science and technology

US State Bans Forced RFID Tagging Of Humans




science and technology

RFID Chip Implants Linked To Cancer In Animals




science and technology

Banks Turns London Man Into RFID-Enabled Guinea Pig




science and technology

RFID Reader To Locate Passive Tags To Within Six Inches




science and technology

Hackers Claim RFID Smart-Card Hack, But Vendor Disagrees




science and technology

RFID-Hack Hits 1 Billion Digital Access Cards Worldwide




science and technology

US State Outlaws RFID Data Theft




science and technology

Hacker Confab Last Hope To Track Attendees With RFID




science and technology

Creepy - The RFID Urn Retrieval System




science and technology

Mythbusters RFID Episode Axed After Pressure From Credit Card Firms




science and technology

Big Brother Tracking Comes To Second Life




science and technology

Are RFID Chips A Personal Security Risk?




science and technology

California Bans RFID Skimming




science and technology

D-Day For RFID-Based Transit Card Systems




science and technology

Feds At DefCon Alarmed After RFIDs Scanned




science and technology

Steel-Woven Wallet Pledges To Keep RFID Credit Cards Safe




science and technology

New RFID Tag Could Mean The End Of Bar Codes




science and technology

European Commission Launches New Industry Guidelines On RFID Privacy









science and technology

RFIDler - A Kickstarter Worth Backing




science and technology

Microsoft Windows WizardOpium Local Privilege Escalation

Microsoft Windows WizardOpium local privilege escalation exploit.




science and technology

Deep Instinct Windows Agent 1.2.29.0 Unquoted Service Path

Deep Instinct Windows Agent version 1.2.29.0 suffers from an unquoted service path vulnerability.




science and technology

CoronaBlue / SMBGhost Microsoft Windows 10 SMB 3.1.1 Proof Of Concept

CoronaBlue aka SMBGhost proof of concept exploit for Microsoft Windows 10 (1903/1909) SMB version 3.1.1. This script connects to the target host, and compresses the authentication request with a bad offset field set in the transformation header, causing the decompresser to buffer overflow and crash the target.




science and technology

Microsoft Windows SMB 3.1.1 Remote Code Execution

Microsoft Windows SMB version 3.1.1 suffers from a code execution vulnerability.




science and technology

Microsoft Windows 10 SMB 3.1.1 Local Privilege Escalation

Microsoft Windows 10 SMB version 3.1.1 SMBGhost local privilege escalation exploit.




science and technology

Microsoft Windows Net Use Insufficent Authentication

The Windows "net use" network logon type-3 command does not prompt for authentication when the built-in Administrator account is enabled and both remote and originating systems suffer from password reuse. This also works as "standard" user but unfortunately we do not gain high integrity privileges. However, it opens the door and increases the attack surface if the box we laterally move to has other vulnerabilities present.




science and technology

Microsoft Windows NtFilterToken ParentTokenId Incorrect Setting Privilege Escalation

Microsoft Windows suffers from an NtFilterToken ParentTokenId incorrect setting that allows for elevation of privileges.




science and technology

Microsoft Windows SE_SERVER_SECURITY Security Descriptor Owner Privilege Escalation

In Microsoft Windows, by using the poorly documented SE_SERVER_SECURITY Control flag it is possible to set an owner different to the caller, bypassing security checks.




science and technology

Microsoft Windows Unquoted Service Path Privilege Escalation

This Metasploit module exploits a logic flaw due to how the lpApplicationName parameter is handled. When the lpApplicationName contains a space, the file name is ambiguous. Take this file path as example: C:program fileshello.exe; The Windows API will try to interpret this as two possible paths: C:program.exe, and C:program fileshello.exe, and then execute all of them. To some software developers, this is an unexpected behavior, which becomes a security problem if an attacker is able to place a malicious executable in one of these unexpected paths, sometimes escalate privileges if run as SYSTEM. Some software such as OpenVPN 2.1.1, OpenSSH Server 5, and others have the same problem.





science and technology

Syrian Electronic Army Gets Dose Of Own Medicine





science and technology

Syrian Electronic Army Claims CNN As Its Latest Victim








science and technology

Taboola Hack Allows SEA To Redirect Reuters Site Visitors





science and technology

Second Hacking Crew Joins Syrian Electronic Army On Team Assad






science and technology

Fake 'Femme Fatales' Aid Syrian Battle Hack