnerability research [+],
vulnerability assessment [+],
voltage source [+],
voltage controlled oscillator [+],
virus [+],
transmitter [+],
taser [+],
surging [+],
summer [+],
start [+],
stall [+],
stake [+],
squashes [+],
squash [+],
spoofing [+],
splats [+],
software bug [+],
smd [+],
side [+],
shortcut files [+],
shockwave [+],
severe [+],
servers [+],
serious [+],
sends [+],
security researchers [+],
secure [+],
second time [+],
seagate hdd [+],
seagate [+],
scanner [+],
run [+],
rootite [+],
root cause analysis [+],
robotics [+],
richard johnson tags [+],
reporting [+],
repair [+],
renegotiation [+],
redmond botnet [+],
quiet business [+],
purpose cluster [+],
punbb [+],
puerto 445 [+],
process [+],
private photos [+],
poison [+],
player [+],
phones [+],
peril [+],
patch [+],
paid [+],
oracle [+],
opera [+],
openssl [+],
openssh [+],
nokia 1611 [+],
nokia [+],
new [+],
nasty attack [+],
mysql [+],
multiple [+],
mozilla [+],
moor [+],
minor bugs [+],
mining [+],
microsoft software [+],
microsoft issues [+],
messenger [+],
megazap [+],
mcafee [+],
may [+],
malware [+],
malicious code [+],
mac webcam [+],
love [+],
light saber [+],
lets [+],
kit [+],
k bounty [+],
java bug [+],
java [+],
instant messages [+],
instagram [+],
inspired [+],
insect population [+],
injection bug [+],
injection [+],
infosec world [+],
ietf [+],
hot topic [+],
hot [+],
history [+],
hijacking [+],
hard [+],
half wave [+],
hackers [+],
google [+],
genie [+],
foregone conclusion [+],
followers [+],
fm transmitter [+],
fm bug [+],
flash player [+],
flash [+],
fixe [+],
fix [+],
firmware bug [+],
exposed [+],
explotando [+],
exploits [+],
exploited [+],
exhausion [+],
emergency [+],
drive firmware [+],
dll [+],
disposable cameras [+],
discovery [+],
dino [+],
diff files [+],
die hard [+],
devilzc [+],
devastating [+],
deadlocks [+],
cross site scripting [+],
critical bug [+],
control [+],
cons [+],
complete control [+],
commandeer [+],
can bite [+],
bytes [+],
bug reporting [+],
bug patch [+],
bug hunters [+],
bug count [+],
bug bytes [+],
bsod [+],
bounty programs [+],
bounty program [+],
bookmarks [+],
black hat [+],
bite [+],
bind [+],
ben nagy [+],
bbf [+],
audio [+],
attacks [+],
apple safari [+],
apple ranks [+],
apple [+],
apache [+],
adobe [+],
account [+],
Videos [+],
Software [+],
Fixes [+],
13 years [+]
-
-
14:30
»
Hack a Day
This is the biggest bug zapper we’ve ever seen. It’s called the Megazap as its zapping area is 1 square meter. [Eighdot] and [Sa007] combined their talents for the build in order to help reduce the insect population around the Eth0 2012 Summer festival. You may recall from our bug zapping light saber build that these [...]
-
-
9:01
»
Hack a Day
Hard drive firmware is about the last place you want to find a bug. But that turned out to be the problem with [BBfoto's] Seagate HDD which he was using in a RAID array. It stopped working completely, and he later found out the firmware has a bug that makes the drive think it’s permanently [...]
-
-
13:01
»
Hack a Day
[Jair2k4] ditched the Altoids tins and found a new voltage source for this latest rendition of his taser gloves. Regular readers will remember his first iteration which used wrist-mounted enclosures containing the flash circuitry from disposable cameras to shock the wits out of someone with the laying on of hands. This one is a complete [...]
-
-
6:32
»
SecDocs
Authors:
Ben Nagy Tags:
fuzzing Event:
Black Hat USA 2010 Abstract: If bugs are the raw ore of exploits - Rootite, if you like - then we're mining in areas where the Rootite is rare and deeply buried. Industrial scale bug mining starts with very, very fast fuzzing. In contrast to the MS Fuzzing Botnet, we use a dedicated, single purpose cluster of virtual machines which is optimised for fuzzing. Last year we released some metrics, then MS released better ones. So, we rebuilt the whole system and made it faster and more scalable - can we outperform the Redmond Botnet in one small rack? After a fuzz run, we are left with massive piles of low-grade Rootite, full of impurities such as Nullpointium, which needs to be graded and enriched before it is valuable. After grading, We "enrich" our highest grade Rootite by using differential runtracing of crashes to assist root cause analysis. The runtraces are tens of millions of lines long, but we postprocess them using magic, funky graphs and compression before comparing them side by side with the clean run. Our diff files are plaintext, small enough for us to eyeball them, and allow us navigate to any point in the trace using any debugger we choose. Feel free to drop by for a guided tour of the mine. Bring a beer.
-
-
0:28
»
SecDocs
Authors:
Lurene Grenier Richard Johnson Tags:
vulnerability assessment bug hunting fuzzing Event:
Black Hat USA 2010 Abstract: Much work has been presented in the past few years concerning bug discovery through fuzzing. Everything from the feasibility of exhaustive generation fuzzing, to the continued productivity of simple mutation fuzzing has been covered. This talk will assume finding bugs is a foregone conclusion, and instead discuss the pre and post fuzzing process necessary to efficiently analyze vulnerabilities for a given program to the stage where exploitability has a high confidence, and exploitation can be handed off or undertaken in house. This process will be driven by intelligent, analyst driven automation, with a focus on the continued production of exploitable bugs with a minimum of wasted effort.
-
18:51
»
Packet Storm Security Advisories
A critical pointer vulnerability is located in the Mac OS X and Windows versions of Skype. The bug is located in 2 input forms of a unicode HTTP search request to the Skype search directory server. The vulnerability allows a local attacker to crash the complete Skype process via an unknown unhandled software exception. The bug allows a local attacker to overwrite or read a new address (skype_debug2_win7_x64x.png).
-
18:51
»
Packet Storm Security Recent Files
A critical pointer vulnerability is located in the Mac OS X and Windows versions of Skype. The bug is located in 2 input forms of a unicode HTTP search request to the Skype search directory server. The vulnerability allows a local attacker to crash the complete Skype process via an unknown unhandled software exception. The bug allows a local attacker to overwrite or read a new address (skype_debug2_win7_x64x.png).
-
18:51
»
Packet Storm Security Misc. Files
A critical pointer vulnerability is located in the Mac OS X and Windows versions of Skype. The bug is located in 2 input forms of a unicode HTTP search request to the Skype search directory server. The vulnerability allows a local attacker to crash the complete Skype process via an unknown unhandled software exception. The bug allows a local attacker to overwrite or read a new address (skype_debug2_win7_x64x.png).
-
-
11:00
»
Hack a Day
[Dino] got his hands on an FM transmitter “bug” kit via a friend, and thought it would make for an easy and fun Hack a Week project. The kit is simple two transistor half-wave FM transmitter, which the manufacturer suggests could be used to bug a room, hence the name. After poking a bit of [...]
-
-
11:05
»
Packet Storm Security Advisories
PRE-CERT Security Advisory - Both the 2.4 and 2.6 Linux kernels have multiple vulnerabilities. A buffer overflow bug in mac_partition in fs/partitions/mac.c (for MAC partition tables) allows for a denial-of-service (kernel panic) condition via a corrupted MAC partition table. A division-by-zero bug in ldm_get_vblks in fs/partitions/ldm.c (for LDM partition tables) allows a denial-of-service (kernel oops) condition via a corrupted LDM partition table. A buffer overflow bug in ldm_frag_add in fs/partitions/ldm.c (for LDM partition tables) may allow escalation of privileges or disclosure of sensitive information via a corrupted LDM partition table.
-
11:05
»
Packet Storm Security Recent Files
PRE-CERT Security Advisory - Both the 2.4 and 2.6 Linux kernels have multiple vulnerabilities. A buffer overflow bug in mac_partition in fs/partitions/mac.c (for MAC partition tables) allows for a denial-of-service (kernel panic) condition via a corrupted MAC partition table. A division-by-zero bug in ldm_get_vblks in fs/partitions/ldm.c (for LDM partition tables) allows a denial-of-service (kernel oops) condition via a corrupted LDM partition table. A buffer overflow bug in ldm_frag_add in fs/partitions/ldm.c (for LDM partition tables) may allow escalation of privileges or disclosure of sensitive information via a corrupted LDM partition table.
-
11:05
»
Packet Storm Security Misc. Files
PRE-CERT Security Advisory - Both the 2.4 and 2.6 Linux kernels have multiple vulnerabilities. A buffer overflow bug in mac_partition in fs/partitions/mac.c (for MAC partition tables) allows for a denial-of-service (kernel panic) condition via a corrupted MAC partition table. A division-by-zero bug in ldm_get_vblks in fs/partitions/ldm.c (for LDM partition tables) allows a denial-of-service (kernel oops) condition via a corrupted LDM partition table. A buffer overflow bug in ldm_frag_add in fs/partitions/ldm.c (for LDM partition tables) may allow escalation of privileges or disclosure of sensitive information via a corrupted LDM partition table.
-
-
9:12
»
Packet Storm Security Advisories
Firefox version 3.6.13 fixes an interesting bug in their same-origin policy logic for pseudo-URLs that do not have any inherent origin associated with them.
-
9:12
»
Packet Storm Security Recent Files
Firefox version 3.6.13 fixes an interesting bug in their same-origin policy logic for pseudo-URLs that do not have any inherent origin associated with them.
-
9:12
»
Packet Storm Security Misc. Files
Firefox version 3.6.13 fixes an interesting bug in their same-origin policy logic for pseudo-URLs that do not have any inherent origin associated with them.
-
-
10:29
»
Hack a Day
If you’re a soldering ninja this FM transmitter bug is for you. It’s quite similar to the one we looked at yesterday, but this uses 100% salvaged parts. Two phones donated components; a Nokia 3210 for its voltage-controlled oscillator and a Nokia 1611 for the rest of the parts. The bad news is that mobile technology like [...]
-
-
19:00
»
Packet Storm Security Recent Files
jBCrypt versions prior to 0.3 suffered from a bug related to character encoding that substantially reduced the entropy of hashed passwords containing non US-ASCII characters.
-
19:00
»
Packet Storm Security Advisories
jBCrypt versions prior to 0.3 suffered from a bug related to character encoding that substantially reduced the entropy of hashed passwords containing non US-ASCII characters.