skip to main | skip to sidebar
_Where facts are few, experts are many
  • Home
  • Menu
    • About Me
    • Advisories
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
    • E-business Card
  • TZO Daily Security News
  • Contact
    • Mail
  • Subscribe to Feed
nslookup 0day analysis (demo)
| 0 comments ]

http://www.nullcode.com.ar/ncs/crash/nsloo.htm



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my personal Blog where I write and rant about Information Security and in general anything I regard as newsworthy.


Quick-links
▪ Tools / Talks / Whitepapers
▪ My vulnerability disclosure policy
▪ Subsribe to RSS Feed


The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.
View my complete profile

Follow @thierryzoller
View Thierry Zoller's profile on LinkedIn

Total Pageviews

Sparkline

Featured Post

Attacker Classes and Pyramid (Version 3)

This is a living blog post I will update whenever I have time and new ideas. TOC Introduction Updates Attacker Classes Attacker Pyr...

Follow by Email

Subscribe to RSS

Subscribe to Musings on Information Security

Cluster Map

Popular Posts

  • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
    Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
  • The BEAST summary - TLS, CBC, Countermeasures (Update 4)
    Lots of good information floating on the internet on the Proof of Concept (dubbed 'BEAST) against TLS 1.0 by Juliano Rizzo and Thai Du...
  • Storing password securely - hashses, salts and bit stretching put into context
    Introduction Due to the latest row of high profile websites being compromised and parts of the password hashes being published h...
  • SSL Audit v.08 released
    I have updated my little TLS/SSL Scanner called "SSL Audit" to version 0.8. I tweaked it slightly but the tool is still based o...
  • What you need to know about the vulnerabilities in MSCHAPv2
    A post within the "straight to the meat" category : There was a talk at Defcon 20 entitled " Defeating PPTP VPNs and WPA2 ...

Blogs I read

  • Schneier on Security
    Details on the Mirai Botnet Authors - Brian Krebs has a long article on the Mirai botnet authors, who pled guilty....
    14 hours ago
  • Troy Hunt
    Fixing Data Breaches Part 3: The Ease of Disclosure - This week, I've been writing up my 5-part guide on "Fixing Data Breaches". On Monday I talked about the value of education; let's try and stop the breach...
    14 hours ago
  • A Few Thoughts on Cryptographic Engineering
    The strange story of “Extended Random” - Yesterday, David Benjamin posted a pretty esoteric note on the IETF’s TLS mailing list. At a superficial level, the post describes some seizure-inducingly ...
    1 day ago
  • Krebs on Security
    Buyers Beware of Tampered Gift Cards - Prepaid gift cards make popular presents and no-brainer stocking stuffers, but before you purchase one be on the lookout for signs that someone may have ta...
    1 day ago
  • Didier Stevens
    New Tool: format-bytes.py - I regularly copy bytes from my command-line tool over to 010 Editor to have this data represented by the Inspector using different formats, like this: form...
    2 days ago
  • Securosis Highlights
    Firestarter: Breacheriffic EquiFail - Posted under: Firestarter This week Mike and Rich talk address the recent spate of operational fails leading to massive security breaches. This isn’t yet ...
    5 days ago
  • Adam Shostack & friends
    Gavle Goat Gallantly Guarded - ‘Secret’ plan to protect Gävle Christmas goat from arsonists. Previously: Gavle Goat, now 56% more secure!, 13 Meter Straw Goat Met His Match, Gavle Goat G...
    1 week ago
  • root labs rdist
    In Which You Get a Chance to Save Democracy - Let’s start with the end: you can do something to change the broken political landscape in the United States, but you have to act quickly. Here’s a link to...
    1 week ago
  • TaoSecurity
    On "Advanced" Network Security Monitoring - My TaoSecurity News page says I taught 41 classes lasting a day or more, from 2002 to 2014. All of these involved some aspect of network security monitori...
    2 weeks ago
  • Carnal0wnage & Attack Research Blog
    Books I'd give to my 30yr old self - A good friend/co-worker recently turned 30. In preparation for his birthday party I gave some thought to my 30th birthday and the things I now know or hav...
    4 weeks ago
  • GreyHatHacker.NET
    IKARUS anti.virus and its 9 exploitable kernel vulnerabilities - Here is a list of the 9 kernel vulnerabilities I discovered over a month ago in an antivirus product called IKARUS anti.virus which has finally been fixed....
    5 weeks ago
  • Lenny Zeltser on Information Security
    Hybrid Analysis Grows Up – Acquired by CrowdStrike - CrowdStrike just acquired Payload Security, the company behind the automated malware analysis sandbox technology Hybrid Analysis. Jan Miller founded Payloa...
    5 weeks ago
  • newsoft's fun blog
    Ma contribution au mois de la cybersécurité - Dans le cadre du mois de la sécurité, l'ANSSI met en avant son MOOC : la SecNumAcadémie. Il m'a semblé opportun de vous résumer les 2h48 que j'ai passées s...
    1 month ago
  • contagio
    DDE Command Execution malware samples - Here are a few samples related to the recent DDE Command execution Reading: 10/18/2017 InQuest/yara-rules 10/18/2017 https://twitter.com/i/moment...
    2 months ago
  • Privacy Law Blog
    Colorado and Vermont Adopt Cybersecurity Rules Covering Broker-Dealers and Investment Advisers - Tiffany Quach State financial regulators in Colorado and Vermont recently adopted cybersecurity rules that apply to broker-dealers and investment adviser...
    2 months ago
  • Security
    Excited to join Dropbox! - I’m excited to announce that I’ve joined Dropbox as their new Head of Security. Truth be told, I’ve been here a little while and I’ve been enjoying on-boar...
    3 months ago
  • CrySyS Blog
    Az aggregált adat és a GDPR -
    4 months ago
  • Arne Swinnen's Security Blog - Just Another Infosec Blog
    Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
    5 months ago
  • VRT
    Player 3 Has Entered the Game: Say Hello to 'WannaCry' - *This post was authored by Martin Lee, Warren Mercer, Paul Rascagneres, and Craig Williams.* Executive SummaryA major ransomware attack has affected many o...
    7 months ago
  • Chatter on the Wire: How excessive network traffic gives away too much!
    Fingerbank Collector - Ok, it has been eon's since my last post and this has more to do with other projects taking up my time in electronics than in fingerprinting, but I still l...
    7 months ago
  • Uncommon Sense Security
    Doing it wrong, or “us and them” - I was arguing with the wiring in a little RV over the weekend and it was the typical RV mix of automotive wiring, household wiring, and What The Expleti...
    8 months ago
  • Claude Adam
    En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
    8 months ago
  • LuxLegal
    La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
    1 year ago
  • /dev/ttyS0
    Defcon 24: Blinded By The Light - I won’t be at Defcon this year in body, but I’ll be there in spirit! I got to design the hardware used in @tb69rr’s and @bjt2n3904‘s Defcon talk, Blinded B...
    1 year ago
  • Secure Belief
    VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
    1 year ago
  • Fun Over IP
    McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
    1 year ago
  • Cup of Security
    Tips That Will Help You Become An Intelligent Investor - Have you considered any investing strategies? If you don't, know you are not the only one. Lots of people have limited knowledge regarding investments. Her...
    2 years ago
  • Scrammed!
    A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
    2 years ago
  • mossmann's blog
    Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
    3 years ago
  • Java security and related topics
    USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
    3 years ago
  • The iSecLab Blog [by Faculty and Students];
    New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
    3 years ago
  • Amrit Williams Blog
    RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
    3 years ago
  • ax330d's blog
    Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
    3 years ago
  • Cognitive Dissidents
    Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
    3 years ago
  • Ma petite parcelle d'Internet...
    Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
    4 years ago
  • Androguard
    One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
    4 years ago
  • Digital Forensics is a Science
    Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
    5 years ago
  • Nynaeve
    NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
    7 years ago
  • IBM Internet Security Systems Frequency X Blog
    -
  • CryptoLUX - Recent changes [en]
    -
  • rmhrisk.wpengine.com/
    -
  • Metasploit
    -
  • woanware
    -
  • ...And You Will Know me by the Trail of Bits
    -
Show 10 Show All

Blog Archive

  • ►  2017 (1)
    • ►  October (1)
  • ►  2013 (4)
    • ►  July (1)
    • ►  June (1)
    • ►  March (2)
  • ►  2012 (11)
    • ►  November (1)
    • ►  August (2)
    • ►  July (1)
    • ►  June (4)
    • ►  May (2)
    • ►  March (1)
  • ►  2011 (10)
    • ►  December (3)
    • ►  November (1)
    • ►  October (2)
    • ►  September (2)
    • ►  August (2)
  • ►  2010 (6)
    • ►  August (1)
    • ►  July (1)
    • ►  March (2)
    • ►  February (2)
  • ►  2009 (80)
    • ►  November (2)
    • ►  October (1)
    • ►  September (3)
    • ►  July (3)
    • ►  June (2)
    • ►  May (22)
    • ►  April (16)
    • ►  March (17)
    • ►  February (7)
    • ►  January (7)
  • ▼  2008 (31)
    • ►  December (2)
    • ►  November (7)
    • ►  October (7)
    • ►  September (3)
    • ▼  August (12)
      • reDuh - JSP/PHP/ASP Pivoting code
      • Whentrust open sourced !
      • Pangolin - Automated SQL Injection
      • Themida Loader (PEB Hook)
      • Howto Analyse a session ID
      • nslookup 0day analysis (demo)
      • DNS flaw still exploitable - Theory vs Practise
      • "Surfjacking" - interesting Problem
      • Whitepaper Dowd&Sotirov Talk (BH 2008)
      • Jeff Moss on Vulnerability Market
      • Lessons learned ? (DNS + Evilgrade)
      • Blackhat USRP Talk - Slides and Code
  • ►  2007 (7)
    • ►  October (1)
    • ►  May (1)
    • ►  April (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2006 (6)
    • ►  December (1)
    • ►  August (2)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2005 (9)
    • ►  October (1)
    • ►  April (7)
    • ►  January (1)
  • ►  2000 (1)
    • ►  March (1)

Contact Form

Name

Email *

Message *

Links

  • Schneier on Security
  • Brian Krebs on Security
  • Lenny Zeltser
  • Malware LU
  • CryptoLux
  • Unmitigated Risk
  • TaoSecurity - Bejtlich
  • root labs rdist
  • Securosis Blog
  • Trail of Bits
  • Sid's Blog [FR]
  • Fun over IP
  • Hack.lu
  • Joe Sandbox
  • SVEN

Labels

  • 0day (7)
  • Advisory (53)
  • Bluetooth (3)
  • BTcrack (5)
  • Hardware hacking (1)
  • How-to (7)
  • Interesting Reads (6)
  • Lectures (2)
  • Misc (10)
  • Omron 3S4YR-MVFW Card reader (3)
  • Rants from Thierry (20)
  • Tool (18)
  • Vulnerabilties (11)
  • Whitepaper (3)
 
Copyright Musings on Information Security Template by Michael Jubel