Android Mobile CTFs:
https://github.com/xtiankisutsa/awesome-mobile-CTF
https://github.com/xtiankisutsa/awesome-mobile-CTF
GitHub
GitHub - xtiankisutsa/awesome-mobile-CTF: This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them…
This is a curated list of mobile based CTFs, write-ups and vulnerable apps. Most of them are android based due to the popularity of the platform. - GitHub - xtiankisutsa/awesome-mobile-CTF: This i...
165.pdf
3.4 MB
Find Evil - know normal. \n hunting malware document
backdooring pe file with aslr
https://hansesecure.de/backdooring-pe-file-with-aslr/
https://hansesecure.de/backdooring-pe-file-with-aslr/
Forwarded from PacktPub Free Learning
Kenan Abdullahoğlu is one of the Turkey's cryptocurrency leaders. He has been interviewed with many news networks including Al Jazeera and BloombergHT about the different aspects of cryptocurrency including its security. Kenan will be present at poscon2018. More information and registration:
http://poscon.ir
@P0SCon
http://poscon.ir
@P0SCon
CVE-2018-13784: PrestaShop 1.6.x Privilege Escalation
https://www.ambionics.io/blog/prestashop-privilege-escalation
https://www.ambionics.io/blog/prestashop-privilege-escalation
Ambionics
PrestaShop 1.6 Privilege Escalation
Prestashop 1.6.1.19 sessions can be read and written by an attacker, resulting in a range of vulnerabilities including privilege escalation and remote code execution.
Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
https://www.darkreading.com/endpoint/microsoft-identity-bounty-program-pays-$500-to-$100000-for-bugs/d/d-id/1332325?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Dark Reading
Microsoft Identity Bounty Program Pays $500 to $100,000 for Bugs
Researchers will be rewarded for vulnerabilities found in identity solutions and implementations of certain OpenID standards.
Google User Content CDN Used for Malware Hosting
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
https://www.bleepingcomputer.com/news/security/google-user-content-cdn-used-for-malware-hosting/
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com. [...]
BleepingComputer
Google User Content CDN Used for Malware Hosting
Hackers are hiding malicious code inside the metadata fields of images hosted on Google's official CDN (content delivery network) —googleusercontent.com.