Government Security
Network Security Resources

Jump to content



Finding Php Shell Scripts In Your Website

Posted by Stephen in GSO, in Web Security 17 July 2014 - - - - - - · 3,591 views
security, linux, cyber security and 7 more...

PHP vulnerabilities are the norm, there is not much that can be done to prevent uploads of malicious files on a PHP site when there are world writable directories especially when your website is using a well known opensource community driven software product to power your website. PHP shell code can usually be found in many websites around the web especia...


Project Phoenix

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 6,484 views

Project Phoenix is the resurrection of, a lot has been going on here over the last year and a half. The hired help has completed transferring the important articles from Joomla into the new site and the rest was blown away. I am going to give a quick overview of the changes that have happened but each change will be covered in detai...


DEF CON 22 – Are You Ready?

  Posted by Stephen in Security Through Education, 30 June 2014 - - - - - - · 2,467 views

Are you ready for blistering 115-degree heat, the never-ending press of black t-shirts, and fast-talking social engineers? Then you, my friend, are ready for DEF CON 22!
Social-Engineer.Org have so much goodness to tell you about. First, let’s start with the Social Engineering Village . This will be our second year at running SE fun and activities non-st...


More Details about Security Advisory 2963983 IE 0day

  Posted by Stephen in Security Research & Defense, 26 April 2014 - - - - - - · 3,422 views

Today we released Security Advisory 2963983 regarding a potential vulnerability in Internet Explorer reported by FireEye and currently under investigation.
We are working closely with FireEye to investigate this report of a vulnerability which was found used in very limited targeted attack:
- the vulnerability is a “use-after-free” memory corruption...


Binary analysis: Concolic execution with Pin and z3

  Posted by Stephen in Shell-Storm, 28 August 2013 - - - - - - · 2,584 views

In a previous post, I talked about the concolic execution using Valgrind to the taint analysis and z3 to the constraint path solving. So why another blog post about this technique? Because recently my previous researchs was around Pin and because Pin is supported on Linux, Windows and Mac. I also wanted to see how it's possible to do it without IR - With...


DEF CON 23 SECTF Results Webinar

  Posted by Stephen in Security Through Education, 10 November 2015 - - - - - - · 44 views

<p><b>Date: Tuesday, December 1, 2015</b></p>
<p><b>Time: </b><span style="font-weight: 400;">10 am PT/ 1 pm ET</span></p>
<p><b>Duration:</b><span style="font-weight: 400;"> 1 hour</span><br /><b>Presenters:...


EMET: To be, or not to be, A Server-Based Protection Mechanism

  Posted by Stephen in Security Research & Defense, 20 October 2015 - - - - - - · 108 views

<p>Hi Folks &ndash; Platforms PFE Dan Cuomo here to discuss a common question seen in the field:</p>
<p><i>&ldquo;My customer is deploying EMET and would like to know if it is supported on Server Operating Systems.&rdquo;</i></p>
<p>On the surface there is a simple answer to thi...


Blog post - Code coverage using dynamic symbolic execution

  Posted by Stephen in Shell-Storm, 12 October 2015 - - - - - - · 125 views

Code coverage is mainly used in the vulnerability research area. The goal is to generate inputs which will reach different parts of the program's code. Then, if an input makes the program crash, we check if the crash can be exploited or not. A lot of methods exist to perform code coverage - like random testing or mutation generation - but in thi...


Secure Website With Writable 777 Directories

Posted by Stephen in GSO, 17 July 2014 - - - - - - · 850 views
security, linux, server and 7 more...

Content management, forum and other website software often require directories that are writeable in order to function properly. Many companies jump to using suexec or suPHP instead of the 777 method, but there is a more secure method of hosting your website. Did you know that suexec and suPHP essentially gives the web server user full write ability to al...


Updated Community Rules

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 690 views

The community rules have been updated, be sure to read them before interacting with the community.


Kind Regards,

  • 8 Total Blogs
  • 136 Total Entries
  • 0 Total Comments
  • Shell-Storm Latest Blog
  • Stephen Latest Blogger

user(s) are online (in the past 30 minutes)

members, guests, anonymous users