Subscribe via feed.
Posts under tools

WikiLeaks case focuses on Manning’s ‘intent’ – DAWN.com

Posted by deepcore under Apple, DDOS, facebook, m$, Privacy, software, tools, twitter, Wikileak (No Respond)

DAWN.com WikiLeaks case focuses on Manning's 'intent' DAWN.com 28808520http%3A%2F%2Fdawn.com%2F2012%2F07%2F17%2Fwikileaks-case-focuses-on-mannings-intent%2F WikiLeaks +case+focuses+on+Manning%27s+%27intent%272012-07-17+04%3A16%3A09Affan+Tajhttp%3A%2F%2Fdawn.com%2F%3Fp% …

Tags: , , , ,

CPU cache controller bug exploit (Remote code exec mod poc)

Posted by deepquest under exploit, tools (No Respond)

This bug  won’t be updated unless you change computer. It’s a remote code exec mod poc in javascript, the code will execute directly on your Intel Core2DUO CPU cache.

Tags:

Zero Day Initiative Advisory 12-125

Zero Day Initiative Advisory 12-125 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Forensic Analysis Of iPhone Backups

This article explains the technical procedure and challenges involved in extracting data and artifacts from iPhone backups.

Tags: , ,

WikiLeaks says it has obtained 2.4 million emails from Syria, claims … – Fox News

Posted by deepcore under DDOS, facebook, m$, Privacy, tools, twitter, Wikileak (No Respond)

Neon Tommy WikiLeaks says it has obtained 2.4 million emails from Syria, claims …

Tags: , , ,

strongSwan IPsec Implementation 5.0.0

strongSwan is a complete IPsec implementation for the Linux, Android, Maemo, FreeBSD, and Mac OS X operating systems. It interoperates with with most other IPsec-based VPN products via the IKEv2 or IKEv1 key exchange protocols. The focus of the strongSwan project is on strong authentication mechanisms using X.509 public key certificates and optional secure storage of private keys on smartcards through a standardized PKCS#11 interface

Tags: , ,

Apple QuickTime TeXML Stack Buffer Overflow

This Metasploit module exploits a vulnerability found in Apple QuickTime.

Tags: , ,

Zero Day Initiative Advisory 12-108

Zero Day Initiative Advisory 12-108 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Tags: , , ,

Zero Day Initiative Advisory 12-109

Zero Day Initiative Advisory 12-109 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file

Tags: , , ,

Zero Day Initiative Advisory 12-107

Zero Day Initiative Advisory 12-107 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple Quicktime. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XML elements within a TeXML file

Tags: , ,