Cross-Site Scripting vulnerability in Events Made Easy WordPress plugin

Posted by Summer of Pwnage on Aug 04

————————————————————————
Cross-Site Scripting vulnerability in Events Made Easy WordPress plugin
————————————————————————
Job Diesveld, July 2016

————————————————————————
Abstract
————————————————————————
A Cross-Site Scripting vulnerability has been found…

Cross-Site Scripting in FormBuilder WordPress Plugin

Posted by Summer of Pwnage on Aug 04

————————————————————————
Cross-Site Scripting in FormBuilder WordPress Plugin
————————————————————————
Peter Ganzevles, July 2016

————————————————————————
Abstract
————————————————————————
A Reflected Cross-Site Scripting (XSS) vulnerability has been found…

NetNeedle Network-Based Steganography Tool

NetNeedle provides for encrypted control channels and chat sessions that are disguised to look like other common network activity. It only transmits “decoy” data in the “payload” section of any packet, so forensic analysts will only see packets that look identical to ordinary ping or HTTP GET requests. The actual data is encoded in IP headers in fields that typically contain random values. In addition to evasion features, penetration testers can use this tool to maintain control over servers in environments with highly restrictive access lists. Because NetNeedle subverts expectations surrounding network traffic, it enables users to set up back doors that use simple ICMP packets or TCP ports that are already in use. Administrators who believe that they are safe due to “principle of least privilege” access control lists or who believe that ICMP ping is harmless will find themselves sadly mistaken.