Vulnerabilities

The Windows Kerberos Vulnerability: What You Need to Know

A mythological three-headed dog was supposed to guard the gates of Redmond. But it turns out that Kerberos was very poorly implemented in numerous versions o

NAT-PMP Vulnerability

In this article we will learn about the latest NAT-PMP vulnerability being discovered, which will affect around 1.2 billion SOHO routers worldwide. What is a

End of SSL with POODLE

In this article we will learn about the how SSL has reaches its end with various vulnerabilities. This article will also cover the recent vulnerability disco

Shellshock [CVE-2014-6271]: Another Attack Vector - Bluffing IPS/IDS Sensors With Python Crafted Pkts

While a lot of online websites and blogs are explaining the vulnerability damage, providing PoC scripts and repetitive information, here we will look into an

Exploiting and verifying shellshock: CVE-2014-6271

The Bash Bug vulnerability (CVE-2014-6271) A new critical vulnerability, remotely exploitable, dubbed "Bash Bug", is threatening billions of machines all ov

Exploiting Systemic Query Vulnerabilities: Why You Should Not Attempt to Re-invent PDO

The particular exploits in this article take advantage of systemic query factory vulnerabilities, vulnerabilities which exist throughout an entire applicatio

Padding oracle attack

Firstly, this vulnerability is not related to the Oracle database or the Oracle Company in any way. In cryptography, an 'oracle' is a system that performs cr

Vulnerabilities in OpenSSL and GnuTLS: An Earthquake in Internet Encryption

HeartBleed … the Internet encryption earthquake The first serious earthquake in the encryption world is the disclosure of the Heartbleed vulnerability (CVE-2

Android Master Key Vulnerability—PoC

The recently discovered master key vulnerability in Android has given a jolt to the Android team and other parties involved. This vulnerability allows attack

Databases—vulnerabilities, costs of data breaches and countermeasures

This post introduces principal database vulnerabilities, providing an overview of the possible effects for their exploitation. For each database vulnerabil