15

image

The group of researchers found serious shortcomings in the WPA2 protocol, which provides protection for all modern Wi-Fi networks. An attacker who is in the victim's area can use these shortcomings using Key Reinstallation Attacks. Attackers can use this new attack method to read information that was previously considered to be encrypted.

UPD: the post was updated with partial details of the attack and the list of vendor updates.
Skull 4 november 2017, 11:55

image

Performing daily tasks of the system administrator is considered safe when working through the SSH session. This article will discuss modern tools for conducting MITM attacks on the SSH protocol and how to protect against them.
Papay 13 october 2017, 12:18

I want to share one feature when setting COOKIE values, which is often overlooked by the web developers.
According to my experience as for research of the web application vulnerabilities for 2009-2011, this error occurred in 87% of the web applications that were written in PHP.
In order to reduce this rate, I have decided to write this article.

I will not even talk about httpOnly flag, though its use is very important and necessary.

Let’s look at the example of code:
<?php
setcookie('foo','bar1');
header('Set-cookie: foo1=bar11');
?>
ZimerMan 23 may 2014, 18:18

imageA few days ago, the earliest Half-Life 2 version was released in the network for the media. Obviously, this version has not been finished yet, as the main game’s character is not known to the whole world of players a theorist physicist, who wears glasses and a protective suit and holds in his hand a crowbar, but bearded dwarf Ivan, a space biker, who is opposing against the staff of the research center. 15 years ago, the disk contents was reserved exclusively for members of the regular publishers.
Papay 28 january 2014, 13:14

This morning I found a letter in my mail:
image
In fact, this letter does not have any files attached, it just has 6 links (View, Download...), and they lead to the same address: http://95.211.83.65/~ru1/account.googlemail.com/viewer/13083e7f5f2c0890&
mt/0AgIDhQrUEZCMdGc0ejVXZGZpb1FrbWo5cmc2ZVZOalE/[email protected]

First I got to fake Google Docs with the message "document cannot be displayed", and then I was redirected to fake Google Account, where I was asked to enter a password. I guess for my own safety :). After I entered “screw you”, I got to the third fake page of docs with a list of some components.
Papay 27 november 2012, 17:05

It is known that any system reliability is determined by its weakest link. Now we take a good look at the protection from copying of one popular toy that was released a few days ago for OS X and the way of its bypass. In addition, we just look at one of the options for implementing the protection from copying. Of course, this research was conducted in the study purposes, and you still should buy the good software and games.

Step 1


Let’s run the game and see the registration form or purchase. The registration is done online by entering a serial number, or manually by entering a name and the key in accordance with the displayed identifier of a specific computer. Next, we run gdb and get program exited with code 055.
ZimerMan 23 june 2012, 11:54

image
This article is not a panacea for all security lacks, and it does not reveal any new attack vectors. I just saw a serious implementation of the fake for Google mail and decided to warn all UMumble users.

Recently, I have received an interesting letter, supposedly to confirm / cancel automatic forwarding to my mailbox.
Tags: fake, fishing, gmail
Papay 14 may 2012, 10:18

It would be true to say that everything new is well forgotten old.


A feature to embed remote resources (such as images from other websites) on the page of your website is a very bad practice that at some point may lead to quite serious consequences for the website. As far back as 10 years ago, I was surprised to read about that possibility. Now after 10 years nothing changed, and it seems that it hardly ever will change.
ZimerMan 30 april 2012, 8:28

Many people have faced the DDoS attacks and HTTP flooding. No, this is not just another tutorial on setting up nginx, but I would like to introduce my module that works as a quick filter between the bots and backend during L7 DDoS attacks, as well it allows filtering the garbage requests.

The module can do:


• To set cookies in a standard way through HTTP header Set-Cookie. After the cookies are set it redirects the user using the response code 301 and Location header.
• After the cookies are set it redirects the user using the response code 200 and HTML tag Meta refresh.
• To count the number of attempts to set the cookies and to direct the user to a specified URL after exceeding the maximum number of unsuccessful attempts.
• To use the custom templates for the filter response, for example, to set cookies through JavaScript.
ZimerMan 22 april 2012, 16:30

image

Once I have watched a movie about the computer hackers who have received an access to control the power system, water system and the road navigation of some city (or country). As far as I remember, the attackers nearly destroyed the control system of the entire country, because they had all the controls. The movie was shown at the beginning of 2000, so all that was interpreted as a science fiction. But the ideas that were shown in the movie gradually begin to be embodied by the real criminals. Thus, recently it became known that the unknown people managed to take control of U.S. public water system by remotely accessing one of the water treatment facilities and controlled the equipment.
Tags: hack, security, USA
ZimerMan 25 november 2011, 16:24
1 2