background preloader

Media

Facebook Twitter

Video

Magazines. More stuff in Media. Blog - pentestmonkey.net. Jeremiah Grossman. Omg.wtf.bbq. C (in)suit. SkullSecurity. Metasploit. Security and Networking. Skeptikal.org. Tssci security. Blog - Gotham Digital Science. Reiners Weblog. Bernardo Damele A. G. Laramies Corner. Attack and Defense Labs. Billy (BK) Rios. Thursday, February 12th, 2015 Visual Studio VSTFS protocol handler command injection Last week, someone told me that my blog was on the “LovelyHorse” list.

Billy (BK) Rios

I’ve always thought that I was the only person who cared about this blog, but I guess there is a lonely analyst out there that also cares… lonely analyst, this one is for you I reported an issue affecting Visual Studio 2012 (which I had installed on one of my dev machines at the time). The issue was a blast from the past and reminded me of simpler times when I had the privilege of doing vulnerability research with Nate McFeters and Rob Carter :). Visual Studio 2012 registers the “vstfs” protocol handler during the installation process. “C:\Program Files (x86)\Microsoft Visual Studio 11.0\Common7\IDE\devenv.exe” /TfsLink “%1″ As you know, protocol handlers can be instantiated remotely, most commonly via web pages. Will result in the following being passed to the shell: vstfs:test” /command “Tools.Shell /c c:\windows\system32\calc.exe. Common Exploits. Extern blog SensePost; What originally started as one of those "hey, wouldn't this be cool?

extern blog SensePost;

" ideas, has blossomed into a yearly event for us at SensePost. SenseCon is a time for all of us to descend on South Africa and spend a week, learning/hacking/tinkering/breaking/building, together and in person. A few years ago we made the difficult, and sometimes painful, shift to enable remote working in preparation for the opening of our UK and Cape Town offices. Some of you probably think this is a no-brainer, but the benefit of being in the same room as your fellow hackers can't be overlooked. Being able to call everyone over to view an epic hack, or to ask for a hand when stuck is something tools like Skype fail to provide. People outside of our industry seem to think of "technical" people as the opposite of "creative" people.

But, ideas need input, so we try to organise someone to teach us new tricks. SensePost Radar WiFi Death Flag - Charl Charl, so incredibly happy!! Weapons of Mass Analysis. Exploit KB. Security Reliks. MadIrish.net. Sirdarckcat. Reusable Security. Myne-us. SpiderLabs Anterior. Peter Van Eeckhoutte (corelanc0d3r) DigiNinja. Home Of PaulDotCom Security Podcast. Attack Vector. Deviating.net. Alpha One Labs. SmashingPasswords.com. Wirewatcher. Gynvael.coldwind//vx.log. Nullthreat Security. Archangel Amael's BT Tutorials. Memset's blog. Ihasomgsecurityskills. Punter-infosec. Security Ninja. Security and risk.

GRM n00bs. Kioptrix. Saying it’s been awhile is an understatement.

Kioptrix

Almost 2 years without a new vulnerable VM and over 2 years without a blog post. I only have myself to blame, but work and family life takes up most of my waking hours. This is a hobby and hobbies come last. I must start by saying how shocked I am with the reception my VMs have received since their inception. Over the past 24+ months, I’ve gotten so many nice messages and e-mails from people saying they enjoyed them. I never expected this little project would turn out the way it did. Why the new VM The original idea behind my VMs has always been about learning, not only for the people downloading them but for me as well.

This new machine is no different. Why build these things… Which brings me to another point I wish to blabber about, why build these things. If you’re building a VM to submit to vulnhub.com (as an example), then you need to pay attention to how your machine reacts to scans and attacks. -loneferret About the VM. eSploit. PenTestIT Your source for Information Security Related information!