Introducing IsThisLegit and Phinn
http://ift.tt/2h3b8hi
Submitted July 28, 2017 at 10:45PM by jwcrux
via reddit http://ift.tt/2tKaV4A
http://ift.tt/2h3b8hi
Submitted July 28, 2017 at 10:45PM by jwcrux
via reddit http://ift.tt/2tKaV4A
The Duo Security Bulletin
New Open-Source Phishing Tools: IsThisLegit and Phinn
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
Brida: Burp Extension that acts as a bridge between Burp Suite and Frida
http://ift.tt/2v4HEFH
Submitted July 28, 2017 at 11:37PM by 0xdea
via reddit http://ift.tt/2uJP4eY
http://ift.tt/2v4HEFH
Submitted July 28, 2017 at 11:37PM by 0xdea
via reddit http://ift.tt/2uJP4eY
reddit
Brida: Burp Extension that acts as a bridge between... • r/netsec
2 points and 0 comments so far on reddit
Augur REP Token Critical Vulnerability Disclosure
http://ift.tt/2eTU4tG
Submitted July 29, 2017 at 12:02AM by neko-z
via reddit http://ift.tt/2w6VlRh
http://ift.tt/2eTU4tG
Submitted July 29, 2017 at 12:02AM by neko-z
via reddit http://ift.tt/2w6VlRh
Zeppelin Solutions
Augur REP Token Critical Vulnerability Disclosure
Two weeks ago, we finished our audit of the Serpent compiler and sent it privately to the Augur team.
Chaining 4 Bugs to get RCE on Github Enterprise
http://ift.tt/2vQNUyx
Submitted July 29, 2017 at 02:11AM by juken
via reddit http://ift.tt/2eUYZu5
http://ift.tt/2vQNUyx
Submitted July 29, 2017 at 02:11AM by juken
via reddit http://ift.tt/2eUYZu5
Orange
How I Chained 4 vulnerabilities on GitHub Enterprise, From SSRF Execution Chain to RCE!
This is 🍊 speaking
Email Authentication Failure
http://ift.tt/2tKRngs
Submitted July 29, 2017 at 03:20AM by mickeyc
via reddit http://ift.tt/2uGfQX7
http://ift.tt/2tKRngs
Submitted July 29, 2017 at 03:20AM by mickeyc
via reddit http://ift.tt/2uGfQX7
I needed a more reliable way to identify signatures in obfuscated malware code. Finally published my work: "Searching For Phrases in Base64-encoded Strings".
http://ift.tt/2eUXiND
Submitted July 29, 2017 at 04:39AM by heyitsmikeyv
via reddit http://ift.tt/2tKBYN7
http://ift.tt/2eUXiND
Submitted July 29, 2017 at 04:39AM by heyitsmikeyv
via reddit http://ift.tt/2tKBYN7
Michael Veenstra
Searching For Phrases in Base64-encoded Strings | Michael Veenstra
Perform filesystem searches for phrases encoded in base64 by identifying key strings. Use these key strings for detection signatures or one-time scans.
PoC malware that exfils data (from air-gapped-like environments) via triggering AV on the endpoint and then communicating back from the AV's cloud (BlackHat 2017 & DEF CON 25)
http://ift.tt/2u6l0Z6
Submitted July 29, 2017 at 09:55AM by ikotler
via reddit http://ift.tt/2w8kBGM
http://ift.tt/2u6l0Z6
Submitted July 29, 2017 at 09:55AM by ikotler
via reddit http://ift.tt/2w8kBGM
GitHub
SafeBreach-Labs/spacebin
spacebin - Spacebin is a proof-of-concept malware that exfiltrates data (from air-gapped-like environments) via triggering AV on the endpoint and then communicating back from the AV's cloud com...
The automated vBulletin ForumRunner exploit (CVE-2016-6195), with added hash-cracking fun!
http://ift.tt/2uGW7Xd
Submitted July 29, 2017 at 11:24AM by datanoid
via reddit http://ift.tt/2u6t1xa
http://ift.tt/2uGW7Xd
Submitted July 29, 2017 at 11:24AM by datanoid
via reddit http://ift.tt/2u6t1xa
GitHub
drewlong/vbully
vbully - 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit made easy.
PDF materials and presentations from DEF CON 25 (2017)
http://ift.tt/2v7iTbK
Submitted July 30, 2017 at 03:34AM by campuscodi
via reddit http://ift.tt/2u8ksC1
http://ift.tt/2v7iTbK
Submitted July 30, 2017 at 03:34AM by campuscodi
via reddit http://ift.tt/2u8ksC1
media.defcon.org
DEF CON Media Server
Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge…
Man-in-the-middle wireless access point inside a docker container
http://ift.tt/2tTjWws
Submitted July 30, 2017 at 06:34AM by brannondorsey
via reddit http://ift.tt/2eX3Jzx
http://ift.tt/2tTjWws
Submitted July 30, 2017 at 06:34AM by brannondorsey
via reddit http://ift.tt/2eX3Jzx
GitHub
brannondorsey/mitm-router
mitm-router - ☠ Man-in-the-middle wireless access point inside a docker container 🐳
DefCon - Jailbreaking Apple Watch by Max Bazaliy [slides]
http://ift.tt/2w46KBr
Submitted July 30, 2017 at 04:47PM by rootsh3ll
via reddit http://ift.tt/2hcE9Ya
http://ift.tt/2w46KBr
Submitted July 30, 2017 at 04:47PM by rootsh3ll
via reddit http://ift.tt/2hcE9Ya
Speaker Deck
Jailbreaking Apple Watch
DEFCON 25, Las Vegas, NV
Attacking File Shares
http://ift.tt/2v9w6AW
Submitted July 30, 2017 at 11:05PM by ConfChar
via reddit http://ift.tt/2tOIP8r
http://ift.tt/2v9w6AW
Submitted July 30, 2017 at 11:05PM by ConfChar
via reddit http://ift.tt/2tOIP8r
GitHub
FransHBotes/shareAttack
shareAttack - Automatically attack all file shares within AD network environment. Exploiting weak permissions.
How to turn Photoshop into a remote access tool
http://ift.tt/2vVFJAZ
Submitted July 31, 2017 at 12:20AM by CodeColorist
via reddit http://ift.tt/2hetIDx
http://ift.tt/2vVFJAZ
Submitted July 31, 2017 at 12:20AM by CodeColorist
via reddit http://ift.tt/2hetIDx
Medium
How to turn Photoshop into a remote access tool – 0xCC – Medium
Photoshop has an optional feature named Remote Connections. It’s disabled by default, but when you turn this on and set the password…
Koadic: advanced Windows post-exploitation rootkit based on Windows Script Host
http://ift.tt/2uLU4kH
Submitted July 31, 2017 at 02:45AM by 0xdea
via reddit http://ift.tt/2hePIhp
http://ift.tt/2uLU4kH
Submitted July 31, 2017 at 02:45AM by 0xdea
via reddit http://ift.tt/2hePIhp
GitHub
zerosum0x0/koadic
koadic - Koadic C3 COM Command & Control - JScript RAT
Ethereum Breakdown: The Parity Multisig Exploit ($32 million theft)
https://www.youtube.com/watch?v=VUH4gRDQYsA
Submitted July 30, 2017 at 11:48AM by alanforts
via reddit http://ift.tt/2eZQcav
https://www.youtube.com/watch?v=VUH4gRDQYsA
Submitted July 30, 2017 at 11:48AM by alanforts
via reddit http://ift.tt/2eZQcav
YouTube
Ethereum Breakdown: The Parity Multisig Exploit ($32 million theft)
Last Tuesday, an unknown hacker sent a series of malicious transactions to three separate Ethereum ICO contracts and managed to steal $32 million worth of Ether. The transactions exploited a bug in the Parity Multisig Wallet contract. But what exactly was…
[Updated] How to turn Photoshop into a remote access tool
http://ift.tt/2wcKCVJ
Submitted July 31, 2017 at 01:04PM by CodeColorist
via reddit http://ift.tt/2uMtM1L
http://ift.tt/2wcKCVJ
Submitted July 31, 2017 at 01:04PM by CodeColorist
via reddit http://ift.tt/2uMtM1L
Medium
How to turn Photoshop into a remote access tool
Sorry for taking down the previous post. In this morning I thought that there was something important I missed. To responsibly disclosure…
Volatility, my own cheatsheet (Part 6): Windows Registry
http://ift.tt/2wcZIdE
Submitted July 31, 2017 at 06:23PM by maxxori
via reddit http://ift.tt/2vXFZPR
http://ift.tt/2wcZIdE
Submitted July 31, 2017 at 06:23PM by maxxori
via reddit http://ift.tt/2vXFZPR
So Long, and Thanks for All the Fish
Volatility, my own cheatsheet (Part 6): Windows Registry
The infamous Windows Registry
Hacking Voting Machines at DEF CON 25
http://ift.tt/2tWC20i
Submitted July 31, 2017 at 06:22PM by Extremite
via reddit http://ift.tt/2uN8r8J
http://ift.tt/2tWC20i
Submitted July 31, 2017 at 06:22PM by Extremite
via reddit http://ift.tt/2uN8r8J
TJ's Blog
Hacking Voting Machines at DEF CON 25
Let's rig some elections.
SensePost | Linux heap exploitation intro series: Used and Abused - use-after-free [mini-challenge inside]
http://ift.tt/2uJiAD4
Submitted July 31, 2017 at 10:25PM by NeomindMusic
via reddit http://ift.tt/2f1XtXk
http://ift.tt/2uJiAD4
Submitted July 31, 2017 at 10:25PM by NeomindMusic
via reddit http://ift.tt/2f1XtXk
Sensepost
SensePost | Linux heap exploitation intro series: used and abused – use after free
Leaders in Information Security
The adventures of xss vectors in curious places
http://ift.tt/2v9bkBr
Submitted July 30, 2017 at 09:55PM by i_bo0om
via reddit http://ift.tt/2vmlMpI
http://ift.tt/2v9bkBr
Submitted July 30, 2017 at 09:55PM by i_bo0om
via reddit http://ift.tt/2vmlMpI
reddit
The adventures of xss vectors in curious places • r/netsec
1 points and 0 comments so far on reddit
We all use perfectly entropic, 48-character passwords for every account we own, obviously. But did you always? I sure didn't.
http://ift.tt/2udlyfF
Submitted August 01, 2017 at 01:10AM by heyitsmikeyv
via reddit http://ift.tt/2vcgqx3
http://ift.tt/2udlyfF
Submitted August 01, 2017 at 01:10AM by heyitsmikeyv
via reddit http://ift.tt/2vcgqx3
Michael Veenstra
How Your Terrible Old Password Could Come Back To Haunt You | Michael Veenstra
"daredevi1" There it is, folks. My everything-password from my school days.