Introduction iViZ is the industry’s first company to position themselves as an on-demand penetration testing service for web applications. This is very different from the normal low cost vulnerability assessment services like Qualys, Hackersafe, Hackerguardian etc. Unlike conventional solutions, iViZ delivers consultant-grade quality with an on-demand experience. iViZ provides a hybrid solution that integrates automation […]
Countermeasures
French Company Intego Release First iPhone Malware Scanner
This is quite an interesting story as it’s very closely related to the story we published earlier this week – Malicious PDF Files To Exploit iPhone & iPad Zero Day In The Wild. Hot on the tail of that news is the first-ever malware scanning app for iOS devices (iPhone/iPad etc) from a French security […]
ksymhunter – Routines For Hunting Down Kernel Symbols
Routines for hunting down kernel symbols from from kallsyms, System.map, vmlinux, vmlinuz, and remote symbol servers. Examples:
1 2 3 4 |
$ ./ksymhunter prepare_kernel_cred [+] trying to resolve prepare_kernel_cred... [+] resolved prepare_kernel_cred using /boot/System.map-2.6.38-gentoo [+] resolved prepare_kernel_cred to 0xffffffff81061060 |
And..
1 2 3 4 |
$ ./ksymhunter commit_creds [+] trying to resolve commit_creds... [+] resolved commit_creds using /boot/System.map-2.6.38-gentoo [+] resolved commit_creds to 0xffffffff81060dc0 |
You can download ksymhunter v1.0 here: ksymhunter.tar.gz Or read more here.
Microsoft Enhanced Mitigation Evaluation Toolkit (EMET)
The enhanced Mitigation Experience Toolkit (EMET) is designed to help prevent hackers from gaining access to your system. Software vulnerabilities and exploits have become an everyday part of life. Virtually every product has to deal with them and consequently, users are faced with a stream of security updates. For users who get attacked before the […]
Malware Analyser v3.0 – A Static & Dynamic Malware Analysis Tool
Malware Analyser is freeware tool to perform static and dynamic analysis on malware executables, it can be used to identify potential traces of anti-debug, keyboard hooks, system hooks and DEP setting change calls in the malware. This is a stepping release since for the first time the Dynamic Analysis has been included for file creations […]