Tag: open source
-
VB2016 paper: Debugging and monitoring malware network activities with Haka
Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…
-
VB2016 paper: Debugging and monitoring malware network activities with Haka
Anyone who has ever analysed malware through its network communications will knows that this often involves ad-hoc scripts in languages like Python or Perl to decode the traffic. After all, for somewhat understandable reasons, there is no standard C&C protocol for malware. If you regularly find yourself in this situation, you may want to have…
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
VB2016 paper: Open Source Malware Lab
Security experts aren’t necessarily known for being skilled at predicting the future, but if there’s one prediction they are guaranteed to get right, it’s that there will be a lot of new malware in the coming year. As a consequence, increasing numbers of companies and researchers are likely to turn their attentions to setting up…
-
VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests
While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…
-
VB2016 preview: Detecting Man-in-the-Middle Attacks With Canary Requests
While man-in-the-middle attacks are relatively rare (especially among those not attending hacker conferences), it is quite common for computer users to be in a situation where an attacker could have an opportunity to take control of their network traffic. There are, of course, network mechanisms that seriously mitigate the risk, such as VPN or HTTPS,…
-
Paper: All Your Meetings Are Belong to Us: Remote Code Execution in Apache OpenMeetings
The rise of bug bounties in recent years has created an incentive for hackers to hunt for vulnerabilities in a lot of software and services. But what about those software projects that can’t pay bounties, because they are developed by volunteers? Thankfully, some researchers are devoting their time to such projects and to helping them…