SlideShare a Scribd company logo
1 of 13
Riyaz Walikar
Null Meet - 10th March 2012
   Adobe Patches Zero-Day XSS Flaw, Six Other
    Bugs in Flash Player
   Microsoft's February Patch Tuesday Kills 21
    Security Bugs
   Google patches 14 vulnerabilities in Chrome
   Offensive Security Release Backtrack5 R2
   Linux Kernel 3.2.9 - 1st March 2012
   Adobe released a security update addressing
    seven critical vulnerabilities in its Flash Player
    software on Feb 15 2012

   A universal XSS bug in Flash found by Google

   4 memory corruption vulnerabilities and two
    security bypass vulnerabilities that could lead
    to code execution
   Microsoft's February Patch Tuesday Kills 21 Security
    Bugs
   9 Security Bulletins for IE and the Windows operating
    system, Microsoft Office and .NET/Silverlight
   Four rated critical for IE
   Windows Kernel (MS12-008), the .NET/Silverlight
    (MS12-016),the Microsoft C Runtime flaw in Windows
    Media Player (MS12-013), DLL-preloading issue in the
    Color Control Panel (MS12-012) and a flaw in Visio
    Viewer (MS12-015) were the other issues.
   Google patched 14 vulnerabilities in Chrome and handed
    out a record $47,500 in rewards to researchers, including
    $30,000 for "sustained, extraordinary" contributions to its
    bug-reporting program.
   10 of them were "use-after-free" memory management
    vulnerabilities
   Google paid 4 outside researchers $17,500 in bounty
    payments
   Google also rewarded 3 of them with surprise bonuses of
    $10,000 each for "sustained, extraordinary" work - Aki
    Helin and Arthur Gerkis, and to "miaubiz."
   Offensive Security released Backtrack 5 r2 on 1st March
   Several new tools, upgrades to previous tools and
    general improvement
   arduino, bluelog, bt-audit, dirb, dnschef, dpscan, easy-
    creds, extundelete, findmyhash, golismero, goofile, ha
    shcat-gui,                                          hash-
    identifier, hexorbase, horst, hotpatch, joomscan, killerb
    ee,          libhijack,        magictree,         nipper-
    ng, patator, pipal, pyrit, reaver, rebind, rec-
    studio, redfang, se-toolkit, sqlsus, sslyze, sucrack, thc-
    ssl-dos, tlssled, uniscan, vega, watobo, wcex, wol-
    e, and xspy.
   Linux Kernel 3.2.9 brings the usual ARM fixes
    and improvements, some USB patches, ALSA
    updates, as well as fixes for various
    filesystems, like NFSv4 and eCryptfs.
   GitHub hacked with Ruby on Rails public key
    vulnerability - Egor Homakov

   Polish websites attacked by Anti-ACTA Hackers

   Microsoft India store, managed by Quasar
    Media, down after hackers take user data – Team
    EvilShadow

   WikiLeaks releases alleged Stratfor e-mails
   New Flashback Trojan variant found for OS X

   Nortel was penetrated by hackers for decade
    - Wall Street Report

   Facebook Spammers Use Amazon's Cloud

   Albania is the most Malware infected Nation -
    Norman and Microsoft
   Anonymous Eavesdrops on FBI Call

   Anonymous takedown several Vatican
    Websites

   #AntiSec hackers deface Panda Security
    site to protest LulzSec arrests

   Anonymous Sabu was working for FBI to
    Trace down other LulzSec hackers
   Hackers steal Michael Jackson's entire back
    catalog from Sony

   Siemens and Canon's Databases exploited by
    Team INTRA

   Cyber Criminals took over billion dollar of
    Brazilian companies – PwC
   Pwn2Own 2012: Google Chrome browser
    sandbox first to fall , IE 9 on Windows 7 SP1
    hacked with two 0day vulnerabilities
   Russian University student Sergey Glazunov
    managed to execute code but not break out of
    the Chrome sandbox
   Vupen’s attack used a use-after-free bug to
    bypass DEP and ASLR and then a bug to bypass
    Chrome’s Sandbox
5 member team from Vupen Security @Pwn2Own 2012 with CEO Chaouki Bekrar

More Related Content

What's hot

Bugs Ex Ante by Kristaps Dzonsons
Bugs Ex Ante by Kristaps DzonsonsBugs Ex Ante by Kristaps Dzonsons
Bugs Ex Ante by Kristaps Dzonsons
eurobsdcon
 

What's hot (10)

The Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) AttackThe Dynamite of Next Generation (Y) Attack
The Dynamite of Next Generation (Y) Attack
 
Bugs Ex Ante by Kristaps Dzonsons
Bugs Ex Ante by Kristaps DzonsonsBugs Ex Ante by Kristaps Dzonsons
Bugs Ex Ante by Kristaps Dzonsons
 
Android 2.3 Introduction
Android 2.3 IntroductionAndroid 2.3 Introduction
Android 2.3 Introduction
 
Fileless Malware Infections
Fileless Malware InfectionsFileless Malware Infections
Fileless Malware Infections
 
Comparison of Windows and Linux Operating Systems in Advanced Features
Comparison of Windows and Linux Operating Systems in Advanced FeaturesComparison of Windows and Linux Operating Systems in Advanced Features
Comparison of Windows and Linux Operating Systems in Advanced Features
 
CI410 vieyra macro malware
CI410 vieyra macro malwareCI410 vieyra macro malware
CI410 vieyra macro malware
 
Nullbyte 6ed. 2019
Nullbyte 6ed. 2019Nullbyte 6ed. 2019
Nullbyte 6ed. 2019
 
Hunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of MemoryHunting Rootkit From the Dark Corners Of Memory
Hunting Rootkit From the Dark Corners Of Memory
 
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
Nguyen Duc Thinh - Docker security in Dev Ops environment 2.0
 
I Heart Stuxnet
I Heart StuxnetI Heart Stuxnet
I Heart Stuxnet
 

Similar to News bytes

The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
Kaspersky
 
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS Office
Kaspersky
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
Positive Hack Days
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
Prathan Phongthiproek
 

Similar to News bytes (20)

PPT on Android
PPT on AndroidPPT on Android
PPT on Android
 
Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?Tsunami of Technologies. Are we prepared?
Tsunami of Technologies. Are we prepared?
 
Malware Freak Show
Malware Freak ShowMalware Freak Show
Malware Freak Show
 
2022 December Patch Tuesday
2022 December Patch Tuesday2022 December Patch Tuesday
2022 December Patch Tuesday
 
News bytes Sept-2011
News bytes Sept-2011News bytes Sept-2011
News bytes Sept-2011
 
Malware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things MalwareMalware's Most Wanted: Linux and Internet of Things Malware
Malware's Most Wanted: Linux and Internet of Things Malware
 
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updatesBriskinfosec - Threatsploit Report Augest 2021- Cyber security updates
Briskinfosec - Threatsploit Report Augest 2021- Cyber security updates
 
Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0Mobile threat-report-mid-year-2018 en-us-1.0
Mobile threat-report-mid-year-2018 en-us-1.0
 
Palestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry morePalestra Jeferson Propheta - Wanna Cry more
Palestra Jeferson Propheta - Wanna Cry more
 
Stuxnet - A weapon of the future
Stuxnet - A weapon of the futureStuxnet - A weapon of the future
Stuxnet - A weapon of the future
 
The Duqu 2.0: Technical Details
The Duqu 2.0: Technical DetailsThe Duqu 2.0: Technical Details
The Duqu 2.0: Technical Details
 
Catching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS OfficeCatching Multilayered Zero-Day Attacks on MS Office
Catching Multilayered Zero-Day Attacks on MS Office
 
Software Disasters
Software DisastersSoftware Disasters
Software Disasters
 
Crypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year BackwardCrypto Hot Cases – One Year Backward
Crypto Hot Cases – One Year Backward
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
 
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming NextThe Seven Most Dangerous New Attack Techniques, and What's Coming Next
The Seven Most Dangerous New Attack Techniques, and What's Coming Next
 
BROWSERS!
BROWSERS!BROWSERS!
BROWSERS!
 
Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011Dan Guido SOURCE Boston 2011
Dan Guido SOURCE Boston 2011
 
The most well known closed vulnerabilities
The most well known closed vulnerabilitiesThe most well known closed vulnerabilities
The most well known closed vulnerabilities
 
Layer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load TargetLayer8 exploitation: Lock'n Load Target
Layer8 exploitation: Lock'n Load Target
 

More from n|u - The Open Security Community

More from n|u - The Open Security Community (20)

Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)Hardware security testing 101 (Null - Delhi Chapter)
Hardware security testing 101 (Null - Delhi Chapter)
 
Osint primer
Osint primerOsint primer
Osint primer
 
SSRF exploit the trust relationship
SSRF exploit the trust relationshipSSRF exploit the trust relationship
SSRF exploit the trust relationship
 
Nmap basics
Nmap basicsNmap basics
Nmap basics
 
Metasploit primary
Metasploit primaryMetasploit primary
Metasploit primary
 
Api security-testing
Api security-testingApi security-testing
Api security-testing
 
Introduction to TLS 1.3
Introduction to TLS 1.3Introduction to TLS 1.3
Introduction to TLS 1.3
 
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
Gibson 101 -quick_introduction_to_hacking_mainframes_in_2020_null_infosec_gir...
 
Talking About SSRF,CRLF
Talking About SSRF,CRLFTalking About SSRF,CRLF
Talking About SSRF,CRLF
 
Building active directory lab for red teaming
Building active directory lab for red teamingBuilding active directory lab for red teaming
Building active directory lab for red teaming
 
Owning a company through their logs
Owning a company through their logsOwning a company through their logs
Owning a company through their logs
 
Introduction to shodan
Introduction to shodanIntroduction to shodan
Introduction to shodan
 
Cloud security
Cloud security Cloud security
Cloud security
 
Detecting persistence in windows
Detecting persistence in windowsDetecting persistence in windows
Detecting persistence in windows
 
Frida - Objection Tool Usage
Frida - Objection Tool UsageFrida - Objection Tool Usage
Frida - Objection Tool Usage
 
OSQuery - Monitoring System Process
OSQuery - Monitoring System ProcessOSQuery - Monitoring System Process
OSQuery - Monitoring System Process
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Extensible markup language attacks
Extensible markup language attacksExtensible markup language attacks
Extensible markup language attacks
 
Linux for hackers
Linux for hackersLinux for hackers
Linux for hackers
 
Android Pentesting
Android PentestingAndroid Pentesting
Android Pentesting
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
AnaAcapella
 

Recently uploaded (20)

Third Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptxThird Battle of Panipat detailed notes.pptx
Third Battle of Panipat detailed notes.pptx
 
Python Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docxPython Notes for mca i year students osmania university.docx
Python Notes for mca i year students osmania university.docx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Micro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdfMicro-Scholarship, What it is, How can it help me.pdf
Micro-Scholarship, What it is, How can it help me.pdf
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Spellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please PractiseSpellings Wk 3 English CAPS CARES Please Practise
Spellings Wk 3 English CAPS CARES Please Practise
 
Asian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptxAsian American Pacific Islander Month DDSD 2024.pptx
Asian American Pacific Islander Month DDSD 2024.pptx
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
2024-NATIONAL-LEARNING-CAMP-AND-OTHER.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

News bytes

  • 1. Riyaz Walikar Null Meet - 10th March 2012
  • 2. Adobe Patches Zero-Day XSS Flaw, Six Other Bugs in Flash Player  Microsoft's February Patch Tuesday Kills 21 Security Bugs  Google patches 14 vulnerabilities in Chrome  Offensive Security Release Backtrack5 R2  Linux Kernel 3.2.9 - 1st March 2012
  • 3. Adobe released a security update addressing seven critical vulnerabilities in its Flash Player software on Feb 15 2012  A universal XSS bug in Flash found by Google  4 memory corruption vulnerabilities and two security bypass vulnerabilities that could lead to code execution
  • 4. Microsoft's February Patch Tuesday Kills 21 Security Bugs  9 Security Bulletins for IE and the Windows operating system, Microsoft Office and .NET/Silverlight  Four rated critical for IE  Windows Kernel (MS12-008), the .NET/Silverlight (MS12-016),the Microsoft C Runtime flaw in Windows Media Player (MS12-013), DLL-preloading issue in the Color Control Panel (MS12-012) and a flaw in Visio Viewer (MS12-015) were the other issues.
  • 5. Google patched 14 vulnerabilities in Chrome and handed out a record $47,500 in rewards to researchers, including $30,000 for "sustained, extraordinary" contributions to its bug-reporting program.  10 of them were "use-after-free" memory management vulnerabilities  Google paid 4 outside researchers $17,500 in bounty payments  Google also rewarded 3 of them with surprise bonuses of $10,000 each for "sustained, extraordinary" work - Aki Helin and Arthur Gerkis, and to "miaubiz."
  • 6. Offensive Security released Backtrack 5 r2 on 1st March  Several new tools, upgrades to previous tools and general improvement  arduino, bluelog, bt-audit, dirb, dnschef, dpscan, easy- creds, extundelete, findmyhash, golismero, goofile, ha shcat-gui, hash- identifier, hexorbase, horst, hotpatch, joomscan, killerb ee, libhijack, magictree, nipper- ng, patator, pipal, pyrit, reaver, rebind, rec- studio, redfang, se-toolkit, sqlsus, sslyze, sucrack, thc- ssl-dos, tlssled, uniscan, vega, watobo, wcex, wol- e, and xspy.
  • 7. Linux Kernel 3.2.9 brings the usual ARM fixes and improvements, some USB patches, ALSA updates, as well as fixes for various filesystems, like NFSv4 and eCryptfs.
  • 8. GitHub hacked with Ruby on Rails public key vulnerability - Egor Homakov  Polish websites attacked by Anti-ACTA Hackers  Microsoft India store, managed by Quasar Media, down after hackers take user data – Team EvilShadow  WikiLeaks releases alleged Stratfor e-mails
  • 9. New Flashback Trojan variant found for OS X  Nortel was penetrated by hackers for decade - Wall Street Report  Facebook Spammers Use Amazon's Cloud  Albania is the most Malware infected Nation - Norman and Microsoft
  • 10. Anonymous Eavesdrops on FBI Call  Anonymous takedown several Vatican Websites  #AntiSec hackers deface Panda Security site to protest LulzSec arrests  Anonymous Sabu was working for FBI to Trace down other LulzSec hackers
  • 11. Hackers steal Michael Jackson's entire back catalog from Sony  Siemens and Canon's Databases exploited by Team INTRA  Cyber Criminals took over billion dollar of Brazilian companies – PwC
  • 12. Pwn2Own 2012: Google Chrome browser sandbox first to fall , IE 9 on Windows 7 SP1 hacked with two 0day vulnerabilities  Russian University student Sergey Glazunov managed to execute code but not break out of the Chrome sandbox  Vupen’s attack used a use-after-free bug to bypass DEP and ASLR and then a bug to bypass Chrome’s Sandbox
  • 13. 5 member team from Vupen Security @Pwn2Own 2012 with CEO Chaouki Bekrar