ame

Bing.com Hostname / IP Enumerator 1.0

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.




ame

WebSploit Framework 4.0.1

WebSploit is an advanced man-in-the-middle framework.




ame

10Strike LANState 9.32 Host Check hostname Buffer Overflow

10Strike LANState version 9.32 on x86 Host Check hostname SEH buffer overflow exploit.




ame

No cON Name 2019 Call For Papers

The No cON Name 2019 call for papers has been announced. It will be held in Barcelona, Spain, from November 14th and 15th, 2019.








ame

Windscribe WindscribeService Named Pipe Privilege Escalation

The Windscribe VPN client application for Windows makes use of a Windows service WindscribeService.exe which exposes a named pipe \.pipeWindscribeService allowing execution of programs with elevated privileges. Windscribe versions prior to 1.82 do not validate user-supplied program names, allowing execution of arbitrary commands as SYSTEM. This Metasploit module has been tested successfully on Windscribe versions 1.80 and 1.81 on Windows 7 SP1 (x64).





ame

Russian Loses Wife In Poker Game




ame

SetNamedSecurityInfo() Ignores / Destroys Protected DACLs / SACLs

With Windows 2000 Microsoft introduced the inheritance of access rights and new Win32-API functions like SetNamedSecurityInfo() which handle the inheritance. SetNamedSecurityInfo() but has a serious bug: it applies inheritable ACEs from a PARENT object to a target object even if it must not do so, indicated by the flags SE_DACL_PROTECTED and/or SE_SACL_PROTECTED in the security descriptor of the target object.




ame

US Names The Day For Biometric Passports




ame

TP-LINK Cloud Cameras NCXXX SetEncryptKey Command Injection

TP-LINK Cloud Cameras including products NC260 and NC450 suffer from a command injection vulnerability. The issue is located in the httpSetEncryptKeyRpm method (handler for /setEncryptKey.fcgi) of the ipcamera binary, where the user-controlled EncryptKey parameter is used directly as part of a command line to be executed as root without any input sanitization.






ame

Suspected Commonwealth Games DDoS Was Only A Fortnite Update




ame

Anonymous Hacker Gets 6 Years For Some Lame DDoS Attacks




ame

Mobile Security Framework MobSF 0.9.2 Beta

Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.




ame

Mobile Security Framework MobSF 0.9.3 Beta

Mobile Security Framework (MobSF) is an all-in-one open source mobile application (Android/iOS) automated pen-testing framework capable of performing static and dynamic analysis. It can be used for effective and fast security analysis of Android and iOS Applications and supports both binaries (APK & IPA) and zipped source code. MobSF can also do Web API Security testing with it's API Fuzzer that performs Information Gathering, analyze Security Headers, identify Mobile API specific vulnerabilities like XXE, SSRF, Path Traversal, IDOR, and other logical issues related to Session Management and API Rate Limiting.




ame

Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework

Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework.




ame

Bing.com Hostname / IP Enumerator 1.0.2

This tool enumerates hostnames from Bing.com for an IP address. Bing.com is Microsoft's search engine which has an IP: search parameter. Written in Bash for Linux. Requires wget.




ame

ACDSee FotoSlate PLP File id Parameter Overflow

This Metasploit module exploits a buffer overflow in ACDSee FotoSlate 4.0 Build 146 via a specially crafted id parameter in a String element. When viewing a malicious PLP file with the ACDSee FotoSlate product, a remote attacker could overflow a buffer and execute arbitrary code. This exploit has been tested on systems such as Windows XP SP3, Windows Vista, and Windows 7.




ame

.NET Framework 4.6 DLL Hijacking

A DLL side loading vulnerability was found in the .NET Framework version 4.6 when running on Windows Vista or Windows 7. This issue can be exploited by luring a victim into opening an Office document from the attacker's share. An attacker can use this issue to execute arbitrary code with the privileges of the target user. This can potentially result in the attacker taking complete control of the affected system. If the WebDAV Mini-Redirector is enabled, it is possible to exploit this issue over the internet. This issue can be exploited even if the Office document is opened in Protected View.








ame

GNUnet P2P Framework 0.11.5

GNUnet is a peer-to-peer framework with focus on providing security. All peer-to-peer messages in the network are confidential and authenticated. The framework provides a transport abstraction layer and can currently encapsulate the network traffic in UDP (IPv4 and IPv6), TCP (IPv4 and IPv6), HTTP, or SMTP messages. GNUnet supports accounting to provide contributing nodes with better service. The primary service build on top of the framework is anonymous file sharing.





ame

Macs Framework 1.14f Cross Site Scripting / SQL Injection

Macs Framework version 1.14f suffers from cross site scripting and remote SQL injection vulnerabilities.







ame

Visual Voicemail For iPhone IMAP NAMESPACE Use-After-Free

Visual Voicemail for iPhone suffers from a use-after-free vulnerability in IMAP NAMESPACE processing.





ame

URLCrazy Domain Name Typo Tool 0.7.1

URLCrazy is a tool that can generate and test domain typos and variations to detect and perform typo squatting, URL hijacking, phishing, and corporate espionage. It generates 15 types of domain variants, knows over 8000 common misspellings, supports multiple keyboard layouts, can check if a typo is a valid domain, tests if domain typos are in use, and estimates the popularity of a typo.




ame

TP-LINK Cloud Cameras NCXXX Bonjour Command Injection

TP-LINK Cloud Cameras including products NC200, NC210, NC220, NC230, NC250, NC260, and NC450 suffer from a command injection vulnerability. The issue is located in the swSystemSetProductAliasCheck method of the ipcamera binary (Called when setting a new alias for the device via /setsysname.fcgi), where despite a check on the name length, no other checks are in place in order to prevent shell metacharacters from being introduced. The system name would then be used in swBonjourStartHTTP as part of a shell command where arbitrary commands could be injected and executed as root.




ame

American Cities of the Future 2019/20 - the winners

New York continues to reign as leader of fDi’s American Cities of the Future 2019/20 ranking. San Francisco retains second place with Toronto rising to third. Naomi Davies reports.




ame

American Cities of the Future 2019/20 – FDI strategy

A more detailed look at fDi's judges’ top five American Cities of the Future 2019/20 for FDI strategy. Naomi Davies reports.




ame

A Twitch Streamer Is Exposing Coronavirus Scams Live




ame

View from the Americas: new perspectives in a time of pandemic

The coronavirus pandemic could change human behaviour more permanently in future.




ame

Latin America prepares for sharp drop in FDI amid coronavirus pandemic

The fallout from the pandemic looks set to stall trade and investment to Latin America.




ame

Zonamerica looks beyond Latin America for expansion opportunities

Uruguay-based Zonamerica has successfully expanded into Colombia and China, and is now looking to export its model to other parts of Asia and Africa.




ame

View from the Americas: the evolving political economy of FDI

We are currently in a state of heightened business and economic disruption and sociopolitical activism, which only looks set to intensify. 




ame

Microsoft makes a crossborder connection in North America

While governments grow more protectionist over trade and physical borders, companies such as Microsoft are bridging the gap by funding international collaborative enterprises.




ame

View from the Americas: time for action on SDGs

Giant investment firm BlackRock throwing its weight behind sustainability issues is sending a signal to the corporate world to respond urgently to global calls for action, writes Gregg Wassmansdorf.




ame

Latin America embraces China's Belt and Road with enthusiasm

Up to 18 countries across Latin America have joined China’s new Belt and Road Initiative, hoping to boost their infrastructure development and investment.