:::: MENU ::::
Browsing posts in: Blog

SQL Fuzzing for fun and profit

Interesting article on SQL Injection Fuzzing.

This article is going to talk about Obfuscated SQL Fuzzing. Nowadays all high profile sites found in financial and telecommunication sector use filters to filter out all types of vulnerabilities such as SQL, XSS, XXE, Http Header Injection e.t.c. In this particular article we are going to talk only about Obfuscated SQL Fuzzing Injection attacks.

First of all what obfuscate means based on the Dictionary.com:

“Definition of obfuscate: verb (used with object), ob¬∑fus¬∑cat¬∑ed, ob¬∑fus¬∑cat¬∑ing.

  • To confuse, bewilder, or stupefy.
  • To make obscure or unclear: to obfuscate a problem with extraneous information.
  • To darken.”
  •  

    Link: securityhorror.blogspot.gr

    Fun – Chunk Norris facts

    NewImageThis is very funny in a nerdy way…

    Chunk Norris is the cyber brother of Chuck Norris. He is a computer programmer and hacker. He was the first to allocate a chunk of memory, before memory was created.

    Link: fotis.loukos.me

    Security Risk in Firefox: How to turn off Firefox’s New Tab Page Completely | About Security

    NewImage

    If you’re using Firefox, you should be awareof a possibility of information leakage through the new Tab Page that may disclose confidential information through the screenshots that are presented.

    You should turn of this feature for the time being, as described in the article below.

    Link: aboutse.cc

    How to drink whisky

     

    Very insightful video on Whisky testing

    Ice? No Ice? Water? More whisky? Coke? Lemonade? How do you drink your whisky? It’s caused pub arguments for centuries and here’s Whyte & Mackay Master Blender Richard Paterson to show you why ice is a bad idea, water is OK – and why you should dip your finger in the water jug.


    The malware factory

    Interesting read…

    Article Published on The Hacker New Magazine – June Edition “Malware” With the term malware we refer a heterogeneous family of malicious software designed with the purpose to disrupt computer operation, gather sensitive information, or gain unauthorized access to victims systems. With the term we indicate in fact several types of malicious code such as computer viruses, worms, trojan, spyware, ramsonware, adware, rootkits, and other applications. In recent years we have witnessed an unprecedented growth in the development of malware linked to rapidly changing of the technological context supported by the increased use of internet and the explosion of mobile services. 

    Link: securityaffairs.co

    Backups

    Interesting article!

    For many new Mac owners, the move to Mountain Lion represents your first major upgrade. To help users prepare to make the jump, Erica Sadun and I wrote Getting Ready for Mountain Lion, an Amazon/iBooks eBook. It's aimed at first-time upgraders and people looking for hints and tips about smoothing the transition. We're sharing some of our tips on TUAW in a series of posts about the 10.8 upgrade.

    Although most Mac OS X upgrades go smoothly, there's always a chance that something can go wrong. Hundreds of thousands of files are changed during an upgrade, so there's a possibility that one or more of those changes can cause your Mac to decide to not boot up properly. Without a backup, your data might be gone forever.

    Before you purchase Mountain Lion from the Mac App Store in July and begin the process of upgrading, make sure you back up your Mac! To begin with, you'll need an external disk drive that is at least twice the capacity of the drive that's built into your Mac. USB drives are surprisingly affordable; a glance at Amazon.com today showed a number of 2 TB drives for US$120 or less.

    Backups don't have to be difficult, thanks to Apple's Time Machine app. Just plug your external drive into your Mac and OS X will ask if you wish to use that drive for Time Machine backups. Answer in the affirmative, and backups begin immediately.

    I'm personally a fan of bootable backups, meaning that if the primary hard drive in your Mac fails, you can boot right off of the backup copy. To create these backups, I use SuperDuper! ($27.95). Every night, the app performs some file maintenance, then adds changed or new files to a full backup (SuperDuper! includes a scheduling tool for setting up backups at regular intervals). To make sure that the backup is indeed bootable, I test it once a month. Another amazing app for bootable backups is Carbon Copy Cloner (Free, but $20 recommended).

    To test your bootable backup, go to System Preferences and click on "Startup Disk". Click on the backup drive icon to select it, and then click the Restart button. If all is well, your Mac should boot from the backup drive.

    Doing daily backups should be part of your Mac OS X routine already, but if it isn't, then the move to Mountain Lion should be your impetus to start backing up now.

    Link:  www.tuaw.com


    Apple quietly publishes public guide to iOS security

    Finally some guidelines from Apple

    Without fanfare, Apple has recently published an extensive guide to both the mechanics and the philosophy taken with regards to security in iOS, discussing the architecture, encryption, network security and interaction with other devices among other topics. The paper, which lays out the company's approach to security, basically demonstrates the advanced security concepts that have lead to such practices as the sandboxing of apps due to be copied into OS X Mountain Lion….

    Link: electronista.feedsportal.com