Positive Technologies expert helps to fix vulnerability in Viber for Windows

Viber has fixed a vulnerability in the company\’s Windows client found by a group of security experts, which included a Positive Technologies researcher. This security bug enabled attackers to steal data needed for user authentication in Windows. Users urged to update to Viber version 6.7.2 \”In essence, when a link resembling http://host/img.jpg is sent during a chat, Viber would first load it as the client … Continue reading Positive Technologies expert helps to fix vulnerability in Viber for Windows

Cobalt: How Criminals Hacked ATMs

Image: redspotted | Flickr Following an extensive investigation, cyber security company Positive Technologies has today revealed how hackers were able to steal the equivalent of £28,000 ($35,000), overnight, from six ATMs of an Eastern European bank. Its findings confirm that the theft could have been far worse as the technique used in the scam fortunately \”clashed\” with the financial institutions existing NCR ATM software, preventing … Continue reading Cobalt: How Criminals Hacked ATMs

RankMyHack.Com – Who is the coolest web hacker

Who is the coolest web hacker? Everyone who is involved in the field of information security asks this question from time to time. LulzSecurity? Anonymous? Anyone else? It seems impossible to objectively identify someone as the best one. However, a site appeared in the Net a couple weeks ago which is aimed at determining who the best hacker is indeed! This site is http://RankMyHack.com. As … Continue reading RankMyHack.Com – Who is the coolest web hacker

PHP features in Windows operating system

Vladimir Vorontsov (aka d0znpp) has published rather interesting research about features in PHP interaction with Windows. It started as the equivalence between the following methods of file access was noticed: any.phP any.php any.ph< any.ph> Let’s consider a real situation to clearly understand the value of this method. Please, try to assume that we have a web application with a lot of holes and flaws like … Continue reading PHP features in Windows operating system

Methods of quick exploitation of blind SQL Injection Vulnerabilities in Oracle

I had gathered an interesting collection of quick methods of blind SQL Injection exploitation, but I was lacking in a similar method for another widespread DBMS – Oracle. It induced me to conduct a small research intended for discovering analogous methods applicable to the specified database. I found out that all known methods of error-based Blind SQL Injection exploitation don’t work in the Oracle environment. … Continue reading Methods of quick exploitation of blind SQL Injection Vulnerabilities in Oracle

Methods of Quick Exploitation of Blind SQL Injection

A couple of days ago TinKode attracted everybody’s attention by breaking a web site in the domain army.mil. The server onestop.army.mil was attacked and the investigator found a Blind SQL Injection vulnerability on it. A logically true query: A logically false query: This time, I was most interested not in the fact of server compromise, but in the applied technique of exploitation of Blind SQL … Continue reading Methods of Quick Exploitation of Blind SQL Injection

Another fine method to exploit SQL Injection and bypass WAF

A method that I discovered today in MySQL documentation struck me with its simplicity and the fact that I haven’t noticed it before. Let me describe this method of bypassing WAF. MySQL servers allow one to use comments of the following type: /*!sql-code*/ and /*!12345sql-code*/ As can be noticed, SQL code will be executed from the comment in both cases! The latter construction means that … Continue reading Another fine method to exploit SQL Injection and bypass WAF