Android Threats in 2012

Android Threats in 2012 by Eugene Kaspersky
Android Threats in 2012

  • 98.96% of all mobile threats
  • More than 3000 new malicious programs every month

Dave Rel1k Kennedy on CNN!

Dave Rel1k Kennedy is invited in CNN to talk about Chinese hacking attempts against USA under cover of Chinese military.

Now how come one side is always mean and dirty while the other side stays all the time clean and neat eludes me! I thought in a war all sides are equally horrid. Maybe it’s just me.

Comments are yours.

H3ll0 w0rld!

Greetings Earthlings!

I am tired of waiting the import from Posterous to finish. I have contacted support numerous times with no answer. I guess I have to upgrade to Pro to get one. In any case I have decided to start posting new interesting stuff again.

If you have no idea what this blog is for check the About page.


4li3n’s after midnight useless news and links – 2011.08.12 (*DC/BH/BSidesLV extra* edition)

* DefCon 19 / Black Hat USA 2011 / BSidesLV 2011 extra *
[SLIDES] Covert Post-Exploitation Forensics With Metasploit (BH) ->
[SLIDES] Network Nightmare – PXE talk at Defcon (DC) ->
[VIDEO] Various Interviews form Blackhat USA 2011 (BH) ->
[SLIDES] iOS 4 Security Evaluation (BH) ->
[POST] BSIDESLV – DEFCON 2011 Summary (BSidesLV/DC) ->
[NEWS] 4G and CDMA networks reportedly hacked at DEFCON (DC) -> ,
[POST] BH 2011: Bit-squatting – DNS hijacking without exploitation (BH) ->
[AUDIO] Black Hat 2011: GrayWolf Attacks .NET Apps (BH) ->
[POST] A look into Black Hat’s wireless network (BH) ->
[POST] Auto-BAHN: Using Smart phones to create emergency, ad hoc networks (DC) ->
[VIDEO] Black Hat USA 2011: Interview with Dan Kaminsky (BH) ->
[SLIDES] Attacking Client Side JIT Compilers (BH) ->
[POST] Observations From Black Hat (BH) ->
[VIDEO] Black Hat 2011 USA: Phillipe Courtot (BH) ->
[SLIDES] Advanced Data Exfiltration (BSidesLV) ->
[POST] Black Hat 2011: The Rise Of The Machines (BH) ->
[FUN] How can I open .exe file on Linux? ->
[POST] Test Your Security Equipment’s Ability to Block JavaScript Obfuscations ->
[VULN] Vulnerabilities in DNS Server Could Allow Remote Code Execution -> ,
[INFO] Cheat Sheets and others ->
[TOOL] Dropbox Reader: command-line tools for parsing dropbox configuration and cache files ->
[POST] Windows Hooks of Death: Kernel Attacks through User-Mode Callbacks ->
[NEWS] Researchers Hack Mobile Data Communications -> ,
[POST] Performing DoS Attacks With JavaScript Malware ->
[HOW-TO] Remove yourself from ALL background check websites ->
[BLOG] Pop Pop Ret: Windows Kernel Exploitation ->
[UPDATE] Hashkill 0.2.4 ->
[SCRIPT] http-waf-detect: WAF/IDS/IPS detection ->
[VIDEO] v1.2b (1.20b) {Level 1 – Disk 3 – Version B} ->
[WIKI] Live streams from CCC ->
[NEWS] More BlackBerry image problems: RIM warns of BES security vulnerabilities ->
[POST] You expect me to remember that? (Part 1) ->
[POST] See strings in Binaries using Notepad++ ->

4li3n’s after midnight useless news and links – 2011.08.09 (*DC/BH/BSidesLV special* edition)

[+] DefCon 19 / Black Hat USA 2011 / BSidesLV 2011 special
[CODE] Moshi Moshi: VoIP Bot written in Python (DC/BSides) ->
[SLIDES] “Sounds like Botnet” talk (DC/BSides) ->
[PRESENTATION] Checkmate with Denial of Service (BH) ->
[NEWS] 10 year old girl hacker CyFi reveal her first zero-day in Game (DC) ->
[NEWS] DefCon Kids (DC) -> ,
[NEWS] Photos show the cultural difference between Black Hat and Defcon hacker events (BH/DC) (thanx citr0) ->
[NEWS] Vegas gone wild (BSides/DC) ->
[PRESENTATION] All DefCon 19 presentations (DC) ->
[VIDEO] Kinectasploit!!! (DC) ->
[SLIDES] WTF Happened to the Constitution? The Right to Privacy in the Digital Age (DC) ->
[NEWS] Oracle, other companies “punkd” in hacking contest (DC) ->
[POST] Post-Exploitation Techniques (BH) ->
[NEWS] Database Forensics Still In Dark Ages (BH) ->
[NEWS] DEF CON: The event that scares hackers (DC) ->
[SLIDES] Cipherspaces/Darknets: An Overview Of Attack Strategies (DC) ->
[NEWS] Android Network Toolkit for Penetration Testing and Hacking (DC) (thanx to my S.O.) ->
[POST] Extracting Non-Standard SquashFS Images ->
[CODE] PHP stateless cookies (thanx m3g9tr0n) ->
[POST] Evocam Remote Buffer Overflow on OSX ->
[POST] How to find 0-day in browsers ->
[EXPLOIT] HP JetDirect PJL Query Execution & Universal Path Traversal -> ,
[POST] Controlling a Cisco IOS device from an IRC channel ->
[INFO] 80 of the Best Linux Security Applications ->
[INFO] INFOSEC Without Borders ->
[CODE] VNC client using HTML5 (Web Sockets, Canvas) with encryption (wss://) support (thanx m3g9tr0n) ->
[POST] Laundruino Alerts You Over LAN When Your Laundry’s Done! ->
[ONLINE] PDFXRay: Online suspicious PDF scanner ->
[POST] Security in HTML 5 and HTTP ->
[INFO] Lion Recovery Disk Assistant ->
[POST] Four browser nets and one phish ->
[POST] Using Nessus and Metasploit Together ->
[POST] Facebook password reset coming to phone near you ->
[POST] John The Ripper Hash Formats ->
[POST] XyliBox: Mass upload on VirusTotal without API ->
[TOOL] httpry 0.1.6: packet sniffer for displaying and logging HTTP traffic ->
[INFO] CSS Hacks ->
[NEWS] TeaMp0isoN : NASA forum is Vulnerable SQL injection, Admin Hacked! ->
[NEWS] BlackBerry blog site hacked by TriCk – TeaMp0isoN against London riots ->

4li3n’s after midnight useless news and links – 2011.08.06 (*Extraterrestrial* edition)

A big thanx to Yiannis Cybertronic for suggesting this edition’s name!

[NEWS] Pwnie Awards 2011 -> ,
[POST] Integrating Nessus with BackTrack 5’s Tools ->
[BULLETIN] Infected Cisco Information Packet and Warranty CDs ->
[POST] Zbot illustrated ->
[POST] Arduino Hacking for the Big Boys (Part 1) ->
[NEWS] U.S. Federal Agencies Look to Hire Hackers at Defcon ->
[INFO] Local Session Hijacking (thanx m3g9tr0n #1) ->
[PAPER] Cross-Site Scripting Papers (kinda old) ->
[POST] The Art of ARP Spoofing/Flooding/Poisoning (thanx m3g9tr0n #2) ->
[PAPER] Don’t Drop the SOAP: Real World Web Service Testing (Black Hat USA 2011) ->
[PAPER] Userland Hooking in Windows ->
[PRESENTATION] Kaminsky: Black Ops of TCP/IP (Black Hat USA 2011) ->
[POST] Web framework HTML escaping to mitigate XSS ->
[POST] HTTP Pipelining Today (thanx m3g9tr0n #3) ->
[HOW-TO] How to Make a Wi-Fi Booster Using Only a Beer Can ->
[POST] Lion DiskMaker Creates Mac OS X Lion Install DVDs and Thumb Drives Automatically ->
[EXPLOIT] Firefox 3.6.16 OBJECT mChannel Remote Code Execution (DEP bypass) ->
[EXPLOIT] CiscoKits 1.0 TFTP Server DoS and Directory Traversal (thanx m3g9tr0n #4) -> .
[FUN] Don’t miss that! ->
[NEWS] Researcher releases tool for replacing certificate authorities (Black Hat USA 2011) ->

4li3n’s after midnight useless news and links – 2011.08.03 (*choices-4-life* edition)

A big thanx to my S.O. for suggesting this edition’s name!
[INFO] Programming Languages Infographic ->
[POST] Ten SQL Injection Scanners ->
[POST] Protecting your OSX with IPFW and LittleSnitch ->
[NEWS] Gawker hacked again ->
[VIDEO] XSS Attack – Busting Browsers to Root! ->
[TOOL] HexorBase v.1.0 – The Database Hacker Tool ->
[SHELL] Mini PHP Shell 27.9-2 ->
[SCRIPT] jabberbot: framework to create Jabber/XMPP bots and services ->
[UPDATE] Watcher v.1.5.3 Released ->
[METASPLOIT] Metasploit 4.0 is here! Download -> and update ->
[POST] Obtaining Information about the Operating System ->
[CHEAT SHEET] Informix SQL Injection Cheat Sheet ->
[HOW-TO] 50 UNIX / Linux Sysadmin Tutorials (thanx m3g9tr0n) ->
[POST] Commercial Web Application Scanner Benchmark ->
[POST] Zero Day Vulnerability in many WordPress Themes ->
[UPDATE] Google Chrome 13.0.782.107 Released ->
[EXPLOIT] Red Hat system-config-firewall Local Privilege Escalation Vulnerability ->
[TOOL] Hexinject: A Hexadecimal Packet Injector/Sniffer ->
[SCRIPT] XSSHelper ported in Java ->
[DISCLOSURE] Useless OpenSSH resources exhausion bug via GSSAPI ->