GET YOUR VULNERABILITY AND THREAT DATABASE SUBSCRIPTION
EKOLABS 2016


LittleBlackBox v0.1.1: Breaking SSL on Embedded Devices

December 21st, 2010 | by NJ Ouchn

A lot of embedded devices provide HTTPS support so that administrators can administer the devices securely over untrusted networks. Some devices, such as SSL VPNs, center their entire functionality around SSL encryption. OK, well SSL isn


Focus on Bluetooth Penetration Testing Framework

December 21st, 2010 | by NJ Ouchn

Bluetooth is a proprietary open wireless technology standard for exchanging data over short distances (using short wavelength radio transmissions) from fixed and mobile devices, creating personal area networks (PANs) with high levels of security. Created by telecoms vendor Ericsson in 1994,[1] it was originally conceived as a wireless alternative to RS-232 data cables. It can connect several devices, overcoming problems of synchronization. Today Bluetooth is managed by the Bluetooth Special Interest Group


Top 10 Database Vulnerabilities and Misconfigurations

December 21st, 2010 | by NJ Ouchn

TeamSHATTER (Security Heuristics of Application Testing Technology for Enterprise Research) has researched the Top 10 Database Vulnerabilities in order to provide you with the most up-to-date vulnerabilities, risk and remediation information


exploitdb nmap script available

December 21st, 2010 | by NJ Ouchn

Here is a little script wrote by “L10n“. It searches the exploitdb archive for possible exploits. It is very verbose [&hellip


Detecting Google hacking against your Website

December 20th, 2010 | by NJ Ouchn

Google or other search engines have been used for many purposes such as finding useful information, important websites and latest news on different topics, Google index a huge number of web pages that are growing daily


Common Weakness Scoring System (CWSS) v0.1 released

December 20th, 2010 | by NJ Ouchn

So for each weakness in the architecture, design, code or implementation that might be introduced into an application, which in some cases can contribute to a vulnerability within that software, we need to be able toreason and communicate about the relative importance of different weaknesses. For example, a buffer overflow vulnerability might arise from aweakness in which the programmer doesnot properly validate the length of an input buffer. This weakness only contributes to a vulnerability if the input buffer can be influenced by amalicious party, and the malicious buffer is copied toa smaller buffer


Spiceworks Update 5.0.60600 Now Available

December 20th, 2010 | by NJ Ouchn

Spiceworks is the complete network management & monitoring, helpdesk, PC inventory & software reporting solution to manage Everything IT in small and medium businesses


The First Open Source Telephony Conference in 2011

December 20th, 2010 | by NJ Ouchn

The real beautiful thing about open source telephony is when everybody talks about it and benefits from it. I am happy to know that the VoIP88.com has announced the 1st open source telephony conference in Shenzhen China in the coming year. And I do think it



Back to Top ↑