HackerOne – Telegram
HackerOne
11K subscribers
644 photos
31 videos
79 files
2.74K links
Community : @Sec0x01
@Bug0x
Download Telegram
https://siguza.github.io/PAN/

ARM CPU hardware bug
US warns of Iranian cyber threat

https://ift.tt/37LGRsP
new version of Boneh-Shoup's magnificent book is out!

https://crypto.stanford.edu/~dabo/cryptobook/BonehShoup_0_5.pdf
Forwarded from CTF Community | Hints
Reverse engineering and modifying an Android game (.apk) — CTF

Recently it has been solved a CTF style challenge where the user was given an .apk file with the goal to find the flag. if you are interested in Android follow this Tutorial
#Android @ctfplay
HideProcess

A basic Direct Kernel Object Manipulation rootkit that removes a process from the EPROCESS list, hiding it from the Task Manager

https://blog.landhb.dev/posts/v9eRa/a-basic-windows-dkom-rootkit-pt-1/
https://github.com/landhb/HideProcess
#windows #persistence #redteaming #evasion
[PHP] Exposing DB Credentials / HttpOnly Bypass / FPD
https://hackking.net/threads/php-exposing-db-credentials-httponly-bypass-fpd.29/
The NSA found a dangerous Windows 10 flaw and alerted Microsoft - rather than weaponise it

Washington: The National Security Agency recently discovered a major flaw in Microsoft's Windows operating system - one that could potentially expose computer users to significant breaches or surveillance, and alerted the firm to the problem rather than turn it into a hacking weapon, according to people familiar with the matter.

The disclosure represents a major shift in the NSA's approach, choosing to put computer security ahead of building up its arsenal of hacking tools that allow the agency to spy on adversaries' networks, according to the people familiar with the matter who spoke on condition of anonymity because of the sensitivity of the matter.

https://www.smh.com.au/technology/the-nsa-found-a-dangerous-windows-10-flaw-and-alerted-microsoft-rather-than-weaponise-it-20200115-p53rip.html
Applying a Stuxnet Type Attack to a Schneider Modicon M340 PLC

In summary:

- how we can backdoor PLC using  a "stuxnet-like" attack based on 
DLL-Reflective.
- a deep dive from Grafcet/Ladder processing to asm assembly
- injection of  C payload into PLC to perform funny things like TCP port 
scanner, modification of legitimate automation program ...

https://airbus-cyber-security.com/applying-a-stuxnet-type-attack-to-a-schneider-modicon-plc-airbus-cybersecurity/
#CSP bypass