Digital Operatives
  • Home
  • Blog
  • Careers
  • Contact
  • Products
  • Research
  • Services
Select Page

Bitcoin (Cryptocurrency) – Libertarian Safe Haven Asset or Cyber Tulip Disaster Waiting To Happen?

by digitaloperatives | Aug 27, 2017 | Research, Security News

Q: Is this a cyber security story or a finance risk story? A: Both, financial and cyber risks are more related than ever. I’ve read about the reasons for owning Bitcoin, some of these were intuitive for me long before this was ever compiled. Back in 2012 when I...

Updates to Magiic: local mbox/Thunderbird indexing, color highlighting, and more

by digitaloperatives | Jul 5, 2017 | Research

Magiic was created in 2013 to help users securely index and search their PGP-encrypted email.  It has been a while since Magiic was released and updated, and its original functionality of indexing only messages stored on a remote IMAP server did not serve...

Ghost in the Shellcode 2015 Write-up, Forensics 200: “CloudFS”

by digitaloperatives | Feb 23, 2015 | Capture the Flag

We began with no hint, and the file ‘cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2’.  The command file tells us that it is compressed data. $ file cloudfs-31c938df3531611b82fddf0685784a2b67373305ec689015f193a555b756beb2...

OS X VMWare Fusion Privilege Escalation via Bash Environment Code Injection: Local Use

by digitaloperatives | Sep 25, 2014 | Research

Just wanted to post a quick alternative of Metasploit’s VMWare Fusion CVE-2014-6271 exploit ( metasploit-framework / modules / exploits / osx / local / vmware_bash_function_root.rb ) for local shell use. hephaestus:~ jdugie$ for cmd in "cp /bin/bash /tmp/"...

CSAW CTF 2014 Qualification Round Write-up, Exploitation 400: “Saturn”

by digitaloperatives | Sep 22, 2014 | Capture the Flag

The annual NYU Polytechnic School of Engineering Cyber Security Awareness Week (CSAW) Capture The Flag (CTF) competition online qualifiers were held September 19-21, 2014.  This is a writeup of one of the Exploitation challenges we solved: "saturn". The...
« Older Entries
Next Entries »

Recent Posts

  • Bug Bounty: An Economic Disadvantage for Researchers?
  • The 10 Humorous But Immutable Laws of Cloud Security
  • Defeating Cisco’s Machine Learning Based Malware Traffic Detection Algorithm
  • The Cyber-Insecurity of WeWork – Shared Offices and Cracking WiFi with Weak WPA2 Passwords
  • Idea Machine – Part 1: Automated Reconnaissance For Penetration Testing

Archives

  • July 2023
  • October 2018
  • September 2018
  • May 2018
  • September 2017
  • August 2017
  • July 2017
  • April 2015
  • February 2015
  • September 2014
  • February 2014
  • January 2014
  • November 2013
  • October 2013
  • September 2013
  • August 2013
  • May 2013
  • April 2013
  • March 2013
  • February 2013
  • December 2012
  • November 2012
  • October 2012

Categories

  • Capture the Flag
  • Products
  • Research
  • Security News
  • Services
  • Uncategorized