Jump to content

big_little

Members
  • Posts

    34
  • Joined

  • Last visited

Reputation

9 Neutral

About big_little

  • Rank
    Registered user
    Newbie

Converted

  • Location
    Crasma
  • Occupation
    mestecator de ciunga

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

  1. Pentru cei care au nevoie de o analiza nu foarte completa dar rapida pot incerca: Mobile-Sandbox Automated Malware Analysis - Joe Sandbox Cloud http://www.cuckoosandbox.org/
  2. Aici se gaseste o distributie linux, destul de utila, pentru analiza malware REMnux: A Linux Distribution for Reverse-Engineering Malware
  3. Tool-uri sunt multe, dar OllyDbg 2.0 este esential. Aici: Tutorials
  4. Open Malware | Community Malicious code research and analysis Malware Sample Sources for Researchers http://malware.lu/ VirusShare.com nu cred ca va duce cineva lipsa de sample-uri de malware. Le gasesti pe toate drumurile
  5. de acord cu Usr6. S-ar amesteca lucrurile in felul asta.
  6. I'm all in! Am cateva tutoriale ptr ollydbg&stuff
  7. Pe scurt: Informa?iile cu privire la siguran?a pa?aportului electronic fie sunt vagi ?i exagerate, fie nu exist? pe site-urile publice ale emiten?ilor. Lipsa informa?iilor oficiale clare ?i corecte nu duce la cre?terea încrederii în aceste documente, orice informa?ie (chiar nedocumentat?) din ter?e surse putând deveni astfel credibil?. Datele primare (mai pu?in amprentele) care sunt înscrise pe cip pot fi citite în mod electronic, de la distan??, folosind produse legale disponibile public. Nivelul de îndemânare tehnic? pentru a citi aceste date poate fi considerat unul mediu pentru o persoana familiarizat? cu tehnologia informa?iei. Cheia de acces ce ar trebui s? protejeze aceste date primare este relativ u?or de ghicit. Nivelul de îndemânare tehnic? pentru a ghici cheia de acces la datele primare: mediu spre ridicat. Datele primare pot fi citite de la distan??, chiar ?i printr-un rucsac. Cipul poate fi clonat (mai pu?in amprentele biometrice). Dac? s-ar folosi un pa?aport falsificat cu un cip clonat pe o „poarta inteligent?” (detalii mai jos), exist? posibilitatea de a intra în mod fraudulos într-o alt? ?ar?. (Din câte cunoa?tem noi, în România NU sunt folosite astfel de por?i inteligente.) sursa Despre siguran?a pa?aportului biometric ?i a datelor din el | Asocia?ia pentru Tehnologie ?i Internet
  8. Tampenia asta de virus a aparut din nou in ianuarie 2013 pe baza unei vulnerabilitati 0 day. Bitdefender ofera si solutia de dezinfectare: Remediu Bitdefender impotriva virusului ’’Politia Roman?’’
  9. Adobe is recommending ColdFusion users apply a series of mitigations to counter active exploits against vulnerabilities in the application server. An advisory was released late Friday night that the trio of flaws are being targeted by attackers, and that the company would not have a patch available for another week. “We are in the process of finalizing a fix for the issues and expect a hotfix for ColdFusion 10, 9.0.2, 9.0.1 and 9.0 for Windows, Macintosh and UNIX will be available on January 15, 2013,” the advisory said. Two of the vulnerabilities affect ColdFusion 10, 9.0.2, 9.0.1 and 9.0. The first, CVE-2013-0625, could enable an attacker to bypass authentication in place and remotely control a ColdFusion server. CVE-2013-0629, could allow an attacker to access restricted directories on a vulnerable server. The third vulnerability, CVE-2013-0631, affects versions 9.0.2, 9.0.1 and 9.0 and could lead to a data leak. “Note that CVE-2013-0625 and CVE-2013-0629 only affect ColdFusion customers who do not have password protection enabled, or have no password set,” Adobe said in its advisory. All of the vulnerabilities were given Adobe’s most critical rating. Adobe, meanwhile, recommends a series of mitigations. The first, Adobe said, is to build credentials for Remote Development Services that are different from those used for the administrator account. Once those credentials are configured, Adobe recommends disabling RDS. Users should also disable access from the outside to three directories: /CFIDE/administrator; /CFIDE/adminapi; and /CFIDE/componentutils, Adobe said. Any unknown or unnecessary ColdFusion components or templates should be removed from the CFIDE or webroot directories. Access control restrictions for the administrator interface and internal applications via the Administrator Console in version 10 should be implemented as we ll as within in the Web server’s access control mechanisms for versions 9.0.2 and earlier. Adobe also recommends users apply the latest hotfix available for ColdFusion. Sursa
  10. Poate l-a customizat pe al vostru. Sunt atacurile informatice pentru Iranieni ca "picaturile chinezesti", o sa ii distruga psihic
  11. Iranienii si-au luat-o din nou:) Iranian CERT is sounding the alarm over another bit of data-deleting malware it's discovered on PCs in the country. Dubbed Batchwiper, the malware systematically wipes any drive partitions starting with the letters D through I Drive, along with any files stored on the Windows desktop of the user who is logged in when it's executed. sursaBatchwiper malware, new virus targets Iranian computers - Hacker News , Security updates
  12. "Ma frend", pe Internet poti sa ai cate 7 vieti ca pisicile
  13. Chiar daca nu am avut o contributie prea mare pentru comunitate ma bucur ca ati revenit. Aici am gasit destule lucruri interesante care m-au ajutat in proiectele personale pe audit de securitate informatica (care chiar poate deveni o sectiune o forumului). Multa bafta!
  14. XnEOS sper sa ai viata scurta aici!
×
×
  • Create New...