Skip to main content

Posts

Showing posts from June, 2016

Exploiting Software Haking_ATTACK PATTERN - Part 3

Third-party PHP When you do penetration testing, the server under examination often seems quite harmless for the first sight: it runs the latest versions of a web application and other services. But you still have to find vulnerabilities in them, so everything should be inspected. For example, if the server runs a third-party PHP version, everything can prove more serious. There are a number of third-party PHP versions currently in use. All of them were created to increase the performance and functionality of the language. A third-party PHP version increases the average operating speed of the application up to 5 times, which is definitely a lot. This is a result of cross compilation. In general terms, compilation consists in two steps: • The PHP script is translated into intermediate code (as a rule, the C code); • The C code is compiled into machine code. Yet, the best way to understand the process is to skip the general and look at each version one by one

Exploiting Software Haking_ATTACK PATTERN - Part 2

Malware, Botnet and cyber threats, what is happening to the cyberspace? The article proposes an analysis of the main cyber threats that worry security experts and that are profoundly changing the cyber space. The exponential growth of the number of cyber threats and attacks is rebutted by a wide range of statistical provided by reports published by the major security firms. The scenario is really scaring due concomitant action of cyber criminals, hacktivists and state sponsored hackers that are producing malware and botnets of increasing complexity. Day by day we read about the discovery of new cyber threats that menace the integrity of user’s machines, a multitude of agents developed by cyber criminals or by state sponsored researchers that operate stealing sensible information and in many cases destroying targets. Every machine that is connected to internet is exposed to serious risk to be compromised, in many cases, also having all the common defense systems in place due the