security-obscurity.blogspot.com security-obscurity.blogspot.com

security-obscurity.blogspot.com

Security Obscurity Blog

Yes, another blog. Thursday, July 25, 2013. Styxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities. Styxy Cool Exploit Kit is a particular kit because it is a "merge" between Cool and Styxy Exploit Kit. Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has and why its called Styxy Cool go check Kafeine's post here. Between 8 and 9 of July two interesting things happened:. Jar size increased from 5Kb to 28 Kb. Payload (Reveton) disappeared from fiddler.

http://security-obscurity.blogspot.com/

WEBSITE DETAILS
SEO
PAGES
SIMILAR SITES

TRAFFIC RANK FOR SECURITY-OBSCURITY.BLOGSPOT.COM

TODAY'S RATING

>1,000,000

TRAFFIC RANK - AVERAGE PER MONTH

BEST MONTH

October

AVERAGE PER DAY Of THE WEEK

HIGHEST TRAFFIC ON

Monday

TRAFFIC BY CITY

CUSTOMER REVIEWS

Average Rating: 4.5 out of 5 with 15 reviews
5 star
8
4 star
6
3 star
1
2 star
0
1 star
0

Hey there! Start your review of security-obscurity.blogspot.com

AVERAGE USER RATING

Write a Review

WEBSITE PREVIEW

Desktop Preview Tablet Preview Mobile Preview

LOAD TIME

0.8 seconds

FAVICON PREVIEW

  • security-obscurity.blogspot.com

    16x16

  • security-obscurity.blogspot.com

    32x32

  • security-obscurity.blogspot.com

    64x64

  • security-obscurity.blogspot.com

    128x128

CONTACTS AT SECURITY-OBSCURITY.BLOGSPOT.COM

Login

TO VIEW CONTACTS

Remove Contacts

FOR PRIVACY ISSUES

CONTENT

SCORE

6.2

PAGE TITLE
Security Obscurity Blog | security-obscurity.blogspot.com Reviews
<META>
DESCRIPTION
Yes, another blog. Thursday, July 25, 2013. Styxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities. Styxy Cool Exploit Kit is a particular kit because it is a merge between Cool and Styxy Exploit Kit. Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has and why its called Styxy Cool go check Kafeine's post here. Between 8 and 9 of July two interesting things happened:. Jar size increased from 5Kb to 28 Kb. Payload (Reveton) disappeared from fiddler.
<META>
KEYWORDS
1 security obscurity blog
2 once deobfuscated
3 jar size
4 missing reveton
5 from mainadd2
6 so geturls
7 it's executed
8 edit 1
9 related post
10 3 comments
CONTENT
Page content here
KEYWORDS ON
PAGE
security obscurity blog,once deobfuscated,jar size,missing reveton,from mainadd2,so geturls,it's executed,edit 1,related post,3 comments,labels applet,cool,exploit,exploit kit,iframe,java,malware,reveton,styxy,with javascript only,base64 applet jnlp,score
SERVER
GSE
CONTENT-TYPE
utf-8
GOOGLE PREVIEW

Security Obscurity Blog | security-obscurity.blogspot.com Reviews

https://security-obscurity.blogspot.com

Yes, another blog. Thursday, July 25, 2013. Styxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities. Styxy Cool Exploit Kit is a particular kit because it is a "merge" between Cool and Styxy Exploit Kit. Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has and why its called Styxy Cool go check Kafeine's post here. Between 8 and 9 of July two interesting things happened:. Jar size increased from 5Kb to 28 Kb. Payload (Reveton) disappeared from fiddler.

INTERNAL PAGES

security-obscurity.blogspot.com security-obscurity.blogspot.com
1

Security Obscurity Blog: February 2013

http://security-obscurity.blogspot.com/2013_02_01_archive.html

Yes, another blog. Tuesday, February 26, 2013. Deobfuscating Java 7u11 Exploit from Cool Exploit Kit (CVE-2013-0431). At the beginning of the past week @EKWatcher. Has spotted Cool Exploit Kit. Using Java 7 update 11 vulnerability (CVE-2013-0431). This vulnerability was already reported by Security Explorations. On seclist few days after Oracle issued update 11. Folder on Windows XP. The applet used by Cool EK was named would-blood.jar and once opened with JD-GUI the result was this. Now through the use ...

2

Security Obscurity Blog: April 2012

http://security-obscurity.blogspot.com/2012_04_01_archive.html

Yes, another blog. Monday, April 23, 2012. CartaSi phishing email part 2/2. Behind this phishing emails there are several people or just one guy? What i think is that there is only one guy because if you check the title of this script you see the write assembled by ME,. If it was a team should be written Assembled by XYZ team. Where is he from? Cartasi, uk paypal, banca intesa, it paypal, postepay, VISA). Cartasi, paypal, VISA, bancopostaclick). When a victim click on the link will be redirected to this ...

3

Security Obscurity Blog: November 2012

http://security-obscurity.blogspot.com/2012_11_01_archive.html

Yes, another blog. Thursday, November 15, 2012. Java Exploit Code Obfuscation and Antivirus Bypass/Evasion (CVE-2012-4681). Why not play a game where we try to make the latest (at time of writing) public java exploit ( CVE-2012-4681. Undetected by all antivirus and see who will be the last to detect it? I think it will be a funny "challenge" because evading antivirus has always his charm. Http:/ immunityproducts.blogspot.com.ar/2012/08/java-0day-analysis-cve-2012-4681.html. Who will be the last? Let's st...

4

Security Obscurity Blog: December 2012

http://security-obscurity.blogspot.com/2012_12_01_archive.html

Yes, another blog. Friday, December 7, 2012. Attacking Windows 8 with Java Exploit and Metasploit. In the last post i was talking about how to obfuscate a Java exploit (CVE-2012-4681 link here. Now i want to show you how an attacker can use this obfuscated exploit for a targeted. This is intended to be the second part of Wordpress Cookie Grabber. Video because i will show what you can do once you have compromised a website, frank's blog in this case. The victim will be only the administrator. A powerfull...

5

Security Obscurity Blog: About the new java 0 day vulnerability (CVE-2013-0422)

http://security-obscurity.blogspot.com/2013/01/about-new-java-0-day-vulnerability.html

Yes, another blog. Thursday, January 10, 2013. About the new java 0 day vulnerability (CVE-2013-0422). A couple of hours ago @Kafeine. Discovered a new java 0 day exploit in the wild. This exploit is served by most exploit kits like Blackhole, Cool exploit kit and Nuclear pack.When the malicious applet is executed its download and execute a copy of Zeus. A curious thing is that Zbot comes with a self signed digital certificate. But detection rate is quite good with 12/46 link. You can find both files here.

UPGRADE TO PREMIUM TO VIEW 15 MORE

TOTAL PAGES IN THIS WEBSITE

20

LINKS TO THIS WEBSITE

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: August 2010

http://c4an-dl.blogspot.com/2010_08_01_archive.html

Sunday, August 22, 2010. Cold Fusion article.cfm SQL injection. Just look in google using the following query:. I will sugest that you also try not to touch .com sites and start with sites that are in other remote countries. Also try to test this on sites that use ssl so in case the site is monitored by an IDS or IPS it won't detect you. The next thing that you have to do is identify all sites that are using something like this:. Id=1 UNION select 1,1,1,1,1,1,name from systables;-. Have fun ;).

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: November 2010

http://c4an-dl.blogspot.com/2010_11_01_archive.html

Monday, November 15, 2010. VXworks - Open can of worms. However, I would like to add, people if you have not tested or use these modules on your pentests I will just say: DO IT! Well, I just wanted to throw this out there and since all the info is already posted out I will not waste your time anymore. SAP application server default passwords. This is something that I want to share here just because sometimes I forget the links that I see out there. So just for the sake of it this a link. Pages I like .

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: Raven Airlink default password scanner

http://c4an-dl.blogspot.com/2012/11/raven-airlink-default-password-scanner.html

Tuesday, November 27, 2012. Raven Airlink default password scanner. This is a short post that I have been wanting to do for a long time but I haven't have time. I know, excuses. I hope this helps someone. This file is part of the Metasploit Framework and may be subject to. Redistribution and commercial restrictions. Please see the Metasploit. Web site for more information on licensing and terms of use. Class Metasploit3 Msf: Auxiliary. Include Msf: Exploit: Remote: HttpClient. License' = MSF LICENSE.

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: March 2011

http://c4an-dl.blogspot.com/2011_03_01_archive.html

Friday, March 25, 2011. Nessus reports to csv. Even though it seems a stupid thing there have been times when I have to upload Nessus reports to an excel spreadsheet to play with the data and report a executive summary of all the vulns. I putting this post as a personal reference with the hope that sometimes it will help someone. 1 Export the Nessus report to a .nesssus (v1) file. 2 Convert the nessus report to a nbe file with the following command. Opt/nessus/bin/nessus - dot-nessus NESSUS REPORT.

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: Nessus reports to csv

http://c4an-dl.blogspot.com/2011/03/nessus-reports-to-csv.html

Friday, March 25, 2011. Nessus reports to csv. Even though it seems a stupid thing there have been times when I have to upload Nessus reports to an excel spreadsheet to play with the data and report a executive summary of all the vulns. I putting this post as a personal reference with the hope that sometimes it will help someone. 1 Export the Nessus report to a .nesssus (v1) file. 2 Convert the nessus report to a nbe file with the following command. Opt/nessus/bin/nessus - dot-nessus NESSUS REPORT.

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: December 2010

http://c4an-dl.blogspot.com/2010_12_01_archive.html

Monday, December 13, 2010. Metasploit HTTP fuzzer v0.2 - Tutorial. The main idea of this post is give an overview of the fuzzer that I developed. I don't think it is an state of the art fuzzer. Actually, I think it is pretty dumb fuzzer but I feel it can help a lot if you know how to configure it and use metasploit at the same time. To start using the fuzzer download the file from here. And save it in the metasploit msf3 folder under "/modules/auxiliary/fuzzers/http/". Example 1 - NUMERIC Fuzzing (TYPE 1).

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: September 2010

http://c4an-dl.blogspot.com/2010_09_01_archive.html

Sunday, September 5, 2010. The types of of iterations that you can use are:. 3 CUSTOM Fuzzing. Define POSITIONS and advanced option CHARS. 4 File (Provide a File to use). 5 RANDOM Characters e.g. �! 6 SQL injection (will use Msf: Config.install root/data/wordlists/sql injections.txt). 7 Long strings eg. A x 10000. Things that you might want to try while using this tool:. Use methods GET or POST. Configure a COOKIE and fuzz. Add custom HEADERS and fuzz. Transversal, passwords, etc. RHOST = TARGET IP.

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: August 2011

http://c4an-dl.blogspot.com/2011_08_01_archive.html

Thursday, August 4, 2011. HP Data Protector vuln. This is a quick post on a vuln we (ch0ks and I)identified and exploit in a HP-UX during a pentest. The vuln had been already reported on the ZDI site and had a working PoC on security focus. The metasploit module that I developed using this analysis has been already submitted to the team and hopefully they will included in it. Just to show you guys that I am not full of it I included some screenshots of the execution of the module. Gr33tz to ch0ks, etlow.

c4an-dl.blogspot.com c4an-dl.blogspot.com

c4an dll: May 2010

http://c4an-dl.blogspot.com/2010_05_01_archive.html

Wednesday, May 26, 2010. FCKeditor not rocket science/fckeditor. Just the other day I was doing a test and I identified a website that used FCKeditor to modify the content of the web pages that they had. Basically this tool is an easy way to allow dum users to update whatever they want on their sites without the lazy and/or busy administrator to give support to the users. Pretty straight forward right? The module can be founded here: fckeditor-scan. Look for the folder:. Subscribe to: Posts (Atom).

UPGRADE TO PREMIUM TO VIEW 10 MORE

TOTAL LINKS TO THIS WEBSITE

19

SOCIAL ENGAGEMENT



OTHER SITES

security-now.net security-now.net

セキュリティなう | ウイルス対策ソフト比較2015

Windows Vista,7,8,8.1. Windows XP,Vista,7,8,8.1. Windows Vista,7,8,8.1. Windows XP,Vista,7,8,8.1.

security-ntc.com security-ntc.com

ColoCall.Net ISP Kiev, Ukraine, Сервер веб-хостинга

404: Не найдено / Not Found. Запрошенная страница http:/ www.security-ntc.com. Не найдена, потому что домен www.security-ntc.com. Не указывает ни на один виртуальный сервер. Пожалуйста, обращайтесь через форму контакта. The requested page http:/ www.security-ntc.com. Was not found because domain www.security-ntc.com. Does not refer to any virtual server. Please contact us using the contact form. Хостинг и колокейшн провайдер, Hosting and colocation provider. Рейтинг, счетчик и статистика для сайтов.

security-objectives.com security-objectives.com

Security Objectives Home

Security Objectives - Security Consultancy and Software Development Corporation. Security Objectives is a security-centric consultancy and software development corporation which operates in the area of application assurance software. Security Objectives employs methods that are centered on software comprehension, therefore a more in-depth contextual understanding of the application is developed. Our experienced, professional staff can handle the most challenging security problems. Take a mome...

security-objectives.net security-objectives.net

security-objectives.net - security-objectives Resources and Information.

This page provided to the domain owner free. By Sedo's Domain Parking. Disclaimer: Domain owner and Sedo maintain no relationship with third party advertisers. Reference to any specific service or trade mark is not controlled by Sedo or domain owner and does not constitute or imply its association, endorsement or recommendation.

security-objectives.org security-objectives.org

Website Disabled

Sorry, the site you requested has been disabled.

security-obscurity.blogspot.com security-obscurity.blogspot.com

Security Obscurity Blog

Yes, another blog. Thursday, July 25, 2013. Styxy Cool Exploit Kit: One Applet to Exploit All Vulnerabilities. Styxy Cool Exploit Kit is a particular kit because it is a "merge" between Cool and Styxy Exploit Kit. Here we will cover only Java related exploits so, if you want to know what vulnerabilities it has and why its called Styxy Cool go check Kafeine's post here. Between 8 and 9 of July two interesting things happened:. Jar size increased from 5Kb to 28 Kb. Payload (Reveton) disappeared from fiddler.