Top Stories

Wed
17
Jun

Exploit Delivery via Steganography using Stegosploit Tool v0.2

Stegosploit

Exploit Delivery via Steganography using Stegosploit Tool v0.2

"A good exploit is one that is delivered in style" Saumil Shah

Since the presentation of Saumil Shah's Stegosploit Tool v0.2 at Hack in the Box Security Conference in Amsterdam, there were some heated discussions about the method and its possibilities. We talked to Saumil Shah from NetSquare about his Stegosploit Tool v0.2, and here is a deeper insight into the method.

OS: What distinguishes the Stegosploit method from known image exploit methods?

Fri
12
Jun

Hacker Attack on the German Parliament

hacked...

Hacker Attack on the German Parliament

There is new insight into the hacker attack on the German Bundestag Parliament: the attackers were looking for current Word documents, among other things.The focus were documents that were drawn up after May 1, and the hacker stole about 20 gigabytes of data from the network. The hack was first discovered when two computers infected with malicious software tried to contact a server to transfer data. German media states that the Bundestag may need to replace 20,000 computers after the recent attack.

“The trojans are still active,” quoted the Spiegel online edition, highlighting the possible risks in terms of security. The hackers had managed to dig deep into the network of the Bundestag for months. Ultimately, they were able to take over the so-called directory service of the Bundestag.

Pages

Subscribe to RSS - Top Stories