PoC malware that exfils data (from air-gapped-like environments) via triggering AV on the endpoint and then communicating back from the AV's cloud (BlackHat 2017 & DEF CON 25)
http://ift.tt/2u6l0Z6
Submitted July 29, 2017 at 09:55AM by ikotler
via reddit http://ift.tt/2w8kBGM
http://ift.tt/2u6l0Z6
Submitted July 29, 2017 at 09:55AM by ikotler
via reddit http://ift.tt/2w8kBGM
GitHub
SafeBreach-Labs/spacebin
spacebin - Spacebin is a proof-of-concept malware that exfiltrates data (from air-gapped-like environments) via triggering AV on the endpoint and then communicating back from the AV's cloud com...
The automated vBulletin ForumRunner exploit (CVE-2016-6195), with added hash-cracking fun!
http://ift.tt/2uGW7Xd
Submitted July 29, 2017 at 11:24AM by datanoid
via reddit http://ift.tt/2u6t1xa
http://ift.tt/2uGW7Xd
Submitted July 29, 2017 at 11:24AM by datanoid
via reddit http://ift.tt/2u6t1xa
GitHub
drewlong/vbully
vbully - 3.8.x - 4.2.3 ForumRunner (vBulletin) exploit made easy.
PDF materials and presentations from DEF CON 25 (2017)
http://ift.tt/2v7iTbK
Submitted July 30, 2017 at 03:34AM by campuscodi
via reddit http://ift.tt/2u8ksC1
http://ift.tt/2v7iTbK
Submitted July 30, 2017 at 03:34AM by campuscodi
via reddit http://ift.tt/2u8ksC1
media.defcon.org
DEF CON Media Server
Started in 1992 by the Dark Tangent, DEF CON is the world's longest running and largest underground hacking conference. Hackers, corporate IT professionals, and three letter government agencies all converge on Las Vegas every summer to absorb cutting edge…
Man-in-the-middle wireless access point inside a docker container
http://ift.tt/2tTjWws
Submitted July 30, 2017 at 06:34AM by brannondorsey
via reddit http://ift.tt/2eX3Jzx
http://ift.tt/2tTjWws
Submitted July 30, 2017 at 06:34AM by brannondorsey
via reddit http://ift.tt/2eX3Jzx
GitHub
brannondorsey/mitm-router
mitm-router - ☠ Man-in-the-middle wireless access point inside a docker container 🐳
DefCon - Jailbreaking Apple Watch by Max Bazaliy [slides]
http://ift.tt/2w46KBr
Submitted July 30, 2017 at 04:47PM by rootsh3ll
via reddit http://ift.tt/2hcE9Ya
http://ift.tt/2w46KBr
Submitted July 30, 2017 at 04:47PM by rootsh3ll
via reddit http://ift.tt/2hcE9Ya
Speaker Deck
Jailbreaking Apple Watch
DEFCON 25, Las Vegas, NV
Attacking File Shares
http://ift.tt/2v9w6AW
Submitted July 30, 2017 at 11:05PM by ConfChar
via reddit http://ift.tt/2tOIP8r
http://ift.tt/2v9w6AW
Submitted July 30, 2017 at 11:05PM by ConfChar
via reddit http://ift.tt/2tOIP8r
GitHub
FransHBotes/shareAttack
shareAttack - Automatically attack all file shares within AD network environment. Exploiting weak permissions.
How to turn Photoshop into a remote access tool
http://ift.tt/2vVFJAZ
Submitted July 31, 2017 at 12:20AM by CodeColorist
via reddit http://ift.tt/2hetIDx
http://ift.tt/2vVFJAZ
Submitted July 31, 2017 at 12:20AM by CodeColorist
via reddit http://ift.tt/2hetIDx
Medium
How to turn Photoshop into a remote access tool – 0xCC – Medium
Photoshop has an optional feature named Remote Connections. It’s disabled by default, but when you turn this on and set the password…
Koadic: advanced Windows post-exploitation rootkit based on Windows Script Host
http://ift.tt/2uLU4kH
Submitted July 31, 2017 at 02:45AM by 0xdea
via reddit http://ift.tt/2hePIhp
http://ift.tt/2uLU4kH
Submitted July 31, 2017 at 02:45AM by 0xdea
via reddit http://ift.tt/2hePIhp
GitHub
zerosum0x0/koadic
koadic - Koadic C3 COM Command & Control - JScript RAT
Ethereum Breakdown: The Parity Multisig Exploit ($32 million theft)
https://www.youtube.com/watch?v=VUH4gRDQYsA
Submitted July 30, 2017 at 11:48AM by alanforts
via reddit http://ift.tt/2eZQcav
https://www.youtube.com/watch?v=VUH4gRDQYsA
Submitted July 30, 2017 at 11:48AM by alanforts
via reddit http://ift.tt/2eZQcav
YouTube
Ethereum Breakdown: The Parity Multisig Exploit ($32 million theft)
Last Tuesday, an unknown hacker sent a series of malicious transactions to three separate Ethereum ICO contracts and managed to steal $32 million worth of Ether. The transactions exploited a bug in the Parity Multisig Wallet contract. But what exactly was…
[Updated] How to turn Photoshop into a remote access tool
http://ift.tt/2wcKCVJ
Submitted July 31, 2017 at 01:04PM by CodeColorist
via reddit http://ift.tt/2uMtM1L
http://ift.tt/2wcKCVJ
Submitted July 31, 2017 at 01:04PM by CodeColorist
via reddit http://ift.tt/2uMtM1L
Medium
How to turn Photoshop into a remote access tool
Sorry for taking down the previous post. In this morning I thought that there was something important I missed. To responsibly disclosure…
Volatility, my own cheatsheet (Part 6): Windows Registry
http://ift.tt/2wcZIdE
Submitted July 31, 2017 at 06:23PM by maxxori
via reddit http://ift.tt/2vXFZPR
http://ift.tt/2wcZIdE
Submitted July 31, 2017 at 06:23PM by maxxori
via reddit http://ift.tt/2vXFZPR
So Long, and Thanks for All the Fish
Volatility, my own cheatsheet (Part 6): Windows Registry
The infamous Windows Registry
Hacking Voting Machines at DEF CON 25
http://ift.tt/2tWC20i
Submitted July 31, 2017 at 06:22PM by Extremite
via reddit http://ift.tt/2uN8r8J
http://ift.tt/2tWC20i
Submitted July 31, 2017 at 06:22PM by Extremite
via reddit http://ift.tt/2uN8r8J
TJ's Blog
Hacking Voting Machines at DEF CON 25
Let's rig some elections.
SensePost | Linux heap exploitation intro series: Used and Abused - use-after-free [mini-challenge inside]
http://ift.tt/2uJiAD4
Submitted July 31, 2017 at 10:25PM by NeomindMusic
via reddit http://ift.tt/2f1XtXk
http://ift.tt/2uJiAD4
Submitted July 31, 2017 at 10:25PM by NeomindMusic
via reddit http://ift.tt/2f1XtXk
Sensepost
SensePost | Linux heap exploitation intro series: used and abused – use after free
Leaders in Information Security
The adventures of xss vectors in curious places
http://ift.tt/2v9bkBr
Submitted July 30, 2017 at 09:55PM by i_bo0om
via reddit http://ift.tt/2vmlMpI
http://ift.tt/2v9bkBr
Submitted July 30, 2017 at 09:55PM by i_bo0om
via reddit http://ift.tt/2vmlMpI
reddit
The adventures of xss vectors in curious places • r/netsec
1 points and 0 comments so far on reddit
We all use perfectly entropic, 48-character passwords for every account we own, obviously. But did you always? I sure didn't.
http://ift.tt/2udlyfF
Submitted August 01, 2017 at 01:10AM by heyitsmikeyv
via reddit http://ift.tt/2vcgqx3
http://ift.tt/2udlyfF
Submitted August 01, 2017 at 01:10AM by heyitsmikeyv
via reddit http://ift.tt/2vcgqx3
Michael Veenstra
How Your Terrible Old Password Could Come Back To Haunt You | Michael Veenstra
"daredevi1" There it is, folks. My everything-password from my school days.
BadIntent: Integrating Android with Burp
http://ift.tt/2gQYimo
Submitted August 01, 2017 at 01:08AM by mat3_
via reddit http://ift.tt/2hid2uR
http://ift.tt/2gQYimo
Submitted August 01, 2017 at 01:08AM by mat3_
via reddit http://ift.tt/2hid2uR
GitHub
mateuszk87/BadIntent
BadIntent - Intercept, modify, repeat and attack Android's Binder transactions using Burp Suite
Reverse Engineering a JavaScript Obfuscated Dropper
http://ift.tt/2uN6IQt
Submitted July 31, 2017 at 06:35PM by splinter_code
via reddit http://ift.tt/2w0dlgO
http://ift.tt/2uN6IQt
Submitted July 31, 2017 at 06:35PM by splinter_code
via reddit http://ift.tt/2w0dlgO
InfoSec Resources
Reverse Engineering a JavaScript Obfuscated Dropper
1. Introduction Nowadays one of the techniques most used to spread malware on windows systems is using a JavaScript (js) dropper. A js dropper represents,
WiFiBeat: Store 802.11 frames in Elasticsearch Visualize with Kibana
http://ift.tt/2vczlaM
Submitted August 01, 2017 at 07:00AM by p339
via reddit http://ift.tt/2hiwhEw
http://ift.tt/2vczlaM
Submitted August 01, 2017 at 07:00AM by p339
via reddit http://ift.tt/2hiwhEw
WiFiBeat
Store 802.11 frames in Elasticsearch. Visualize them with Kibana.
I wrote this post about HSTS.
http://ift.tt/2rYxYdR
Submitted August 01, 2017 at 02:03PM by MicheeLengronne
via reddit http://ift.tt/2f4bFyV
http://ift.tt/2rYxYdR
Submitted August 01, 2017 at 02:03PM by MicheeLengronne
via reddit http://ift.tt/2f4bFyV
Limawi
SSL/TLS and HSTS, what is that ?
Our websites are made safe with https. That means that we use SSL/TLS. But what is that ? And what is the HSTS extension ?
Cobalt strikes back: an evolving multinational threat to finance
http://ift.tt/2uTolww
Submitted August 01, 2017 at 01:55PM by alexlash
via reddit http://ift.tt/2f4bGTv
http://ift.tt/2uTolww
Submitted August 01, 2017 at 01:55PM by alexlash
via reddit http://ift.tt/2f4bGTv
Ptsecurity
Cobalt strikes back: an evolving multinational threat to finance
1. Introduction Bank robbery is perhaps the quintessential crime. The promise of immense, instant riches has lured many a criminal to tar...
[Pay What You Want] WiFi Pentesting and Security eBook
https://gum.co/nGMWf
Submitted August 01, 2017 at 01:48PM by rootsh3ll
via reddit http://ift.tt/2ufCLVQ
https://gum.co/nGMWf
Submitted August 01, 2017 at 01:48PM by rootsh3ll
via reddit http://ift.tt/2ufCLVQ
Gumroad
Kali Linux Wireless Pentesting and Security eBook
For eye friendly product denoscription, go here. In this 165+ Pages eBook you will Learn: 1. Kali Linux Installation. 2. Configuring the wireless card3. Basics of Wi-Fi networks. 4. Cracking the Wire...