Category Archives: Vulnerabilities & Exploits

CISCO Dropped the ball as Default SSH Key Found in Many Cisco Security Appliances

Well, Cisco certainly dropped the ball on this one, several Cisco security appliances contain a default SSH Key that is authorized allowing an attacker to connect to an appliance and execute arbitrary commands. Cisco reports that the Web Security Virtual Appliances, Email Security Virtual Appliances, and Content Security Management Virtual Appliances are affected by the… Read More »

Share Button

Anatomy of Exploit Kits – Preliminary Analysis of Exploit Kits as Software Artefacts – By Vadim Kotov and Fabio Massacci

Anatomy of Exploit Kits Preliminary Analysis of Exploit Kits as Software Artefacts Vadim Kotov and Fabio Massacci DISI – University of Trento, Italy surname@disi.unitn.it Abstract. In this paper we report a preliminary analysis of the source code of over 30 different exploit kits which are the main tool behind driveby-download attacks. The analysis shows that… Read More »

Share Button

Simple ways to create PHP, Python, PERL, xterm, bash, exec, java and Netcat Reverse Shells

simple-ways-to-create-php-python-perl-xterm-bash-exec-java-netcat-reverse-shells

Share Button

New eBay Sellers Threatening FBI Fake Spear Phishing Attack not XSS

new-ebay-sellers-threatening-fbi-fake-spear-phishing-attack-not-xss

Share Button

Social Engineering – Beneficial For Cyber Security

With the increasing number of people making use of social media, there is every possibility of cyber criminals attacking your computer or account to access your personal information. As time passed by the importance of cyber security is felt by various businesses. You must have read and noticed that many of the cyber criminals make… Read More »

Share Button