In this article we will explain why and how to upgrade your password protection.
Latest Posts
Android Application Reverse Engineering. Reversing Angry Birds.
Parasite may reinstall itself multiple times if you don’t delete its core files. We recommend downloading SpyHunter to scan for malicious programs installed with it. This may save you hours and cut down your...
Hydra IRC bot, the 25 minute overview of the kit.
Hydra IRC bot, the 25 minute overview of the kit. (25 minutes to write and “do”, not to read!) The Hydra IRC botnet kit is a very interesting sample that we have in our collection. It is, essentially, “RX-Bot for Routers”. By...
Password Algorithms: Internet Explorer 10 (Windows Vault)
Introduction Microsoft added a new feature to Windows 7 called ‘Vault’ which you can access through the Credential Manager in control panel or vaultcmd from command line. It works very similar to Gnome Key Ring on Linux or the...
Memcached Remote Denial of Service PoC
A long time ago, in 2011, a rather serious vulnerability was reported in Memcached. It is now 2013, and the vulnerability still exists in the latest version on the memcached Google Code page. The report is here: Now, as you can...
[Howto] Installing Nemesis on Ubuntu Linux
Ok. Nemesis is a very powerful Packet Crafting/Injection tool for Unix based systems. I have heard that ALLEGEDLY it can be installed/ran on Windows also, ailment but never felt like trying, as I do not use Windows nor is Windows...
Password Algorithms: Skype (Windows)
Introduction There’s a fantastic article by Fabrice Desclaux and Kostya Kortchinsky which describes the encryption and structures used but doesn’t provide any code. The article indicates it isn’t possible to decrypt the password...
Injecting arbritary Metasploit payloads into Windows executables.
This is a very simple writeup, site demonstrating how simple it is to use Metasploit to inject arbritary code into a Windows executable, effectively backdooring said executable. By backdooring a legitimate executable, we can...
Bitcoin “Brainwallets” and why they are a bad idea
// Decided to publish this after some misgivings about disclosure. After telling Asher about it earlier, it was decided to disclose it to make people aware of the issue. A week or two ago, I stumbled across an article about how...