Government Security
Network Security Resources

Jump to content

Blogs



Featured
Photo

Finding Php Shell Scripts In Your Website

Posted by Stephen in GSO, in Web Security 17 July 2014 - - - - - - · 1,884 views
security, linux, cyber security and 7 more...

PHP vulnerabilities are the norm, there is not much that can be done to prevent uploads of malicious files on a PHP site when there are world writable directories especially when your website is using a well known opensource community driven software product to power your website. PHP shell code can usually be found in many websites around the web especia...

Featured
Photo

Project Phoenix

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 4,501 views

Project Phoenix is the resurrection of GovernmentSecurity.org, a lot has been going on here over the last year and a half. The hired help has completed transferring the important articles from Joomla into the new site and the rest was blown away. I am going to give a quick overview of the changes that have happened but each change will be covered in detai...

Featured
Photo

DEF CON 22 – Are You Ready?

  Posted by Stephen in Security Through Education, 30 June 2014 - - - - - - · 1,048 views

Are you ready for blistering 115-degree heat, the never-ending press of black t-shirts, and fast-talking social engineers? Then you, my friend, are ready for DEF CON 22!
Social-Engineer.Org have so much goodness to tell you about. First, let’s start with the Social Engineering Village . This will be our second year at running SE fun and activities non-st...

Featured
Photo

More Details about Security Advisory 2963983 IE 0day

  Posted by Stephen in Security Research & Defense, 26 April 2014 - - - - - - · 1,529 views

Today we released Security Advisory 2963983 regarding a potential vulnerability in Internet Explorer reported by FireEye and currently under investigation.
We are working closely with FireEye to investigate this report of a vulnerability which was found used in very limited targeted attack:
- the vulnerability is a “use-after-free” memory corruption...

Featured
Photo

Binary analysis: Concolic execution with Pin and z3

  Posted by Stephen in Shell-Storm, 28 August 2013 - - - - - - · 1,207 views

In a previous post, I talked about the concolic execution using Valgrind to the taint analysis and z3 to the constraint path solving. So why another blog post about this technique? Because recently my previous researchs was around Pin and because Pin is supported on Linux, Windows and Mac. I also wanted to see how it's possible to do it without IR - With...

Photo

Friends Don’t Send Friends Malware on Facebook

  Posted by Stephen in Security Through Education, 23 March 2015 - - - - - - · 33 views

<p>Yes, the kittens are cute and who wouldn’t want to see another photo of the latest celebrity embarrassing themselves? But can we all just agree that as cool as the latest trending video is on Facebook, it’s probably not worth getting infected over? We’re sure you’ve heard about the malware infecting <a href="http://threatpost.com/...

Photo

EMET 5.2 is available

  Posted by Stephen in Security Research & Defense, 12 March 2015 - - - - - - · 51 views

<p>Today, we&rsquo;re releasing the Enhanced Mitigation Experience Toolkit (EMET) 5.2, which includes increased security protections to improve your security posture. You can download EMET 5.2 from <a href="http://www.microsoft.com/emet ">microsoft.com/emet</a> or directly from <a href="http://download.microsoft.c...

Photo

Slides of my talk at @SecuDayLille1 about Dynamic Symbolic Execution

  Posted by Stephen in Shell-Storm, 17 January 2015 - - - - - - · 176 views

This talk is about binary analysis and instrumentation. We will see how it's possible to target a specific function, snapshot the context memory/registers before the function, translate the instrumentation into an intermediate representation,apply a taint analysis based on this IR, build/keep formulas for a Dynamic Symbolic Execution (DSE), gene...

Photo

Secure Website With Writable 777 Directories

Posted by Stephen in GSO, 17 July 2014 - - - - - - · 380 views
security, linux, server and 7 more...

Content management, forum and other website software often require directories that are writeable in order to function properly. Many companies jump to using suexec or suPHP instead of the 777 method, but there is a more secure method of hosting your website. Did you know that suexec and suPHP essentially gives the web server user full write ability to al...

Photo

Updated Community Rules

Posted by Stephen in GSO News & Announcements, 17 July 2014 - - - - - - · 240 views

The community rules have been updated, be sure to read them before interacting with the community.

http://www.governmen...ommunity-rules/



Kind Regards,

http://www.governmen...es/gso-logo.png



  • 8 Total Blogs
  • 107 Total Entries
  • 0 Total Comments
  • Shell-Storm Latest Blog
  • Stephen Latest Blogger

user(s) are online (in the past 30 minutes)

members, guests, anonymous users