Stefan

1,659 Flips | 8 Magazines | 89 Followers | @gnalsa | Keep up with Stefan on Flipboard, a place to see the stories, photos, and updates that matter to you. Flipboard creates a personalized magazine full of everything, from world news to life’s great moments. Download Flipboard for free and search for “Stefan”

How-to: Do Statistical Analysis with Impala and R

<b>The new RImpala package brings the speed and interactivity of Impala to queries from R.</b><i>Our thanks to Austin Chungath, Sachin Sudarshana, and Vikas</i> …

Full Disclosure: CORE-2013-0807 - Divide Error in Windows Kernel

<b>CORE-2013-0807 - Divide Error in Windows Kernel</b><p><i>From</i>: CORE Advisories Team <advisories () coresecurity com> <i><br>Date</i>: Wed, 11 Dec 2013 18:38:46</b> …

Advanced Windows Memory Dump Analysis with Data Structures, Third Edition | Software Diagnostics Technology and Services

The full transcript of Software Diagnostics Services training course with 12 step-by-step exercises, notes, and selected questions and answers. Learn …

Forensics

Analyzing Stealth Malware

Advanced malware employs many hiding techniques in order to evade anti-virus measures and to deceive the victim. Trojans come in the form of bound …

MisoSMS: New Android Malware Disguises Itself as a Settings App, Steals SMS Messages « MisoSMS: New Android Malware Disguises Itself as a Settings App, Steals SMS Messages

FireEye has uncovered and helped weaken one of the largest advanced mobile botnets to date. The botnet, which we are dubbing “MisoSMS,” has been used …

Getting Started with MongoDB on Node.js on OpenShift – OpenShift Blog

Node and MongoDB are a killer combination, providing powerful tools for quickly managing, storing, and querying collections of extensible JSON data …

Command-line

Microsoft Internet Explorer CVE-2013-5048 Memory Corruption Vulnerability

Microsoft Internet Explorer CVE-2013-5048 Memory Corruption Vulnerability<p>Bugtraq …

Information Security

You Should Change Your Python Shell

If you write Python code, switching to IPython is the number one thing you can do to immediately improve your productivity. Bold words, I know. Let’s …

Python Programming

Exploit

PHP

Getting Started with WinDBG - Part 1

By Brad Antoniewicz.<p>WinDBG is an awesome debugger. It may not have a pretty interface or black background by default, but it still one of the most …

Exploit

<b>EDB-ID</b>: 30397<p><b>Published</b>: 2013-12-17<p><b>Aliases</b>: N/A<p><b>Advisory/Source</b>: Link<p><b>Tags</b>: N/A<p><b>E-DB Verified</b>:<p><b>Vulnerable App</b>: N/A<p>Related Exploits<p><b>Trying to match CVEs …

Information Security

Portable Executable Injection For Beginners

Process Injection<p>Process injection is an age old technique used by malware for 3 main reasons: Running without a process, placing user-mode hooks for …

Hexacorn

• PESectionExtractor. It’s just a minor fix to make it parse PE32+ files.<br>• PECluester. Again, it’s just a minor fix for parsing the arguments + dates.

Parsing

JBoss Enterprise Application Platform CVE-2011-2487 Information Disclosure Vulnerability

Vulnerable:<p>Red Hat JBoss Enterprise Web Platform for RHEL 5 Server 5<br>Red Hat JBoss Enterprise Web Platform for RHEL 4ES 5<br>Red Hat JBoss Enterprise Web …

Information Security

StackBehaviour Enumeration

Member name<p>Description<p>Pop0<p>No values are popped off the stack.<p>Pop1<p>Pops one value off the stack.<p>Pop1_pop1<p>Pops 1 value off the stack for the first …

Heap Overflow in Floating Point Parsing (CVE-2013-4164)

There is an overflow in floating point number parsing in Ruby. This vulnerability has been assigned the CVE identifier CVE-2013-4164.<p>Details<p>Any time …

👼Ąż杏 on Twitter: "professional-looking ELF101 http://t.co/FpHpPylJFw http://t.co/CJfhrL4bwu"

Add this Tweet to your website by copying the code below. Learn more<p>Add this video to your website by copying the code below. Learn more

Root Access Podcast S2:E6: Inside of the WannaCry Ransomware Attack

It’s May, which means it has been one year since the infamous WannaCry attack, an unprecedented malware attack spread worldwide in a matter of hours, …

Web Site Hosting Malicious Binaries

Synopsis<p>Nessus detected malicious binaries being hosted on the remote web site.<p>Description<p>The MD5 sum of one or more binaries hosted on the remote …

Cybersecurity

News from the Lab Archive : January 2004 to September 2015

Posted by Sean @ 13:01 GMT<p>Today we uploaded a CryptoLocker encrypted file to its "Decryption Service".<p>We were promptly provided our Order ID:<p>We've …

Encryption

Debugging Python Like a Boss

Is the above code snippet similar to your tried-and-true debugging techniques? Yea, that used to be me too. Honestly, it's not so bad. Slap in some …

Python Programming

Malware Datamining and Attribution: Slides and Code

A few hours ago I delivered my presentation "Malware Datamining and Attribution: Theory, Code and Results" at DEEPSEC 2013. As promised th...

JBoss AS Attacks Up Since Exploit Code Disclosed

Attackers are exploiting a two-year-old vulnerability in JBoss Application Servers that enables a hacker to remotely get a shell on a vulnerable …

Unified Memory in CUDA 6

With CUDA 6, NVIDIA introduced one of the most dramatic programming model improvements in the history of the CUDA platform, Unified Memory. In a …

Corkami on Twitter: "ELF101 a Linux executable walkthrough https://t.co/tzieKSFgwT http://t.co/HfsuRLhfTt"

Add this Tweet to your website by copying the code below. Learn more<p>Add this video to your website by copying the code below. Learn more

Corkami on Twitter: "ELF101 a Linux executable walkthrough https://t.co/tzieKSFgwT http://t.co/krOEwWWt1r"

Add this Tweet to your website by copying the code below. Learn more<p>Add this video to your website by copying the code below. Learn more

PineApp MailSecure - Remote Command Execution

<b>EDB-ID</b>: 29734<p><b>Published</b>: 2013-11-20<p><b>E-DB Verified</b>:<p><b>Vulnerable App</b>: N/A<p>Related Exploits<p><b>Trying to match CVEs (3)</b>: CVE-2013-6829, CVE-2013-6830, …