SpiderLabs Radio February 1, 2013 w/ Space Rogue

This weeks episode of SpiderLabs Radio hosted by Space Rogue covers The New York Times, Anonymous ...

Read More

[Honeypot Alert] Active Probes for Ruby on Rails XML Vulns

In a previous blog post, I outlined some ModSecurity defenses to help protect Ruby on Rails users ...

Read More

SpiderLabs Radio January 25, 2013 w/ Space Rogue

This weeks episode of SpiderLabs Radio hosted by Space Rogue covers the redirect of MIT.edu, Quebec ...

Read More

Owning Windows Networks with Responder 1.7

A lot has been happening with Responder lately!

Read More

SpiderLabs Crypto Contest - Winner!

We have a winner! @TimoHirvonen

Read More

SpiderLabs Radio January 18, 2013 w/ Space Rogue

This week's episode of SpiderLabs Radio hosted by Space Rogue covers Aaron Swartz and a movement to ...

Read More

Defeating AES without a PhD

"Cryptography is typically bypassed, not penetrated." – Adi Shamir FAITH IN THE ARCANE When I tell ...

Read More

QA w/ SpiderLabs Research: Java 0day CVE-2013-0422

Q: What's going on? People are talking about some Java 0daywhich threatens the whole world… Bring ...

Read More

Microsoft Patch Tuesday, January 2013 - Part II

It's now official, there is another bulletin (MS13-008) release for the month of January and ...

Read More

SpiderLabs Radio January 11, 2013 w/ Space Rogue

We are back with another episode of SpiderLabs Radio hosted by Space Rogue. This week's news covers ...

Read More

ModSecurity Mitigations for Ruby on Rails XML Exploits

There is big trouble in Ruby on Rails (RoR) land... The issue is related to XML parsing of YAML ...

Read More

First Java 0day For The Year 2013

Today @Kafeine was the first to announce the new Java 0day. This 0day allows an attacker to execute ...

Read More

SpiderLabs Crypto Contest - Hints

This is a post for those attempting to solve the Crypto contest I introduced a couple weeks ago. ...

Read More

Microsoft Patch Tuesday, January 2013 – Hot Sauce

I had lunch today at a great little Cajun restaurant in Chicago called Heaven on Seven, so named ...

Read More

Goodies released with Trustwave SWG Security Update 141

As cliché as it may sound, security is done in layers and so, using our generic rules, we were able ...

Read More

SpiderLabs Radio January 04, 2013 w/ Space Rogue

We are back with another episode of SpiderLabs Radio hosted by Space Rogue. This weeks news covers ...

Read More

Dissecting a CVE-2012-4792 Payload

A little while ago I was fortunate enough to get ahold of a sample that was dropped on a system ...

Read More

Microsoft Advance Notification for January 2013

If you were hoping for a nice relaxing Patch Tuesday after the holidays, well, sorry to disappoint ...

Read More

Hacking with Drain Cleaner – Yet Another BitLocker Bypass Technique

As hard-wired as any Application Specific Integrated Circuit it seems the Infosec community can't ...

Read More

Choppy Regulatory Waters ahead for EU SMEs?

There's been a reasonable amount of coverage of the (proposed) data protection legal framework ...

Read More

Photobucket: An Identity Thief's Playground

Photobucket is a popular social media site that acts as gallery and cloud storage for user photos. ...

Read More

Internet Explorer - 2012 Last Minute 0-Day

Using Zero Days attacks at end of the year are not the most considerate thing to do for the ...

Read More

Wardrive, Raspberry Pi Style!

I purchased a Raspberry Pi a few weeks back. I found that I could power it, with a WiFi card and a ...

Read More

Getting Terminal Access to a Cisco Linksys E-1000

Over the past couple weeks, I've been spending a lot of time hacking on various embedded devices to ...

Read More

Assessing iOS Applications – setting up a test environment and grabbing low hanging fruit

This guide should serve as an introduction for those wishing to get into iOS application security ...

Read More

Teaching Security Self-Defense

My background in IT comes mostly from a nomadic perspective. In my years of IT and InfoSec, I've ...

Read More

Smuggler - An interactive 802.11 wireless shell without the need for authentication or association

I've always been fascinated by wireless communications. The ability to launch seemingly invisible ...

Read More

Be Off the Beaten XPath, Go Blind

XPath (XML Path Language) is a language used to query XML documents in order to extract data. XML ...

Read More