Welcome to SecurityDocs

A collection of 7,860 IT security white papers, carefully curated by professionals like yourself

Using Software Defined Radio to Attack "Smart Home" Systems

by Florian Eichelberger

The Internet of Things (or IoT) is an emerging trend of which Smart Homes is a subset. IoT involves the integration of digital and wireless technologies in physical objects and systems, especially those historically unconnected. Home Automation systems or "Smart Homes" have been an emerging trend, with products only recently hitting the mass market and being affordable. Out of a fear of reduced usability, or breaking backwards compatibility, security is often neglected, or added as an after...

Nov. 20, 2017 0 comments 22 minute read Pen Testing & Audits

The Automotive Top 5: Applying the Critical Controls to the Modern Automobile

by Roderick Currie

The car of today is an inherently vulnerable platform. At its core is a computing architecture from the 1980s which was designed to be lightweight and efficient, with very little thought given to security. As the modern automobile becomes increasingly connected, its attack surface only continues to grow. In the wake of several recent high-profile car hacking demonstrations, automakers face the daunting task of trying to lock down this insecure platform with bolt-on security fixes. This paper ...

Nov. 17, 2017 0 comments 28 minute read Apps & Hardening

Certified Ethical Hacker - Part 5-1 - System Hacking

by Riazul H. Rozen

Security breaches are detrimental to the financial structure of organizations, from situations ranging from information theft to destroying the network structure. Security breaches are problematic no doubt, both most of the time they occur from human error, for instance, the errors from the company’s staff. Security breaches are mostly intricate, and require a careful and well-thought-out plan, for its immediate success.

Nov. 15, 2017 0 comments 4 minute read Certifications

The State of Honeypots: Understanding the Use of Honey Technologies Today

by Andrea Dominguez

The aim of this study is to fill in the gaps in data on the real-world use of honey technologies. The goal has also been to better understand information security professionals’ views and attitudes towards them. While there is a wealth of academic research in cutting-edge honey technologies, there is a dearth of data related to the practical use of these technologies outside of research laboratories. The data for this research was collected via a survey which was distributed to informati...

Nov. 20, 2017 0 comments www.sans.org

[POC] WordPress Duplicator Migration 1.2.28 Cross Site Scripting

POC Class Input Validation Error Remote Yes Credit Ricardo Sanchez Vulnerable Duplicator a WordPress Migration Plugin 1.2.28 Duplicator a WordPress Migration Plugin is prone to a stored cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based a...

Nov. 20, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Ring3 / Ring0 Rootkit Hook Detection 1/2

The cybercrime underworld hasn’t given me any exciting malware to reverse and I’m running out of ideas for new posts, so I’m going to do a 2 part article about the techniques used by rootkits to intercept function calls, and how to detect them. The first part will explain some hooking methods, the second part will explain how to detect them. As I haven’t done any kernel mode stuff on this blog, I will be looking at both user mode and kernel mode hooks on a x86 windows system.

Nov. 20, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Predictions for 2018: Cyberthreats in the financial sector

Lots of businesses engage the services of third-party organizations for apps, databases, cloud computing, and much more. Seeing the benefits of software as a service, cybercriminals have rolled out similar models: Ransomware Trojans can be franchised or leased, for example, and DDoS attacks are available for order. Anyone with the cash and the desire can hire an army of bots, set up phishing websites, and lots more. Almost everything underpinning the financial cybercrime industry can be bough...

Nov. 19, 2017 0 comments www.kaspersky.com Management

SSH Penetration Testing (Port 22)

Probing through every open port is practically the first step hackers take in order to prepare their attack. And in order to work one is required keep their port open but at the same time they are threatened by the fear of hackers. Therefore, one must learn to secure their ports even if they are …

Nov. 19, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Cyber Threat Intelligence Support to Incident Handling

by Brian P. Kime

Recent research has shown increased awareness of Cyber Threat Intelligence (CTI) capabilities. However, CTI teams continue to be underutilized and have had difficulty demonstrating the value they can add to digital forensics incident response (DFIR) teams. Meta-analysis of multiple surveys will identify where the gaps in knowledge exist. The paper will suggest how CTI can support DFIR at each level of intelligence and operations – tactical, operational, and strategic – and during each ph...

Nov. 19, 2017 0 comments www.sans.org Detection & Response

WordPress Penetration Testing using WPScan & Metasploit

Attacker: Kali Linux Target: WordPress WPScan is a black box vulnerability scanner for WordPress written in PHP mainly focus on different types of vulnerability in WordPress, WordPress themes, and plugins. Well, WPScan tool is already installed by default in Kali Linux, SamuraiWTF, Pentoo, BlackArch, and BackBox Linux. WPScan uses the database of all the available plugins

Nov. 19, 2017 0 comments www.pentestingexperts.com Pen Testing & Audits

Did Microsoft Just Manually Patch Their Equation Editor Executable? Why Yes, Yes They Did. (CVE-2017-11882)

by Mitja Kolsek

Really, quite literally, some pretty skilled Microsoft employee or contractor reverse engineered our friend EQNEDT32.EXE, located the flawed code, and corrected it by manually overwriting existing instructions with better ones (making sure to only use the space previously occupied by original instructions). How do we know that? Well, have you ever met a C/C++ compiler that would put all functions in a 500+ KB executable on exactly the same address in the module after rebuilding a modified ...

Nov. 18, 2017 0 comments 0patch.blogspot.mx Detection & Response

Stuxnet-style code signing is more widespread than anyone thought

by Dan Goodin

Researchers have presented proof that digitally signed malware is much more common than previously believed. What's more, it predated Stuxnet, with the first known instance occurring in 2003. The researchers said they found 189 malware samples bearing valid digital signatures that were created using compromised certificates issued by recognized certificate authorities and used to sign legitimate software. In total, 109 of those abused certificates remain valid. The researchers, who presented ...

Nov. 18, 2017 0 comments arstechnica.com Detection & Response

Protect DNS from Data Exfiltration

by Hervé Dhélin

A recent DNS threat report from EfficientIP revealed that 25% of organizations in the US experienced data exfiltration via DNS, and of those, 25% had customer information or intellectual property stolen. The average time to discover a breach was more than 140 days. Considering that hackers can silently drain about 18,000 credit card numbers per minute via DNS, that's a customer database many times over. In addition, businesses aren't installing the required patches on their DNS servers, eithe...

Nov. 18, 2017 0 comments www.darkreading.com

Tackling the Unique Digital Forensic Challenges for Law Enforcement in the Jurisdiction of the Ninth U.S. Circuit Court

by John Garris

The field of digital forensics continues to evolve at a rapid pace, adapting to explosive demands, including the increasing need for qualified digital forensics practitioners. These individuals must continuously adjust to regularly changing technologies while navigating complex and often varying legal requirements that sometimes impose significant limitations on the approaches and techniques they may legally apply

Nov. 18, 2017 0 comments www.sans.org Detection & Response

Cloud WAF Versus On-Premises WAF

by Jon Burton

When searching for a WAF for your business, you will find dozens of products to select from. As you evaluate your options, one of the key decisions you will need to make is whether to select a cloud or on-premises solution. However, don’t consider this an “either-or” decision. It’s not necessarily a matter of choosing only one—cloud or on-prem. In many cases, it makes sense to utilize both in a hybrid deployment. In this post we’ll share the benefits of a hybrid WAF deployment and review t...

Nov. 16, 2017 0 comments www.imperva.com

Analysis of Malicious Documents- Part 5

In the last article, we reviewed how to analyze malicious PDF documents. In this last part of the article series, we will continue analyzing PDF documents with other tools. In this article, review the Origami framework which can be used to inspect and extract various objects from PDF documents. As a refresher let’s reiterate essential …

Nov. 16, 2017 0 comments www.pentestingexperts.com

How to Install Microsoft Exchange Server 2016 on Windows Server 2016 with PowerShell

by Karim Buzdar

Here is how to install Microsoft Exchange Server 2016 on Windows Server 2016 with the help of PowerShell. Exchange Server 2016 Cumulative Update 7 was released two months ago and you can download it here. Before you begin, review your system requirements:

Nov. 16, 2017 0 comments www.itprotoday.com Apps & Hardening

Router attacks detection through log analysis and defense mechanism

by Saili R. Waichal, Gopal J. Sonune, B.B.Meshram

Router is one of the most important devices in networking. Its function is to route packets between different networks. Thus all the interfaces of the router belong to different networks. Any campus-wide network architecture may contain many routers or multilayer switches for inter-department communication. It plays a very important role in communication in the campus. So security of router is inevitable. A network administrator has to monitor router for its security. Routers have an ...

Nov. 15, 2017 0 comments www.ijcnwc.org

Banking Trojan IcedID Discovered by IBM X-Force Research

by Limor Kessem

IBM X-Force research follows developments in the financial cybercrime arena to map the events and trends that shape the threat landscape for organizations and consumers alike. After a year that has been very active in terms of banking malware, point-of-sale (POS) malware and rampant ransomware attacks, the X-Force team identified a new banking Trojan active in the wild dubbed IcedID.

Nov. 15, 2017 0 comments securityintelligence.com Detection & Response

Alina, the Latest POS Malware

The danger of having the data of thousands of credit cards recorded makes Point of Sale (POS) terminals a critical system, as well as an increasingly sought-after target of cybercrime. Attacking these devices anonymously online is relatively straightforward, and selling the data on the black market is profitable. We’ve recently detected infections at a significant number of bars and restaurants in the United States whose POS terminals were attacked by two variants of credit card theft malw...

Nov. 14, 2017 0 comments www.pandasecurity.com Detection & Response


We'll send you a carefully curated list of the best IT security white papers to your mailbox every Friday.