Subscribe via feed.

Zero Day Initiative Advisory 12-075

Zero Day Initiative Advisory 12-075 – This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apple QuickTime Player. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within how the application decodes video samples encoded with the RLE codec

Tags: , ,

Intercepter-NG Console Edition 0.1

Intercepter-NG [Console Edition] is a sniffer that offers various capabilities including sniffing for password hashes related to ORACLE/MYSQL/VNC/NNTP/CVS/WWW/HTTP/SOCKS/MRA/FTP/POP3/SMTP/IMAP/LDAP/AIM. It works on NT/Linux/BSD/IOS/Android and is optimized for screen size 80×30 or higher.

Tags: , ,

Apple Security Advisory 2012-05-14-2

Apple Security Advisory 2012-05-14-2 – This update disables Adobe Flash Player if it is older than 10.1.102.64 by moving its files to a new directory.

Tags: , , ,

Apple Security Advisory 2012-05-14-1

Apple Security Advisory 2012-05-14-1 – This update runs a malware removal tool that will remove the most common variants of the Flashback malware. If the Flashback malware is found, it presents a dialog notifying the user that malware was removed. There is no indication to the user if malware is not found.

Tags: , , , ,

Secunia Security Advisory 47292

Secunia Security Advisory – Multiple vulnerabilities have been reported in Apple Safari, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and compromise a user’s system.

Tags: , ,

Apple Security Advisory 2012-05-07-1

Apple Security Advisory 2012-05-07-1 – A URL spoofing issue existed in Safari. This could be used in a malicious web site to direct the user to a spoofed site that visually appeared to be a legitimate domain. Multiple cross site scripting issues existed in WebKit along with a memory corruption issue.

Tags: , , , ,

iOS Application (In)Security

Posted by deepcore under Apple, exploit, iphone, OSX security tools, Security (No Respond)

This whitepaper details some of the vulnerabilities observed over the past year while performing regular security assessments of iPhone and iPad applications. MDSec documents some of the vulnerabilities identified as well as the methods to exploit them, and recommendations that developers can adopt to protect their iOS applications. It covers not only the security features of the platform, but provides in depth information on how to perform both black box and white box iOS penetration tests, along with suggested methodologies and compliance.

Tags: , , ,

IPhone TreasonSMS HTML Injection / File Inclusion

Posted by deepcore under Apple, iphone, OSX security tools (No Respond)

IPhone TreasonSMS suffers from html injection and file inclusion vulnerabilities.

Tags: , , ,

Hackers claim to have penetrated Foxconn backdoor

Posted by deepquest under iphone, Lulz, Security (No Respond)

We don't care about iPhones or workers, only lulz It had to happen eventually. Controversial hardware manufacturer Foxconn was reportedly hacked late on Wednesday and a heap of staff email log-ins and intranet credentials posted online which could allow third parties to lodge fraudulent orders.…

Tags: , , ,

iPhone Forensics On iOS 5

Posted by deepcore under Apple, iphone, OSX security tools (No Respond)

This is a brief whitepaper discussing how to perform forensics on iOS 5 on the iPhone.

Tags: , , ,