<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-1141001117732421828</id><updated>2026-01-24T18:09:17.280+05:30</updated><category term="Malware"/><category term="Web Attacks"/><category term="Tutorials"/><category term="Cyber Crime"/><category term="Vulnerabilty Disclosure"/><category term="About this blog"/><category term="Misc"/><title type='text'>Hyper Security</title><subtitle type='html'>&quot;Finding your way in the Dark world of Information security..&quot;</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default?start-index=26&amp;max-results=25'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>31</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-3724417013690489465</id><published>2011-08-11T16:04:00.002+05:30</published><updated>2011-08-11T16:13:32.187+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Uncovering Win32/Momibot communication</title><summary type="text">The malware sample i am going to be looking at today is classified as Backdoor:Win32/Momibot by Microsoft and also referred to as Backdoor/IRCNite by some other AV vendors.  Packet captures of the sample from my automated sandbox results look something like this -     So, basically the Trojan is communicating on TCP ports 8090 as well as 80. Forcing wireshark to decode packets with TCP port 8090 </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/3724417013690489465/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2011/08/uncovering-win32momibot-communication.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3724417013690489465'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3724417013690489465'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2011/08/uncovering-win32momibot-communication.html' title='Uncovering Win32/Momibot communication'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIr4QrtHtZj_pvxA27_lIozKPRTnNIrGXHDDT5WDxRuYEMJ6fugf6PQ2W85VOv8b2Wl5OpaNNzhheJjrs0UhjEOYWOL2cfenZzSAh_HJMUJ409-ZbQ5EedFdCvaSFU0zcNI9opqSe-Ozw/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-810391741675362753</id><published>2011-07-13T16:50:00.001+05:30</published><updated>2011-07-13T16:50:56.712+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Quick look into CVE-2011-1255 Microsoft IE Time Element Memory Corruption vulnerability</title><summary type="text">Microsoft patched this vulnerability in June’s Patch Tuesday, but as usual an exploit has emerged for it. The M86 Security team stumbled upon an exploit in the wild and they have already done an excellent job of covering the exploit vector. I fired up Malzilla and decided to dig a little bit deeper to see how the exploit works.  This is a use-after-free vulnerability that is exploited using </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/810391741675362753/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2011/07/quick-look-into-cve-2011-1255-microsoft.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/810391741675362753'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/810391741675362753'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2011/07/quick-look-into-cve-2011-1255-microsoft.html' title='Quick look into CVE-2011-1255 Microsoft IE Time Element Memory Corruption vulnerability'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkyRz10rf5wPuijIKK5K_VgBWm6WjU2HmgOeVioB_IczZ9_J8Mx3vAWJPkQWNKGDwKpDa4A875Z_BBr2NKlYXXMZm7ihIPZPDQON9AmFRA52BFwY-F2zAZ_S98dkbyAmz0YiiTws2tLOg/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8986370601597579026</id><published>2011-07-10T14:14:00.003+05:30</published><updated>2011-07-10T14:20:24.321+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Misc"/><title type='text'>Blocking Ultrasurf</title><summary type="text">As part of maintaining Application Recognition signatures, I often get asked by customers if we have support for blocking Ultrasurf – the free proxy based anonymizer tool that is often (miss)used for bypassing content filters in enterprises.  Unfortunately, blocking this over Network using IPS signatures is not possible since the traffic is encrypted. There has been good amount of analysis done </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8986370601597579026/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2011/07/blocking-ultrasurf.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8986370601597579026'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8986370601597579026'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2011/07/blocking-ultrasurf.html' title='Blocking Ultrasurf'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8236475790761875503</id><published>2010-10-29T22:12:00.003+05:30</published><updated>2010-10-29T22:21:14.423+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Google Code hosting Malware components</title><summary type="text">Nothing new, It has happened in the recent past as folks at Zscaler had pointed out. But this time its not the malware itself, but part of its configuration and components being hosted on Google code servers. For those who don’t know Google code is a free, Web based platform that provides tools and resources to developers interested in working on Google-related open source software projects or </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8236475790761875503/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/10/google-code-hosting-malware-components.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8236475790761875503'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8236475790761875503'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/10/google-code-hosting-malware-components.html' title='Google Code hosting Malware components'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8KMpY4wN6e-3ERlm4nDhYh8NuQa9pMplCE5eTCXxioIweljRwkemHjJh4-kDlME3QFd6MnN7AGopkI0hR6ZHBrJYi4zyqlafo_Bb6nZufWOEc5CJHktawiEs1f-k_nwmIyL6yey-NNYc/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8057339570326460431</id><published>2010-09-23T15:25:00.001+05:30</published><updated>2010-09-23T15:25:58.275+05:30</updated><title type='text'>After long time..</title><summary type="text">Yeah, Its been a really really long time since I have written something here and I apologize for that. It’s just that I have been a hell lot busy with new stuff at work and a lot of research that I have been doing in building Malware automation Frameworks ! Plus not to mention the ton of 0days that have been piling on recently.  Hopefully, I should get some more free time from now on and I will </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8057339570326460431/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/09/after-long-time.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8057339570326460431'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8057339570326460431'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/09/after-long-time.html' title='After long time..'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWghuaszK3B6_49842J0IpHEzt9kKBQhco1ZXAXOyVEMaYfKRA0b0SH2Yp6HO9Vqz0e9czmsyLebefm8IAlY4EMj-MWwJchBN0x7f91On9Wt_baJ6hc3inFBOtXLHyIpRAxhMNQEbeKBU/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-2387289708850797386</id><published>2010-04-14T16:43:00.001+05:30</published><updated>2010-04-14T16:49:05.898+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Trojan Heloag Botnet</title><summary type="text">Looks like there is a new Botnet on the horizon. Win32/Heloag is treated as Backdoor Trojan by many AV companies but appears to be a new kind of Botnet that uses P2P for communicating with its peers and Bot master. Its been out there for a while now.  A recent post by Arbor Networks on the Bot’s analysis actually prompted me to have a closer look at this piece of malware. Either their report is </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/2387289708850797386/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/04/trojan-heloag-botnet.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2387289708850797386'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2387289708850797386'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/04/trojan-heloag-botnet.html' title='Trojan Heloag Botnet'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjstiQiJVdy20xuSh1KWwJtZYIsfjpadVIzBhikrdJweXZN9OdmoOPe3ExTWIgLyPBFxkClkLkLAtjs1Dn3PzoY8iRe9q3qbKblPwQT8DrzhV7u2yZH_KF-WArGLBQh6dbZJTK-dfofDVE/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-6715124941389857669</id><published>2010-04-01T16:38:00.001+05:30</published><updated>2010-04-01T16:38:24.761+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Vulnerabilty Disclosure"/><title type='text'>PDF Command execution vulnerability</title><summary type="text">Researcher Didier Stevens just managed to discover that he can make PDF reader execute any command without exploiting any vulnerability ! On his blog he demonstrated how the “Launch” action parameter of PDF document can be abused to execute arbitrary command on the victims machine.  Though he did not reveal complete details, his partial PoC is good enough to guess how the attack can be made </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/6715124941389857669/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/04/pdf-command-execution-vulnerability.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/6715124941389857669'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/6715124941389857669'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/04/pdf-command-execution-vulnerability.html' title='PDF Command execution vulnerability'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDFA61tR1BeKFcGOlWLQNcjRze2NDnkAfu55kHK_Uma7YzeeQHGNLFZzzc5GRYBw97z9qw3HTUn5pCLV1tXpFeSfhLEH4U4yAmXfgfqG-VF2WQ2DxX4b4JnIJP8cVK1NztfuwFUAMVTIU/s72-c?imgmax=800" height="72" width="72"/><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-4974153369945751947</id><published>2010-03-25T15:46:00.001+05:30</published><updated>2010-03-25T15:46:30.192+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Trying to skip the fish</title><summary type="text">Automated Web application security testing tool “skipfish” was released recently which seem to have generated a lot of attention in the “security community”. So,I decided to give it a try and install it in my lab.  Unfortunately, I run very old Linux distros in my lab (like RedHat 9 for example) and I am too lazy to upgrade to newer versions. Anyways, during installation I soon realized that it’s</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/4974153369945751947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/03/trying-to-skip-fish.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4974153369945751947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4974153369945751947'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/03/trying-to-skip-fish.html' title='Trying to skip the fish'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-4757845602573329519</id><published>2010-03-12T17:13:00.002+05:30</published><updated>2010-03-12T17:15:58.189+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>CVE-2010-0188 Adobe Reader TIFF vulnerability</title><summary type="text">The recent Adobe reader vulnerability (CVE-2010-0188) seems to be doing lot of rounds these days. Thanks to Mila (contagio blog), I got a chance to look at the malicious PDF file.  A Quick look at the stats using pdf-parser tool reveals the structure of this file -     C:\Analyze&amp;gt;pdf-parser.py -a &quot;2010 March Luncheon Invitation_FINAL.pdf&quot;    Comment: 4     XREF: 0     Trailer: 0     StartXref:</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/4757845602573329519/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/03/cve-2010-0188-adobe-reader-tiff.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4757845602573329519'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4757845602573329519'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/03/cve-2010-0188-adobe-reader-tiff.html' title='CVE-2010-0188 Adobe Reader TIFF vulnerability'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjE7vuIqw61FmI_wZXANXPpxdG37o4e9-B7LQ1NxYntb5khYEeCvTs721B78Cs0sl-s04GWF6elX2pnpnO6LRJoA-cqNF4KtMD5leW-8MfSDwYxH8-5ZUqfGWM3Z4tJaGuDXH0JllrSdFw/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-7632961553186976022</id><published>2010-02-16T16:15:00.004+05:30</published><updated>2010-02-16T16:34:51.873+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Olympics 2010 news ending up with Malware</title><summary type="text">Recently I covered how malware authors use Blackhat SEO poisoning to distribute malware on unsuspecting victims. Since then, I have been closely monitoring the news trends and this time the bad guys are targeting is searches related to Vancouver Olympic  games 2010.   Tragedy struck at the Olympic games Luge (ice racing) event, when a 21 year old athlete Nodar Kumaritashvili died during a </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/7632961553186976022/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/02/olympics-2010-videos-ending-up-with.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/7632961553186976022'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/7632961553186976022'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/02/olympics-2010-videos-ending-up-with.html' title='Olympics 2010 news ending up with Malware'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAOXKQxRlJYnnkk5MLfgcP3LAq3pqAl2Pa8a8kb5HM0f1rnW7zYcqKRQVlNZLBvB1NBcU09QNh7OONTQZTEHo3STDpih3zLLl5Mlf_7gv4rUTWnqiDUYp6_FCPbzIRe6x6FhkR2lzoCGA/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-3624481323989495737</id><published>2010-02-03T14:53:00.002+05:30</published><updated>2010-02-05T17:03:37.266+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Trojan using MS SQL ??</title><summary type="text">Well its my first post in 2010 :) … rather late, apologize for that.   Recently came across a Trojan sample that actually connects to a Database server and does some SQL commands ! This is the first time I saw something like this.   Normally, Backdoors and other malware use HTTP interfaces (POST/GET commands) to talk to their command servers, but in this case the malware was talking directly to </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/3624481323989495737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2010/02/trojan-using-ms-sql.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3624481323989495737'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3624481323989495737'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2010/02/trojan-using-ms-sql.html' title='Trojan using MS SQL ??'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXsyO-jtYu13SwmJ1Z0cMn5W3FEjDsmoxndb2jmphui_1vQnp3xm6CZo3k5-JYSEWwFoGMaPttq7wSabBozQbk96bsX31Zuv79iucnyRKKD54d5_DMqVgOSE0WMJZOvJveCsIxuFklU1w/s72-c?imgmax=800" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-4416028382152320532</id><published>2009-12-30T16:19:00.002+05:30</published><updated>2009-12-30T16:37:49.237+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Digging deep into BlackHat SEO - Part2</title><summary type="text">Picking from where we left-off last time, I decided to dig deep into how the whole fake AV scam was being done. So, I fired up Wireshark as I started to browse the Google search results for Brittany Murphy.     After clicking on the poisoned search result, we first land on a page that is just a html page with all the junk related to the Google search query. Depending on your internet speed, you </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/4416028382152320532/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/digging-deep-into-blackhat-seo-part2.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4416028382152320532'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4416028382152320532'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/digging-deep-into-blackhat-seo-part2.html' title='Digging deep into BlackHat SEO - Part2'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjb4lWhQg36sXO6EIOf9E_zV17uLJylWDakqqPlDVLyJ3l1OSq8YfBLLMKWt_u6Yg3w2XwbSKSi1J6cZYjSQkg-HQk-PFPKmjigPogQ68VbmMpk4_-no7wrEC26uHSAEkf8fVJmR_lvoK0/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8561167422835016967</id><published>2009-12-24T15:33:00.002+05:30</published><updated>2009-12-24T15:36:52.492+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Digging deep into BlackHat SEO – Part1</title><summary type="text">It was used before for tragic news and has been seen once again now when actress Brittany Murphy passed away over the last weekend. Cybercriminals have been very effectively using SEO techniques to download malware on users machines who are trying to browse Internet looking for latest breaking news.  A simple Google search for “Brittany Murphy death” reveals some interesting search results. After</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8561167422835016967/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/digging-deep-into-blackhat-seo-part1.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8561167422835016967'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8561167422835016967'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/digging-deep-into-blackhat-seo-part1.html' title='Digging deep into BlackHat SEO – Part1'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwCNbUfEujU9xE3_xDn0Y1xliRRS0FcVBNOFDJ_yvlcfS2zbnSzYSnLkU1nWDXa1YhV4ANCFJro3xFVUHDOL1H0O23lm_boft2tF9N2fVBIpK8xrWLKruZIyiv8RdJuMhtsmmsM83cNIw/s72-c?imgmax=800" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-5679217485204592368</id><published>2009-12-02T16:19:00.005+05:30</published><updated>2009-12-02T18:08:17.451+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>NetBIOS Spoofing</title><summary type="text">The other day I came across a post at skullsecurity.org that spoke about an interesting way of using NetBIOS name service for doing MiTM attack. The author showed how his tool nbpoison could be used to inject false NetBIOS information on the wire and spoof other hosts.This is very interesting form of doing MiTM as there is no arp-spoofing involved and that is good, since every Tom, Dick and </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/5679217485204592368/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/netbios-spoofing.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/5679217485204592368'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/5679217485204592368'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/12/netbios-spoofing.html' title='NetBIOS Spoofing'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8247190052696619717</id><published>2009-11-20T17:55:00.002+05:30</published><updated>2009-11-25T13:19:02.583+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Dissecting Zeus Botnet...</title><summary type="text">Posting after a long time.. was quite busy with some presentations to make as well as with my Protocol Fuzzer script which should be ready soon.  Anyways, the Zeus Botnet has been around for quite some time now and has gained some attention with its Internet Banking password stealing campaigns and Zeus Crimeware Kit ! Recently I received a sample which happened to be one of the Trojans belonging </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8247190052696619717/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/11/dissecting-zeus-botnet.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8247190052696619717'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8247190052696619717'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/11/dissecting-zeus-botnet.html' title='Dissecting Zeus Botnet...'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhLVmLWeeLuBIKonURc68epk5bZE-YrtVWhqyG9odXrDJ08CCVek8_idqMquNZlSmjmmxTNJtvQrox7klasy5Zzxg0j-ZNkwe60kLVsnkCTI8dEXlT7kfLz4W5AnlKtJEpG08CdoUyeDEs/s72-c?imgmax=800" height="72" width="72"/><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-1870292286962426988</id><published>2009-09-24T19:10:00.003+05:30</published><updated>2009-09-24T19:15:16.491+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Interesting C&amp;amp;C BotNets</title><summary type="text">Gone are the days when “Command &amp;amp; Control” Botnets were controlled using IRC channels or web servers. These days, attackers have moved to more sophisticated techniques or rather they are taking advantage of already available public infrastructure to control their army of Bots.  One such case is that of a Bot using Google Groups for sending out the control commands. Discovered by a researcher </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/1870292286962426988/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/09/interesting-c-botnets.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1870292286962426988'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1870292286962426988'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/09/interesting-c-botnets.html' title='Interesting C&amp;amp;C BotNets'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-1463944540605329398</id><published>2009-09-04T15:31:00.003+05:30</published><updated>2009-09-04T15:36:39.631+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>Strange piece of Malware..</title><summary type="text">Recently I came across two strange pieces of malware – Win32/Induc.A and Win32/Skytap.A.   Well, you can’t exactly call the first one a malware because it does not do the usual malicious stuff like disabling AV’s, downloading Trojans, stealing data etc.. But it’s very interesting in the way it spreads. Win32/Induc.A is the first of its kind malware that affects Delphi compilers. For those who </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/1463944540605329398/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/09/strange-piece-of-malware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1463944540605329398'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1463944540605329398'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/09/strange-piece-of-malware.html' title='Strange piece of Malware..'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8670083404134243105</id><published>2009-08-20T17:17:00.010+05:30</published><updated>2009-08-21T17:53:58.623+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Discovering ActiveX Vulnerabilities -- Part 3 [The Exploit]</title><summary type="text">So far we have seen how to use Dranzer for discovering vulnerabilities in ActiveX objects. In this third &amp;amp; final part of the series we will look at creating a real world exploit from the vulnerability we discovered while fuzzing last time. This, at times, is a very challenging task. Not all vulnerabilities are that easy to exploit. It requires quite some amount of patience and luck to get </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8670083404134243105/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities_20.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8670083404134243105'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8670083404134243105'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities_20.html' title='Discovering ActiveX Vulnerabilities -- Part 3 [The Exploit]'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhERAckZSlGy5MhS6vYDjmbhgdxXWeCeS4ZxhC-vJxXAGfIBvOV_lhTVGWkYxNcHMHwP0FgqoxMXuMac2bDoUtzA5IVJpVCNplCk3LoFah_s2RPgCZr2cX0EOn5i0Y0HTGPmA9Xcd6BjKw/s72-c/fuzz3-1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-2442922739163147670</id><published>2009-08-18T15:47:00.005+05:30</published><updated>2009-08-18T16:07:26.211+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Cyber Crime"/><title type='text'>Credit Cards for sale ??</title><summary type="text">Ever wondered what do malware authors gain by writing malicious code ?? Well, if this question was asked a decade ago, the answer would be slightly different than what it is today ! The so called &quot;underground&quot; scene was totally different from what it is today. Those days it would be for fun or showing of real hacker skills. Now-a-days it&#39;s just about earning quick bucks and big bucks !!Like </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/2442922739163147670/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/credit-cards-for-sale.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2442922739163147670'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2442922739163147670'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/credit-cards-for-sale.html' title='Credit Cards for sale ??'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibIbK2W5THFq4RUvCPezj_eJQsY0xTPNN-m86xKsiu7jVptpiX1-NTjE1b6VT0ErzDUoRl7e9jcyvCK-9yRyl8MLYFKVYRSEdjGmA0YW2Sl0Uh9trfQicang4wBd6o_3HRvV84O1Q1KLM/s72-c/CC_fraud1.GIF" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8813647828889752854</id><published>2009-08-12T16:36:00.019+05:30</published><updated>2009-09-14T19:18:08.496+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Discovering ActiveX Vulnerabilities -- Part 2 [Fuzzing]</title><summary type="text">So, continuing from where we left of last time, we will be looking at the Dranzer fuzzing tool in detail in this part. In case, you landed here directly and are wondering what this is all about, I suggest you have a look here first.Dranzer is a well documented tool and I also suggest you have look at their documentation before starting with this so that you will be familiar with it in general. </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8813647828889752854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities_12.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8813647828889752854'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8813647828889752854'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities_12.html' title='Discovering ActiveX Vulnerabilities -- Part 2 [Fuzzing]'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5SOQEZ9WewV-nnlczDLSje95URRGSF6XCPIKFFaIzenaxR_DsfOG3DepiaHeTj2koyv4PMt23d5z2hyphenhyphenMX2xvewvqdLTcdTy6iYIQI7H2txSg4fUTkX4HG8b_4kCLIJt3rpk3uohtIwEQ/s72-c/fuzz2-1.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-4901365302451901842</id><published>2009-08-11T17:39:00.008+05:30</published><updated>2009-08-12T18:34:03.053+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tutorials"/><title type='text'>Discovering ActiveX Vulnerabilities -- Part 1 [ Introduction ]</title><summary type="text">Recently, I discovered a vulnerability in a ActiveX control. Before starting with the discovery, I had absolutely no clue as to how to discover and exploit vulnerabilities in ActiveX. I learned the hard way, so finally I decided to make a small tutorial that could make life easier for guys like me :) ! In this 3 part series, I will be covering how to use ActiveX fuzzers to find vulnerabilities in</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/4901365302451901842/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4901365302451901842'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/4901365302451901842'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/08/discovering-activex-vulnerabilities.html' title='Discovering ActiveX Vulnerabilities -- Part 1 [ Introduction ]'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVn_DFvr33lXIeTRvjltY_IVWgszRiJWm8hQsPlaHXb92D95kah8uouNoYu7eNhRbIamkhOFiE7IoIMe_XZOqBKhN4CoyJSfHOgYVZRW2B4MunHhs0z__QTGr3gco-NGheyPwc2jt54IA/s72-c/fuzz1-2.JPG" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-3794873075811339888</id><published>2009-07-15T16:17:00.012+05:30</published><updated>2009-07-24T15:05:01.204+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>It&#39;s raining 0day&#39;s...</title><summary type="text">Whew.. ! Last 10 days have been quite busy for security folks like me. There have been 3 incidences of 0day&#39;s being discovered recently. It all started with the DirectX ActiveX vulnerability which I blogged previously. Then later, an Microsoft office web component ActiveX vulnerability was observed to be exploited in the wild. The list of domains hosting the Microsoft exploit is published &amp;amp; </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/3794873075811339888/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/its-raining-0days.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3794873075811339888'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/3794873075811339888'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/its-raining-0days.html' title='It&#39;s raining 0day&#39;s...'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-8113101494104391384</id><published>2009-07-07T12:16:00.005+05:30</published><updated>2009-07-07T15:40:13.490+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Microsoft IE 0day ...Not again !?</title><summary type="text">Sad, but true. Once again MS Internet Explorer users have to run around hiding from the MPEG2 ActiveX exploit that is lurking around exploiting this new vulnerability in &quot;msvidctl.dll&quot;. And there is still no patch available for this critical vulnerability. I think,  looking at the licensing costs, Micro$oft products should come with some sort of SLA when we  buy them, like maybe fixing critical </summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/8113101494104391384/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/microsoft-ie-0day-not-again.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8113101494104391384'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/8113101494104391384'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/microsoft-ie-0day-not-again.html' title='Microsoft IE 0day ...Not again !?'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-1517639317870464514</id><published>2009-07-01T15:16:00.006+05:30</published><updated>2009-07-01T17:57:01.496+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Web Attacks"/><title type='text'>Bad news for some.. good for others..</title><summary type="text">It’s said that bad news travels fast ! And no doubt it does, but generally it’s the bad guys who catch it first. Whether it is Michael Jackson&#39;s death or Swine flu pandemic or France Airline crash, malware authors don&#39;t spare anything that they can use as bait. Moment such news is out, the bad guys immediately register fake domain names and using SEO (Search Engine Optimization) attacks make sure</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/1517639317870464514/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/bad-news-for-some-good-for-others.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1517639317870464514'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/1517639317870464514'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/07/bad-news-for-some-good-for-others.html' title='Bad news for some.. good for others..'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoDV5PtwsSKzIOP2Xkf5K064sKEEKozd9HVyCpb30f0Te8urWDGLASc_SA9x5qvccVJzl84ZQ6J_OPoc5et2VWryghoK8jICaXbzknOmmNf79KXZQ5urM_NrdpsVcJRS_xs_U0pYPyEWk/s72-c/blog_jakson_pic03.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-1141001117732421828.post-2566073640323250333</id><published>2009-06-23T16:42:00.005+05:30</published><updated>2009-06-23T17:37:01.756+05:30</updated><category scheme="http://www.blogger.com/atom/ns#" term="Malware"/><title type='text'>A new breed of attacks</title><summary type="text">In the beginning of 2009, there was a sudden increase in new form of malware being distributed. The bad guys are now getting smarter by the day, giving rise to a new breed of attacks being carried out. All the attacks have one common thing though - they exploit victims paranoia for malware !ScarewareAlmost every month there is a new variant of these so called security or Antivirus programs. These</summary><link rel='replies' type='application/atom+xml' href='http://hypersecurity.blogspot.com/feeds/2566073640323250333/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://hypersecurity.blogspot.com/2009/06/new-breed-of-attacks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2566073640323250333'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/1141001117732421828/posts/default/2566073640323250333'/><link rel='alternate' type='text/html' href='http://hypersecurity.blogspot.com/2009/06/new-breed-of-attacks.html' title='A new breed of attacks'/><author><name>Da&#39;H4cker</name><uri>http://www.blogger.com/profile/13001174515870605619</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqP_Lyr9_TFTHahqK6prpbvDRTXgZgmDQP_FhszXWRqAAmhOZmhC4autBeL6fwzXJ_1Q5bD7jd7d2AZDcGkJkmEzxBr5Zp-hwQuTycUsW7erq7civCH_ytFUqPVynJDQdj3tg1rzkwmKY/s72-c/scare2.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>