Home > Uncategorized > Security News #0x29

Security News #0x29

  • Last week the folks at Metasploit uploaded the Java Applet JAX-WS Remote Code Execution module to exploit Java up through Java 7, Update 7, using the recently patched CVE-2012-5076 flaw. Eric Romang has a demo.
  • Royce Davis from Accuvant has a nice piece on a Metasploit module to remotely execute commands on a Windows system.
  • The folks at Cyber Arms explain how to use Mimikatz to pull clear text passwords from a locked Windows 8 system.
  • Bitdefender Labs has a nice technical piece on how Flame gets data from systems unconnected to the Internet to the worm’s command & control servers.
  • Two servers at FreeBSD.org were compromised last week.
Advertisements
Categories: Uncategorized
  1. No comments yet.
  1. No trackbacks yet.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: