CrowdStrike identify WebKit Remote Code Execution (RCE)

March 16, 2012
(20 views)

CrowdStrike a new company formed by former CTO of McAfee George Kurtz recently purchased the 20 plus WebKit vulnerabilities ($1,400) that led to the Remote Code Execution (RCE) exploit being exposed at RSA earlier this month. George and his new team spent $14k weaponizing it into an actual Android exploit, with the aim of establishing root access to an Android device running version 2.2 (Froyo) and 2.3 and the setting up a command control for the Chinese Remote Access Tool (RAT). This allows a hacker to have full remote control of your Android 2.2/2.3 device. Read more...

Recommended From Hakin9
Security firm RSA Security breached
Security firm RSA Security breached

RSA Security is one of the biggest players in the enterprise security landscape, featuring advanced

Social media zombies: HBGary, USAF and the government
Social media zombies: HBGary, USAF and the government

HBGary ownage has probably been the most prominent example of complete take over carried out

Microsoft MPE privilege flaw identified
Microsoft MPE privilege flaw identified

Microsoft's Malware Protection Engine has been patched as Argeniss security expert identifies an 'elevation of

Virus hits London Stock Exchange (LSE)
Virus hits London Stock Exchange (LSE)

The London Stock Exchange website was attacked by malware hidden inside an advert on February

(20 views)
Subscribe
Notify of
guest

This site uses Akismet to reduce spam. Learn how your comment data is processed.

1 Comment
Newest
Oldest Most Voted
Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.