Archive for the ‘Uncategorized’ Category

Heartbleed

Heartbleed Critical Vulnerability in OpenSSL

The security community is actively discussing over this week the openssl vulnerability that allows attacker to exploit the Heartbeat TLS and receive 64KB in the RAM memory. The attack can be repeated continuously to get sensitive information from end users such as their passwords. Many online servers were affected by this critical vulnerability while patching [...]

Share

Peepdf Utility for Analyzing Malicous PDF

PDF files are used on many web resources and if we look at malwares we find that attackers always choose to include their malicious JavaScript’s in pdf files. This will help them to hide their malcode, and it can infect thousands of online document readers. This is beside the number of vulnerabilities in third party [...]

Share
facebook-privacy

FBPwn – Facebook social engineering framework

Today we are sharing all our sensitive information on social networks websites such as Facebook, twitter and more. I have just used a very nice tool that you can use on your lab as a PoC about how it will be possible in a few minutes to download profiles and pages with all pictures locally. [...]

Share

Appologies to my readers

Dear readers I have an apology to make. As you may know it was recently highlighted by attrition.org that content on my blog and in other publications, such as the book Cloud Security Rules, were plagiarised.  Attrition.org have outlined their findings at http://attrition.org/errata/plagiarism/mourad_ben_lakhoua.html while the publisher of the Cloud Security Rules, The Roer group, has [...]

Share

COREvidence New Vision for Security Scanners

Any security professional have his own way and tools to conduct vulnerability assessment , the problem that we have when using different security assessment tools that utilities produce several reports with different results. This is not the only problem another important point is that these tools are expensive to purchase and depending on situation you [...]

Share