Quantcast
Channel: Damian Pfammatter – Compass Security Blog
Browsing all 5 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

XSLT Security and Server Side Request Forgery

Nowadays, a growing list of XSLT processors exist with the purpose of transforming XML documents to other formats such as PDF, HTML or SVG. To this end such processors typically offer a powerful set of...

View Article



Image may be NSFW.
Clik here to view.

Wie stiehlt man KMU-Geheimnisse?

Ein Hintegrundartikel zur SRF Einstein Sendung vom Donnerstag, 3. September 2015 um 21:00 Uhr zum Thema “Cybercrime, wie sicher ist das Know-how der Schweiz”. (Trailer online) In diesem Artikel zeigen...

View Article

Image may be NSFW.
Clik here to view.

Hidden Inbox Rules in Microsoft Exchange

Contents Introduction Attack Overview Step-by-Step Detection Email Clients Administration Tools Exchange Compliance Features MAPI Editor Eradication Microsoft Security Response Center Swiss Cyber...

View Article

Image may be NSFW.
Clik here to view.

Investigating Data Leakage via External Storage Devices

Contents Introduction Background Story External Device Access Auditing with Windows Security Event Logs Audit Plug and Play Activity Audit Removable Storage Activity External Device Access Auditing...

View Article

Image may be NSFW.
Clik here to view.

Challenging Your Forensic Readiness with an Application-Level Ransomware Attack

Contents Introduction Attack Scenario Outlook MAPI COM OutlookCOM Init Function OutlookCOM Traverse Function OutlookCOM Example OutlookCOM Ransomware Conclusion References Introduction Most ransomware...

View Article

Browsing all 5 articles
Browse latest View live




Latest Images