Government Security
Network Security Resources

Jump to content

Blogs



Featured
Photo

Finding Php Shell Scripts In Your Website

Posted by Stephen in GSO, in Web Security 17 July 2014 - - - - - - · 2,834 views
security, linux, cyber security and 7 more...

PHP vulnerabilities are the norm, there is not much that can be done to prevent uploads of malicious files on a PHP site when there are world writable directories especially when your website is using a well known opensource community driven software product to power your website. PHP shell code can usually be found in many websites around the web especia...

Featured
Photo

Project Phoenix

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 5,624 views

Project Phoenix is the resurrection of GovernmentSecurity.org, a lot has been going on here over the last year and a half. The hired help has completed transferring the important articles from Joomla into the new site and the rest was blown away. I am going to give a quick overview of the changes that have happened but each change will be covered in detai...

Featured
Photo

DEF CON 22 – Are You Ready?

  Posted by Stephen in Security Through Education, 30 June 2014 - - - - - - · 1,858 views

Are you ready for blistering 115-degree heat, the never-ending press of black t-shirts, and fast-talking social engineers? Then you, my friend, are ready for DEF CON 22!
Social-Engineer.Org have so much goodness to tell you about. First, let’s start with the Social Engineering Village . This will be our second year at running SE fun and activities non-st...

Featured
Photo

More Details about Security Advisory 2963983 IE 0day

  Posted by Stephen in Security Research & Defense, 26 April 2014 - - - - - - · 2,558 views

Today we released Security Advisory 2963983 regarding a potential vulnerability in Internet Explorer reported by FireEye and currently under investigation.
We are working closely with FireEye to investigate this report of a vulnerability which was found used in very limited targeted attack:
- the vulnerability is a “use-after-free” memory corruption...

Featured
Photo

Binary analysis: Concolic execution with Pin and z3

  Posted by Stephen in Shell-Storm, 28 August 2013 - - - - - - · 2,004 views

In a previous post, I talked about the concolic execution using Valgrind to the taint analysis and z3 to the constraint path solving. So why another blog post about this technique? Because recently my previous researchs was around Pin and because Pin is supported on Linux, Windows and Mac. I also wanted to see how it's possible to do it without IR - With...

Photo

The SEVillage At DEF CON 23

  Posted by Stephen in Security Through Education, 22 July 2015 - - - - - - · 54 views

<p>Are you ready to ru…….</p>
<p>DEF CON. What emotions does that elicit in you? For my team and me, it is a mixture of excitement and exhaustion. This year will prove to be no different; if anything, it will prove to be even more of both.</p>
<p>We just wanted to take a few moments to give you a brief o...

Photo

Advances in Scripting Security and Protection in Windows 10 and PowerShell V5

  Posted by Stephen in Security Research & Defense, 10 June 2015 - - - - - - · 236 views

<p>In the last several releases of Windows, we&rsquo;ve been working hard to make the platform much more powerful for administrators, developers, and power users alike. PowerShell is an incredibly useful and powerful language for managing Windows domains. Unfortunately, attackers can take advantage of these same properties when perfo...

Photo

Triton: A Concolic Execution Framework

  Posted by Stephen in Shell-Storm, 03 June 2015 - - - - - - · 228 views

Triton is a concolic execution framework based on Pin. It provides components like a taint engine, a dynamic symbolic execution engine, a snapshot engine, translation of x64 instruction to SMT2, a Z3 interface to solve constraints and Python bindings. Based on these components, Triton offers the possibility to build tools for vulnerabilities res...

Photo

Secure Website With Writable 777 Directories

Posted by Stephen in GSO, 17 July 2014 - - - - - - · 693 views
security, linux, server and 7 more...

Content management, forum and other website software often require directories that are writeable in order to function properly. Many companies jump to using suexec or suPHP instead of the 777 method, but there is a more secure method of hosting your website. Did you know that suexec and suPHP essentially gives the web server user full write ability to al...

Photo

Updated Community Rules

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 549 views

The community rules have been updated, be sure to read them before interacting with the community.

http://www.governmen...ommunity-rules/



Kind Regards,

http://www.governmen...es/gso-logo.png



  • 8 Total Blogs
  • 124 Total Entries
  • 0 Total Comments
  • Shell-Storm Latest Blog
  • Stephen Latest Blogger

user(s) are online (in the past 30 minutes)

members, guests, anonymous users