In this series of posts, I’m going to discuss executable analysis, the methods that are used and mechanisms to prevent them. There are three types of analysis that can be performed on executables: Static – Analysis of the sample file on disk. Emulated – Branch and stack analysis of the sample through an emulator. Live… Read More Preventing executable analysis – Part 1, Static Analysis
It would be silly of me to tell you what Anti-Counterfeiting Trade Agreement (ACTA) is about, because you can’t miss it right now. The internet is abuzz with protest about SOPA, PIPA and ACTA right now, with good reason. SOPA and PIPA were recently defeated after mass outcry from people all across the world, and… Read More ACTA – European SOPA tries to violate worldwide rights.
I’m sure there’s plenty of people who would beg to differ, but in my opinion MySQL Workbench is a huge festering pile of shit. Those of you who have been dealing with MySQL for more than a few years will remember that the administrative applications used to be separate. We had MySQL Query Browser and… Read More MySQL Workbench is a pile of shit
Ok, so maybe not everyone. But, for the mostpart, people are doing MySQL queries wrong in their PHP code. What’s even scarier is that 90% of PHP tutorials I read teach it wrong, too. Here’s why: mysql_ functions are to be deprecated in future and have been advised against by the PHP developers. Concatenating query… Read More MySQL in PHP – Everyone is doing it wrong
You’d think that people writing botnets would be well versed in systems security, but from a quick look around I see that most botnets have some serious problems. The biggest issue with any botnet is command and control. How can the owner communicate with their bot nodes without having people steal their botnet by sniffing… Read More Why are botnets so bad at authentication?
SQL injection vulnerabilities represent a majority percentage of security holes that end up resulting in a website being hacked. One of the most popular automated SQL injection tools in existence is Havij, which is especially popular because of its simplicity. Using it is pretty much a case of pointing it at a vulnerable URL and… Read More Blocking automated SQL injection
Major forums such as vBulletin and Invision Power Board have recently altered a lot of their codebase to require a security token to prevent their previous vulnerability to XSRF (Cross Site Request Forgery). Unfortunately, phpBB seems to be lagging behind a little and has not yet added this feature. To test, I set up phpBB… Read More XSRF in phpBB, and probably a lot of other CMS software.