malware

android tap jacking, how to prevent it

人走茶凉 提交于 2019-12-03 13:58:37
问题 Trying to avoid my views touches receiving feedback from overlays .... Here is an example of a hack someone could do on Android to allow the user to unintentionally press a system button property or even enter in credentials to do something completely different then the initial intention: http://www.youtube.com/watch?v=gCLU7YUXUAY I would like confirmation that setting the property android:filterTouchesWhenObscured="true" in my xml view would hinder this from happening across devices as im

Ways to make Javascript code hacking / injection / manipulation difficult?

三世轮回 提交于 2019-12-03 13:04:02
问题 Are there ways to prevent, or make it difficult enough, for someone to inject Javascript and manipulate the variables or access functions? A thought I had is to change all var names randomly on each reload so the malware script would need to be rewritten every time? Or are there other less painful ways? I understand that eventually someone will hack his way in, but I'd like to know ways to make it difficult to reproduce the action, so that people won't publish a bookmarklet or something

What kind of Android application will require android.permission.READ_PHONE_STATE permission?

£可爱£侵袭症+ 提交于 2019-12-03 09:34:44
I have seen some Android apps on my phone require this android.permission.READ_PHONE_STATE permission. I don't know if I could trust them. I know this permission will give the app access to many information. I'm particularly interested in what functionality in an Android app normally require the information like DeviceId , SimSerialNumber , SubscriberId ? Samuel Bolduc Phone state provides access to a lot of information about the phone. Usual usages will be for reading the IMEI of your phone and your phone number. This can be useful to identify you in their systems. It can also be needed if

My site is infected with obfuscated PHP malware - what is it doing + how do I get rid of it?

我是研究僧i 提交于 2019-12-03 09:11:14
问题 I have three websites all hosted on the same webserver. Recently I was working on one of the websites and noticed that, about a month ago, a bunch of files had been changed. Specifically, all instances of index.html had been renamed to index.html.bak.bak , and index.php files have been put in their places. The index.php files are relatively simple; they include a file hidden somewhere in each website's filesystem (seemingly a random folder) that's been obfuscated with JS hex encoding, then

iFrame Injection Attack Followed us to New Server

人盡茶涼 提交于 2019-12-03 08:50:38
A few months ago, a hidden iFrame started showing up on every page on every site on our dedicated server. When we took the sites down for maintenance with a 503, the iFrame was still there on the down for maintenance page. Eventually, the host blocked the source of the iFrame, but we never found the backdoor. The injected iFrame looked something like this, but wrapped in a style tag to obfuscate and with various URLs: iframe src="http://heusnsy.nl/32283947.html.. We moved our smaller sites to a different host, and they've been fine. We moved our main site to a new dedicated server on the same

Extract JavaScript from malicious PDF

▼魔方 西西 提交于 2019-12-03 03:45:42
I have a PDF file that I know for a fact contains a JavaScript script file that does something malicious, not really sure what at this point. I have successfully uncompressed the PDF file and gotten the plaintext JavaScript source code, but it the code itself if kind of hidden in this syntax I haven't seen before. Code example: This is what the majority of the code looks like var bDWXfJFLrOqFuydrq = unescape; var QgFjJUluesCrSffrcwUwOMzImQinvbkaPVQwgCqYCEGYGkaGqery = bDWXfJFLrOqFuydrq( '%u4141%u4141%u63a5%u4a80%u0000%u4a8a%u2196%u4a80%u1f90%u4a80%u903c%u4a84%ub692....') I imagine that this

Ways to make Javascript code hacking / injection / manipulation difficult?

时间秒杀一切 提交于 2019-12-03 03:18:43
Are there ways to prevent, or make it difficult enough, for someone to inject Javascript and manipulate the variables or access functions? A thought I had is to change all var names randomly on each reload so the malware script would need to be rewritten every time? Or are there other less painful ways? I understand that eventually someone will hack his way in, but I'd like to know ways to make it difficult to reproduce the action, so that people won't publish a bookmarklet or something similar for everyone to use. I don't care if experts find their way in the code, but I'd like it to be a bit

My site is infected with obfuscated PHP malware - what is it doing + how do I get rid of it?

丶灬走出姿态 提交于 2019-12-03 00:49:30
I have three websites all hosted on the same webserver. Recently I was working on one of the websites and noticed that, about a month ago, a bunch of files had been changed. Specifically, all instances of index.html had been renamed to index.html.bak.bak , and index.php files have been put in their places. The index.php files are relatively simple; they include a file hidden somewhere in each website's filesystem (seemingly a random folder) that's been obfuscated with JS hex encoding, then echo the original index.html: <?php /*2d4f2*/ @include "\x2fm\x6et\x2fs\x74o\x721\x2dw\x631\x2dd\x66w\x31

how can i decode this malware PHP script? [closed]

旧城冷巷雨未停 提交于 2019-12-02 23:53:04
问题 This question is unlikely to help any future visitors; it is only relevant to a small geographic area, a specific moment in time, or an extraordinarily narrow situation that is not generally applicable to the worldwide audience of the internet. For help making this question more broadly applicable, visit the help center. Closed 7 years ago . I just notice all of my index file are having following code in my server. I would like to know how can i decode this. and find out who is behind with