abusing the trust people have in signed applets.
It’s been blogged before but oh well I always learn by example so here is an example. The thing I’m talking about is trusting signed java applets. In short when you trust a java applet it can do whatever it wants. So what could you do with a java applet? The java source code will steal your mac address, rather useless but it serves the example purpose good enough. The stolen mac address get’s submitted to a page in this case it will be google which will look like this:
Continue reading “Trusting Java Applets”
Please bare with me, english is not my native language and I am way to lazy to rewrite old papers and tools. So I hope you can all forgive me for that.
I promise that I will try and write better english from now on.
Using timing mechanisms to detect rootkits.
Well my old website used to have a single page dedicated to affiliates and people I have met during my online time spent on irc, forums, etc…
On this blog I will maintain a list of friends. So just contact me to update this list. Please don’t be offended if your website isn’t on thislist I probably forgot some…still trying to sort things out.
Welcome to my new blog.
Like some of you know I used to have my own website http://www.kd-team.com. Unfortunatly life goes on and everyone heads for a new direction in life. Because of time restraints and the work it took to manage the website we decided to cancel it.
Most of the old content will be published here, just for archive purposes. The rest of the posts will be about daily security problems I struggle with or just random ideas I get in the middle of the night.
I’m off for some sleep, I’ll continue later on.