Subscribe via feed.
Posts under OSX security tools

Apple Security Advisory 2012-07-25-2

Apple Security Advisory 2012-07-25-2 – Xcode 4.4 is now available and addresses SSL and keychain access vulnerabilities.

Tags: , , , ,

Apple Security Advisory 2012-07-25-1

Apple Security Advisory 2012-07-25-1 – A cross-site scripting issue existed in the handling of feed:// URLs in Safari.

Tags: , ,

Zero Day Initiative Advisory 12-125

Zero Day Initiative Advisory 12-125 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Forensic Analysis Of iPhone Backups

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.

Tags: , ,

strongSwan IPsec Implementation 5.0.0

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface

Tags: , ,

Apple QuickTime TeXML Stack Buffer Overflow

This Metasploit module exploits a vulnerability found in Apple QuickTime.

Tags: , ,

Zero Day Initiative Advisory 12-108

Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Zero Day Initiative Advisory 12-109

Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file

Tags: , , ,

Zero Day Initiative Advisory 12-107

Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file

Tags: , ,

Zero Day Initiative Advisory 12-107

Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime.

Tags: , , ,