HackDig : Dig high-quality web security articles for hacker

Hacker Interviews – The Riddler, the founder of the BinarySec Group

Today I present you the Riddler, aka Binary, the founder of the BinarySec group, a hacker collective focused in the fight against the ISIS propaganda online. Enjoy the Interview. You are a popular talented hacker that has already participated in several hacking campaigns, could you tell me more about. Could you tell me which his your technical background an
Publish At:2016-09-03 20:45 | Read:2832 | Comments:0 | Tags:Breaking News Hacking Hacktivism Binary BinarySec Cybersecur

Hammering at speed limits

Slate has a well-written article explaining an interesting new vulnerability called “Rowhammer.” The white paper is here, and the code repository is here. Here’s the abstract describing the basic idea: As DRAM has been scaling to increase in density, the cells are less isolated from each other. Recent studies have found that repeated accesses to DRAM rows
Publish At:2015-08-11 17:30 | Read:3142 | Comments:0 | Tags:Technical Insight Vulnerabilities Web Application Security A

Data Classification: As Easy As 01 10 11

Forrester analyst John Kindervag recently presented an interesting webcast, outlining the top recommendations to enhance data security. One of his main points that stuck with me involved the concept of simplifying data classification into binary’s most basic premise: the value of either one or zero.Using this method, Kindervag states two types of data exist
Publish At:2014-09-25 18:00 | Read:3226 | Comments:0 | Tags:Featured Articles binary data classification John Kindervag

Huawei Technologies du Mobile Broadband 16.0 Local Privilege Escalation

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (full) for the ‘Everyone’ and ‘Users’ group, for the ‘du Mobile Broadband
Publish At:2014-08-13 01:56 | Read:2854 | Comments:0 | Tags:Internal advisory binary broadband cacls du escalation every

Asseco SEE iBank FX Client

The application is vulnerable to an elevation of privileges vulnerability which can be used by a simple user that can change the executable file with a binary of choice. The vulnerability exist due to the improper permissions, with the ‘F’ flag (full) for the ‘Everyone’ and ‘Users’ group, for the ‘RichClient.exe̵
Publish At:2014-08-13 01:55 | Read:3385 | Comments:0 | Tags:Internal asseco binary client default escalation everyone fx

Announce

Share high-quality web security related articles with you:)

Tools

Tag Cloud