Kiosk Hacking: When there is nothing else left

Monday, April 7th, 2008

In the tiger team operations we have been involved with, I often end up hacking through the least interesting systems. If you ask AP, a password-cracking ninja and master of hacking through simplicity, the less interesting the system is, the higher the chances to be insecure. A successful exploitation of ...

FormFox

Sunday, April 6th, 2008

I've just recently caught wind of a Firefox plugin called FormFox.  Here's the description from the website: Do you know where your form information is going? This extension displays the form action (the site to which the information you've entered is being sent.) In any place where you can enter data, ...

MySQL SQL Injection Cheat Sheet

Sunday, April 6th, 2008

Some useful syntax reminders for SQL Injection into MySQL databases... This post is part of a series of SQL Injection Cheat Sheets.  In this series, I've endevoured to tabulate the data to make it easier to read and to use the same table for for each database backend.  This helps to ...

Adobe Pushes Photoshop to 64 bits–for Windows Only

Sunday, April 6th, 2008

Adobe's flagship product, Photoshop, will become a 64-bit application in the next major revision to the company's bundle of creative pro applications, Creative Suite 4. However, the 64-bit version will only be available to Windows users because of a change Apple made at its Worldwide Developers Conference (WWDC) in 2007. The ...

Analysis of a Win32.Delf Variant

Friday, April 4th, 2008

We have been noticing quite a few malware samples having references to or communicating with Google's SMTP servers. This post dissects one of these samples and in the process attempts to illustrate to the reader some reversing techniques and information gathering techniques, while explaining the behavior and impact of this ...