Archive

0

Pastejacking vs clipboard hijacking

đź”—Clipboard hijacking It as been possible for a long time to use css to append malicious content to the clipboard. Users doesn't notine anything and may execute unwanted commands. This type of attack

0

Writeups - Crypto - MindBlown

đź”—Information đź”—Version Date By Version Comment 05/06/2016 noraj 1.0 Creation đź”—CTF Name : BackdoorCTF 2016 Website : https://backdoor.sdslabs.co Type : Online Format : Jeopardy CTF Time :

0

Writeups - Crypto - Oups it's all mixed

đź”—Information đź”—Version Date By Version Comment 03/05/2016 noraj 1.0 Creation đź”—Name Oups it's all mixed đź”—Category Cryptography đź”—Wording Decipher the following flag: eGqaelr557dK4BbK47dS17

0

Virtualbox : shared folder with guest

This how-to works independently of the host platform. On virtualbox : Open the Configuration window of the VM (guest) Select Shared folder on the left menu Click on the icon corresponding to Add a sh

0

c99.php : A backdoored backdoor

C99 is a PHP webshell. Attackers uploads it on web server in order to get information and above all execute commands with web user privileges (ex: www-data). This webshell is protected by a customizab

0

Tracking down Tor users with mouse movements

Jose Carlos Norte, security researcher, wrote a post detailing how Tor Browser users can be uniquely fingerprinted using the mouse wheel, mouse speed, a CPU benchmark, and “getClientRects”. POCs (proo