CVE-2014-0322: Microsoft Internet Explorer 0-day Vulnerability.
A use-after-free vulnerability is present in Microsoft Internet Explorer 10 ( CVE-2014-0322 ), which allows remote attackers to execute arbitrary…
Stay aware of the latest security updates and prevent your network from vulnerability exploits.
A use-after-free vulnerability is present in Microsoft Internet Explorer 10 ( CVE-2014-0322 ), which allows remote attackers to execute arbitrary…
A new zero-day vulnerability (CVE-2014-0502) in Adobe Flash Player is being exploited in the wild. A double free vulnerability exists…
IBM Platform Symphony Developer Edition is a free software to develop and test High-performance computing (HPC) and Grid Computing SDK,…
RealPlayer is vulnerable to multiple stack-based buffer overflow vulnerabilities (CVE-2013-7260). This flaw allows attackers to execute arbitrary code and take…
XXE attack is an attack on an application that parses XML input from untrusted sources using an incorrectly configured XML…
Exploit kits are automated malicious software programs which target client-side application vulnerabilities like Web Browsers, Add-ons, Adobe Flash Player, Adobe…
A bit of a background on buffer overflow to begin with. A buffer overflow occurs when a program tries to…
IDA Pro is primarily a multi-platform, multi-processor disassembler that translates machine executable code into assembly language source code for the…
Steganography is an art of hiding a message, image, or file within another message, image, or file.
Most images are used to hide the data. The flexibility of using images means that information can be hidden in a variety of ways. It can be scattered all over the image or inserted straight inside.
If data is inserted straight inside. we can find it easily using the below technique,
Hex Editor
like HexEdit, HxD on windows
using :%!xxd command on Linux
FF D8
FF D9
EOI (End Of Image) marker
Here is an example to insert data straight inside the image without any tool on windows:
copy /b original.jpg + "hidden data.txt" "hidden image.jpg"
A new image will be created with your data hidden. You can open and view that image normally.
But, to view the hidden content open that image in any Hex editor as mentioned above and see the hidden data at the end after the EOI marker.
Later, a quick obfuscation layer is added (Password or key) to hide the visibility of the data in the HEX format. To view the original message we need that key or password.
Here is an example to insert data inside the image using Outguess tool:
outguess is one of the tool that allows the insertion of hidden information into
the redundant bits of data sources.
Data Hiding :
outguess -k "secretkey" -d hidden.txt image.jpg out.jpg
(more…)Data Retrieval :
outguess -k "secretkey" -r out.jpg hidden.txt
SecPod Research Team member (Antu Sanadi) has found Multiple Persistence Cross-Site Scripting in Apache Struts Vulnerabilities. The vulnerability is caused…