Archive: 2016

0

Pastejacking vs clipboard hijacking

Clipboard hijacking# It as been possible for a long time to use css (-9999px position trick) to append malicious content to the clipboard. Users doesn't notice anything and may execute unwanted comman

0

Writeups - Crypto - MindBlown

Information# Version# Date By Version Comment 05/06/2016 noraj 1.0 Creation CTF# Name : BackdoorCTF 2016 Website : https://backdoor.sdslabs.co Type : Online Format : Jeopardy CTF Time : lin

0

Writeups - Crypto - Oups it's all mixed

Information# Version# Date By Version Comment 03/05/2016 noraj 1.0 Creation Name# Oups it's all mixed Category# Cryptography Wording# Decipher the following flag: eGqaelr557dK4BbK47dS17dK68c

0

How to manually configure Firefox / Waterfox language

Go to https://ftp.mozilla.org/pub/firefox/releases/ Choose the Firefox version, ex: 46.0 Choos the architecture, ex: linux-x86_64 Go into the xpi folder Choose a language, ex: fr.xpi Click on the cho

0

Virtualbox : shared folder with guest

This how-to works independently of the host platform. On virtualbox : Open the Configuration window of the VM (guest) Select Shared folder on the left menu Click on the icon corresponding to Add a sh

0

c99.php : A backdoored backdoor

C99 is a PHP webshell. Attackers uploads it on web server in order to get information and above all execute commands with web user privileges (ex: www-data). This webshell is protected by a customizab

0

Tracking down Tor users with mouse movements

Jose Carlos Norte, security researcher, wrote a post detailing how Tor Browser users can be uniquely fingerprinted using the mouse wheel, mouse speed, a CPU benchmark, and “getClientRects”. POCs (proo