magnify
Home 2012 Ağustos
formats

CVE-2012-0667 – Analysis

The vulnerability occurs when parsing 16-bit integer in sizelength of impn, imgp and vrsg atoms in a quicktime movie file. Basically it converts the 16-bit to 32-bit integer. Due to it’s a signed integer , it passes some comparison checks. Then I think it uses this integer as an “unsigned” in a memory copy operation

Read More…

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 
formats

Browser Tabanlı Malware / Exploit Analizi (CVE-2012-0003)

Makale: http://www.signalsec.com/publications/exploit-cve-2012-0003.pdf

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 
formats

CVE-2011-4051 : Proof of Concept Code

InduSoft Web Studio 6.1 and 7.0 allows unauthenticated users to run commands such as delete/create file, folder and load DLL. Vulnerability was discovered by Luigi Auriemma Here is a simple PoC for this vulnerability: #PoC for CVE-2011-4051 #CEServer Module in InduSoft Web Studio 6.1 and 7.0 allows unauthenticated user to run commands. #These are ;

Read More…

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 
formats

Presentation: Industrial Chaos – SCADA Hacking

Slides of my talk about SCADA Hacking (Turkish) : http://www.signalsec.com/publications/endustriyel-kaos.pdf

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments 
formats

Windows Mobile Forensics

WinMobForensic is a basic tool I developed for windows mobile forensics. Download Free

 
 Share on Facebook Share on Twitter Share on Reddit Share on LinkedIn
No Comments  comments