Surviving the Week – 05/04/2012

Insight to online black markets and how they work

A short article that provides a brief look at how bitcoins and Tor make anonymous black markets tick.
http://features.techworld.com/security/3355031/online-black-markets-how-they-work/?olo=rss

Revelo – Javascript Deobfuscator

This tool works by converts the submitted Javascript with some user-based modifications to an HTML file.  It then opens the file and extracts deobfuscated elements using the Internet Explorer engine. This tool does rely on the user to make some choices based on some understanding of the obfuscated script. While this tool does have some protections built into it, it may execute malicious code that could harm your computer, so use it with caution possibly within a virtual machine. This is just a prototype which works on windows XP
http://www.kahusecurity.com/2012/revelo-javascript-deobfuscator/

Other similar tools include

A Firefox plugin, JavaScript Deobfuscator, https://addons.mozilla.org/en-us/firefox/addon/javascript-deobfuscator/

 

Hacker claims to hack European Space Agency, NASA, US Air Force and  Military, French Ministry of Defense

No official information is out yet but if this information to be believed to be true, big profile applications are vulnerable to one or another web application attack. We see this kind of posts quite often now.  Test your application today with NTOSpider to find all possible vulnerabilties
http://thehackernews.com/2012/05/hacker-claims-to-hack-european-space.html

Websense (Triton version 7.6) suffers from an authentication bypass vulnerability in the report management UI.

Websense is web traffic filtering software which can be used to protect networks from spyware, prevent users from viewing sexual or other inappropriate content, discourage employees from spending time browsing webpages instead of working, and similar purposes. WebSense report management UI application is vulnerable to authentication bypass. Test your application today with NTOSpider to find out all possible vulnerabilities
http://packetstormsecurity.org/files/112360/NGS00138-1.txt

About Dan Kuykendall 173 Articles
Connect with Dan on Google+

Be the first to comment

Leave a Reply

Your email address will not be published.


*