Pastejacking vs clipboard hijacking
Clipboard hijacking# It as been possible for a long time to use css (-9999px position trick) to append malicious content to the clipboard. Users doesn't notice anything and may execute unwanted comman
Clipboard hijacking# It as been possible for a long time to use css (-9999px position trick) to append malicious content to the clipboard. Users doesn't notice anything and may execute unwanted comman
Information# Version# Date By Version Comment 05/06/2016 noraj 1.0 Creation CTF# Name : BackdoorCTF 2016 Website : https://backdoor.sdslabs.co Type : Online Format : Jeopardy CTF Time : lin
Information# Version# Date By Version Comment 03/05/2016 noraj 1.0 Creation Name# Oups it's all mixed Category# Cryptography Wording# Decipher the following flag: eGqaelr557dK4BbK47dS17dK68c
C99 is a PHP webshell. Attackers uploads it on web server in order to get information and above all execute commands with web user privileges (ex: www-data). This webshell is protected by a customizab
Jose Carlos Norte, security researcher, wrote a post detailing how Tor Browser users can be uniquely fingerprinted using the mouse wheel, mouse speed, a CPU benchmark, and “getClientRects”. POCs (proo
Create a new user. In the following example, we will name it bob. root# useradd -m bob root# id bob uid=1000(bob) gid=1000(bob) groupes=1000(bob) Set the password for the new user. root# passwd bo
FreeBSD update to version 10.3. Main improvments: 15 security flaws patched UEFI support Gnome 3.16.2 Full Release Notes on official FreeBSD website.
OpenBSD update to version 5.9. Main improvments: Pledge - a new mitigation mechanism process in restricted mode security improved 70% of user components converted WiFi 802.11n multithread network
Before beginning# These are the steps to do on the SSH server. Be sure to do all the steps before exiting SSH connection if you are connected via SSH. This config was tested for default CentOS 7 iso.
NetBIOS is a very old protocol wich is no more interesting today except in some particular cases. But it has a large number of security flaws. We can use WMIC (Microsoft Windows Management Instrumenta