Category: Vulnerabilities & Exploits

Test your website for BashSmash (CVE-2014-6271) online

A Critical remotely exploitable vulnerability has been discovered in the widely used Linux and Unix command-line shell, known as Bash, aka the GNU Bourne Again Shell, leaving countless websites, servers, PCs, OS X Macs, various home routers, and many more open to the cyber criminals. Earlier today (September 24th 2014), Stephane Chazelas publicly disclosed the […]

How to DDoS through Facebook Datacenter with almost 1Gbps. They’ve started to care!

The vulnerability, found by Teofil Cojocariu in June 12, Security Researcher has a simple concept but it can leave a big impact on websites of small companies or individuals. He made Open Source the script that exploits this vulnerability, leading to a Distributed Denial of Service (DDoS) of ~1Gbps using Facebook datacenter. Update: Facebook […]

Pentesting 101 – what you should know?

The big majority of attacks performed over the systems available via Internet are made in the application layer due to the easiness of launching an attack and the lack of app protection. For verifying the security of IT infrastructures an audit is carried out, but this action is insufficient in many situations in determining the […]

The efficiency of signature detection

It has been more than 20 years since the discovery of first efficient method for detecting and eliminating general threats or infections for regular computer users. This method uses signature detection, both in antivirus type software and in IPS systems (two resembling solutions but used in different environments). Old fashion signature protection The biggest problem […]