skip to main | skip to sidebar
Where facts are few, experts are many.
  • Home
  • Menu
    • About Me
    • Research and Presentations
    • Vulnerability Disclosure Policy
    • Old archived Blog
  • Contact
    • Mail
  • Subscribe to Feed
Fake credit cards professionally (video)
| 0 comments ]



:.



0 comments

Post a Comment

Newer Post Older Post Home

About Me

My photo
Thierry Zoller
Welcome to my blog covering Information Security and Privacy.



Ex-Amazon, HSBC, Verizon - Currently CISO @J.P. Morgan Payments

Quick-links
▪ About me
▪ Tools / Talks / Whitepapers
▪ Vulnerability disclosure policy
▪ Subsribe to RSS Feed

View my complete profile

  • Follow me on Twitter
  • Follow me on Linked-in

  • The views and opinions expressed on this blog are my personal views and are not intended to reflect the views of my employer or any other entity.

    Total Pageviews

    Blog Archive

    • ►  2020 (11)
      • ►  July (4)
      • ►  May (2)
      • ►  April (2)
      • ►  March (1)
      • ►  January (2)
    • ►  2017 (1)
      • ►  October (1)
    • ►  2013 (4)
      • ►  July (1)
      • ►  June (1)
      • ►  March (2)
    • ►  2012 (11)
      • ►  November (1)
      • ►  August (2)
      • ►  July (1)
      • ►  June (4)
      • ►  May (2)
      • ►  March (1)
    • ►  2011 (10)
      • ►  December (3)
      • ►  November (1)
      • ►  October (2)
      • ►  September (2)
      • ►  August (2)
    • ►  2010 (6)
      • ►  August (1)
      • ►  July (1)
      • ►  March (2)
      • ►  February (2)
    • ▼  2009 (80)
      • ►  November (2)
      • ►  October (1)
      • ►  September (3)
      • ►  July (3)
      • ►  June (2)
      • ►  May (22)
      • ►  April (16)
      • ►  March (17)
      • ►  February (7)
      • ▼  January (7)
        • Removing the A in CIA for statistical reasons...
        • CA Anti-Virus Engine Detection Evasion Multiple V...
        • Fake credit cards professionally (video)
        • Chomsky on the conflict of Gaza
        • Advisory : [TZO-2009-2]-Avira Antivir - Priviledge...
        • Advisory : [TZO-2009-1] Avira Antivir - RAR Parser...
        • The Race to 100 (finished)
    • ►  2008 (31)
      • ►  December (2)
      • ►  November (7)
      • ►  October (7)
      • ►  September (3)
      • ►  August (12)
    • ►  2007 (7)
      • ►  October (1)
      • ►  May (1)
      • ►  April (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2006 (6)
      • ►  December (1)
      • ►  August (2)
      • ►  March (1)
      • ►  February (1)
      • ►  January (1)
    • ►  2005 (9)
      • ►  October (1)
      • ►  April (7)
      • ►  January (1)
    • ►  2000 (1)
      • ►  March (1)

    Featured Post

    A Primer on dealing with the DPA of Luxembourg - the CNPD

    This blog post will be updated periodically as I come across new practical information and experiences. You can subscribe to my blog if you ...

    Popular Posts

    • IIS 6 / IIS 5 / IIS 5.1+ Webdav auth bypass [Final]
      Table of Contents Updates Bulletins Am I at risk ? Tools Technical details 0.1 Personal message Several news stories seem to allu...
    • Advisory : Firefox Denial of Service (KEYGEN)
      Comment: I have received interesting and mixed feedback from posting the above "bug". First I'd like to clarify that a vulner...
    • CVE-2010-x+n - Loadlibrary/Getprocaddress roars its evil head in 2010
      Subscribe to the RSS feed in case you are interested in updates After Acrossecurity , published an interesting vulnerability and HDmoo...
    • Advisory : F-Prot (Frisk) - CAB bypass / evasions
      CHEAP Plug : ************ You are invited to participate in HACK.LU 2009, a small but concentrated luxemburgish security conference. More ...
    • IBM Proventia - Evasion (limited details)
      Release mode: Forced disclosure, no answer from vendor. Ref         : TZO-04-2009-IBM Proventia WWW         : http://blog.zo...

    Blogs I read

    • Krebs on Security
      Google Suspends Chinese E-Commerce App Pinduoduo Over Malware - Google says it has suspended the app for the Chinese e-commerce giant Pinduoduo after malware was found in versions of the app. The move comes just weeks a...
      5 hours ago
    • Schneier on Security
      ChatGPT Privacy Flaw - OpenAI has disabled ChatGPT’s privacy history, almost certainly because they had a security flaw where users were seeing each others’ histories.
      17 hours ago
    • Troy Hunt
      Weekly Update 339 - Why can't I audio right? It's my 339th video and I still make mistakes 🙂 But it came good and we got a decent show out of it with lots of interesting en...
      5 days ago
    • Cup of Security
      Soft and Gooey Caramel Popcorn - #Soft #and #Gooey #Caramel #Popcorn
      2 weeks ago
    • Didier Stevens
      Update: oledump.py Version 0.0.72 - This update brings a new plugin to analyze MSI files: plugin_msi_info oledump_V0_0_72.zip (http)MD5: 27CBB0D67EA90DD02875081785B50CB4SHA256: 3E20C06B40222D...
      3 weeks ago
    • contagio
      Malware Arsenal used by Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) in attacks targeting Ukraine (samples) - *2023-02-18* Ember Bear (aka UAC-0056,Saint Bear, UNC2589, Lorec53, TA471, Nodaria, Nascent Ursa, LorecBear, Bleeding Bear, and DEV-0586) is an Advance...
      4 weeks ago
    • TaoSecurity
      Happy 20th Birthday TaoSecurity Blog - Happy 20th birthday TaoSecurity Blog, born on 8 January 2003. Thank you Blogger Blogger (now part of Google) has continuously hosted this blog for 20 y...
      2 months ago
    • Lenny Zeltser on Information Security
      Cybersecurity vs. Everyone - Cybersecurity leaders not only go against threat actors to defend the organization but also find themselves at odds with other business executives. How can...
      2 months ago
    • A Few Thoughts on Cryptographic Engineering
      Why encrypted backup is so important - You might have seen the news today that Apple is announcing a raft of improvements to Macs and iOS devices aimed at improving security and privacy. These i...
      3 months ago
    • root labs rdist
      Rebooting - I’ve recently had some time to catch up on reading and research. I’ve decided to start writing again here about cryptography, embedded systems, and securit...
      4 months ago
    • Securosis Highlights
      Heading to Techstrong - Posted under: General The phone rang. On the other end, I heard a booming voice many of you are familiar with. “Hey Mikey! What’s shaking? What’s your pla...
      8 months ago
    • CrySyS Blog
      Post-Quantum Cryptography Standardization: A New Milestone - In some of our previous posts, we have already touched upon why the development of quantum computers poses challenges to the field of information security ...
      8 months ago
    • VRT
      Attackers use domain fronting technique to target Myanmar with Cobalt Strike - By Chetan Raghuprasad, Vanja Svajcer and Asheer Malhotra. News Summary Cisco Talos discovered a new malicious campaign using a leaked version of Cobalt Str...
      1 year ago
    • Chatter on the Wire: How excessive network traffic gives away too much!
      Satori Updates - I've continued to update Satori little by little out there on github. Both updating the underlying code and fingerprints. Always happy to have new id...
      1 year ago
    • Uncommon Sense Security
      Ten years, how time flies. - Ten years, a decade, it’s a very long time, and yet passes in the blink of an eye. I joined Tenable ten years ago, and somehow they have not tired of me ...
      1 year ago
    • Security
      Recovering "lost" treasure-filled floppy discs with an oscilloscope - There are many good, modern solutions for reading data off old floppy discs and drives. Perhaps the best is the Greaseweazle: it's capable, open source, ...
      1 year ago
    • Privacy Law Blog
      The Future of the FTC: Part II - A previous blog post discussed FTC Chairwoman Slaughter’s first priority as the newly designated chairwoman – the COVID-19 pandemic. The FTC’s second prior...
      2 years ago
    • Carnal0wnage & Attack Research Blog
      WeirdAAL update - get EC2 snapshots - I watched a good DEF CON video on abusing public AWS Snapshots https://www.youtube.com/watch?v=-LGR63yCTts I, of course, wanted to check this out. There a...
      2 years ago
    • GreyHatHacker.NET
      Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability - Last November I reported a kernel vulnerability to CERT/CC for their help in coordinating the disclosure as it impacted dozens of vendors including Google ...
      4 years ago
    • /dev/ttyS0
      Protected: TP-Link is Bullshit - There is no excerpt because this is a protected post.
      4 years ago
    • newsoft's fun blog
      SSTIC 2018 - Nous sommes en 2018. Fuites de données, attaques massives, failles structurelles, le monde constate chaque jour un peu plus à quel point la sécurité est ...
      4 years ago
    • Arne Swinnen's Security Blog - Just Another Infosec Blog
      Authentication bypass on Uber’s Single Sign-On via subdomain takeover - TL;DR: Uber was vulnerable to subdomain takeover on saostatic.uber.com via Amazon CloudFront CDN. Moreover, Uber’s recently deployed Single Sign-On (SSO) s...
      5 years ago
    • Claude Adam
      En français svp? - Mir stelle fest, datt graff vereinfacht, zu Lëtzebuerg 100.000 Lëtzebuerger schaffen, 100.000 net-Lëtzebuerger Residenten an 200.000 Frontalieren. Datt ënn...
      5 years ago
    • Adam Shostack & friends
      Rogue One Sequel already being filmed! - There’s some really interesting leaked photos and analysis by Charles Goodman. “Leaked photos from the Rogue One sequel (Mainly Speculation – Possible Spoi...
      6 years ago
    • LuxLegal
      La réforme des allocations familiales : une nouvelle atteinte aux droits des familles recomposées ? - Alors que la Cour de Justice de l’Union Européenne est toujours saisie de litiges concernant des enfants étudiants issus de familles recomposées s’étant vu...
      6 years ago
    • Secure Belief
      VulnHub Stapler 1 Solution 2 - You can find Solution 1 here. After spending a night on this, I finally managed to solve the 2nd way to get limited shell on this box. Let's see how this ...
      6 years ago
    • Fun Over IP
      McAfee SiteList.xml password decryption - Recently, a very good friend of mine (@Sn0rkY) pointed me out the story of a pentester who recovered the encrypted passwords from a McAfee SiteList.xml fil...
      7 years ago
    • Scrammed!
      A WinDbg extension to print the kernel memory layout - WinDbg is an awesome debugger, but I always missed the nice, compact and tidy view of the process memory layout that you have in OllyDbg (in *View->Memory*...
      8 years ago
    • mossmann's blog
      Learning SDR - I recently launched Software Defined Radio with HackRF, an instructional video series that I hope will make it easier than ever for people to learn the bas...
      8 years ago
    • Java security and related topics
      USENIX Security Symposium Slides - We're very happy to present the paper Revisiting SSL/TLS Implementations - New Bleichenbacher Side Channels and Attacks by Christopher Meyer, Juraj Somo...
      8 years ago
    • The iSecLab Blog [by Faculty and Students];
      New Insights into Email Spam Operations - Our group has been studying spamming botnets for a while, and our efforts in developing mitigation techniques and taking down botnets have contributed in d...
      8 years ago
    • Amrit Williams Blog
      RSA Announces End of RSA Security Conference - Aims to bring clarity to cloudy marketing messages through exhibit hall chotskies Bedford, MA., – April 1, 2014 – RSA, the security division of EMC, today ...
      8 years ago
    • ax330d's blog
      Samsung Galaxy S5 could be cheaper than Galaxy S4 - Good news for would-be Samsung Galaxy S5 customers - the main smartphone may end up being more economical as opposed to Galaxy S4 was when it established. ...
      8 years ago
    • Cognitive Dissidents
      Why I _am_ Speaking At RSA 2014 - There’s been quite a bit of drama with regards to whether or not to boycott the RSA conference over a deal that the RSA security vendor had made with the N...
      9 years ago
    • Ma petite parcelle d'Internet...
      Router backdoor reloaded... - S i vous avez aimé l'histoire de la backdoor D-Link, vous allez A-DO-RER celle-ci. C'est encore sur /dev/ttyS0 que ça se passe, où on apprend que les route...
      9 years ago
    • Androguard
      One year after, end of Magnificent 7 project ! - It has been a year already since the start of the Magnificient 7 program ! So what happened during this year ? We added some features to enhance your analy...
      9 years ago
    • Digital Forensics is a Science
      Mobile Device Forensics - Course Update - It's been a few weeks since the last update, but things have been busy. The Fall 2012 term is now in Week 5 (wow, the semester is flying by). We've covered...
      10 years ago
    • Nynaeve
      NWScript JIT engine: Wrap-up (for now) - Yesterday, I provided a brief performance overview of the MSIL JIT backend versus my implementation of an interpretive VM for various workloads. Today, I’l...
      12 years ago
    • IBM Internet Security Systems Frequency X Blog
      -
    • CryptoLUX - Recent changes [en]
      -
    • rmhrisk.wpengine.com/
      -
    • Metasploit
      -
    • woanware
      -
    • ...And You Will Know me by the Trail of Bits
      -
    Show 10 Show All

    Links

    • Schneier on Security
    • Brian Krebs on Security
    • Lenny Zeltser
    • Malware LU
    • CryptoLux
    • Unmitigated Risk
    • TaoSecurity - Bejtlich
    • root labs rdist
    • Securosis Blog
    • Trail of Bits
    • Sid's Blog [FR]
    • Fun over IP
    • Hack.lu
    • Joe Sandbox
    • SVEN

    Labels

    • Advisory (53)
    • Rants from Thierry (25)
    • Tool (19)
    • Vulnerabilties (13)
    • Misc (10)
    • Interesting Reads (8)
    • 0day (7)
    • How-to (7)
    • Luxembourg (4)
    • Whitepaper (4)
    • Hardware hacking (2)
    • Constitution (1)
     
    Copyright Musings on Information Security and Data Privacy