WiFiBeat: Store 802.11 frames in Elasticsearch Visualize with Kibana
http://ift.tt/2vczlaM
Submitted August 01, 2017 at 07:00AM by p339
via reddit http://ift.tt/2hiwhEw
http://ift.tt/2vczlaM
Submitted August 01, 2017 at 07:00AM by p339
via reddit http://ift.tt/2hiwhEw
WiFiBeat
Store 802.11 frames in Elasticsearch. Visualize them with Kibana.
I wrote this post about HSTS.
http://ift.tt/2rYxYdR
Submitted August 01, 2017 at 02:03PM by MicheeLengronne
via reddit http://ift.tt/2f4bFyV
http://ift.tt/2rYxYdR
Submitted August 01, 2017 at 02:03PM by MicheeLengronne
via reddit http://ift.tt/2f4bFyV
Limawi
SSL/TLS and HSTS, what is that ?
Our websites are made safe with https. That means that we use SSL/TLS. But what is that ? And what is the HSTS extension ?
Cobalt strikes back: an evolving multinational threat to finance
http://ift.tt/2uTolww
Submitted August 01, 2017 at 01:55PM by alexlash
via reddit http://ift.tt/2f4bGTv
http://ift.tt/2uTolww
Submitted August 01, 2017 at 01:55PM by alexlash
via reddit http://ift.tt/2f4bGTv
Ptsecurity
Cobalt strikes back: an evolving multinational threat to finance
1. Introduction Bank robbery is perhaps the quintessential crime. The promise of immense, instant riches has lured many a criminal to tar...
[Pay What You Want] WiFi Pentesting and Security eBook
https://gum.co/nGMWf
Submitted August 01, 2017 at 01:48PM by rootsh3ll
via reddit http://ift.tt/2ufCLVQ
https://gum.co/nGMWf
Submitted August 01, 2017 at 01:48PM by rootsh3ll
via reddit http://ift.tt/2ufCLVQ
Gumroad
Kali Linux Wireless Pentesting and Security eBook
For eye friendly product denoscription, go here. In this 165+ Pages eBook you will Learn: 1. Kali Linux Installation. 2. Configuring the wireless card3. Basics of Wi-Fi networks. 4. Cracking the Wire...
Exploiting Second Order SQLi Flaws by using Burp & Custom Sqlmap Tamper
http://ift.tt/2voZkMS
Submitted August 01, 2017 at 04:19PM by wtfse
via reddit http://ift.tt/2whwZnY
http://ift.tt/2voZkMS
Submitted August 01, 2017 at 04:19PM by wtfse
via reddit http://ift.tt/2whwZnY
UK home secretary Amber Rudd says 'real people' don't need end-to-end encryption
http://ift.tt/2viNLGi
Submitted August 01, 2017 at 03:52PM by Reece-Happi
via reddit http://ift.tt/2ug3DVK
http://ift.tt/2viNLGi
Submitted August 01, 2017 at 03:52PM by Reece-Happi
via reddit http://ift.tt/2ug3DVK
Business Insider
UK home secretary Amber Rudd says 'real people' don't need end-to-end encryption
The Conservative minister argues that the security measure aids terrorists, and wants WhatsApp and others to voluntarily stop using it.
Rooting the Amazon Echo
http://ift.tt/2tUV1o2
Submitted August 01, 2017 at 05:49PM by juken
via reddit http://ift.tt/2ufKZwY
http://ift.tt/2tUV1o2
Submitted August 01, 2017 at 05:49PM by juken
via reddit http://ift.tt/2ufKZwY
Startcom CA reapplies for inclusion in Mozilla Firefox/Suite
http://ift.tt/2w26GTu
Submitted August 01, 2017 at 07:52PM by Kinost
via reddit http://ift.tt/2f4k1qx
http://ift.tt/2w26GTu
Submitted August 01, 2017 at 07:52PM by Kinost
via reddit http://ift.tt/2f4k1qx
bugzilla.mozilla.org
1311832 - StartCom: Action Items
An extra bit of analysis for cLEMENCy, the DEFCON CTF architecture
http://ift.tt/2eZvHdY
Submitted August 01, 2017 at 08:27PM by ryan0rz
via reddit http://ift.tt/2veOtoa
http://ift.tt/2eZvHdY
Submitted August 01, 2017 at 08:27PM by ryan0rz
via reddit http://ift.tt/2veOtoa
Trail of Bits Blog
An extra bit of analysis for Clemency
This year’s DEF CON CTF used a unique hardware architecture, cLEMENCy, and only released a specification and reference tooling for it 24 hours before the final event began. cLEMENCy was purposefull…
Silently Fixed Unauthorized Command Injection in WAGO PLC Ethernet
http://ift.tt/2wibHGH
Submitted August 01, 2017 at 07:27PM by cbolat
via reddit http://ift.tt/2uSm9Hh
http://ift.tt/2wibHGH
Submitted August 01, 2017 at 07:27PM by cbolat
via reddit http://ift.tt/2uSm9Hh
cbolat.blogspot.co.uk
Silently Fixed Unauthorized Command Injection in WAGO PLC Ethernet
Canberk Bolat, Information Security Researcher
CableTap White Paper - 26 CVEs for exploiting cable modems and set top boxes
http://ift.tt/2vpPNoU
Submitted August 01, 2017 at 10:02PM by but_im_made_of_lava
via reddit http://ift.tt/2f5YduB
http://ift.tt/2vpPNoU
Submitted August 01, 2017 at 10:02PM by but_im_made_of_lava
via reddit http://ift.tt/2f5YduB
GitHub
BastilleResearch/CableTap
CableTap public disclosure documents.
Detection and response platform Helix boosts FireEye's product subnoscription sales to $86 million
http://ift.tt/2uhARnB
Submitted August 02, 2017 at 02:40AM by Madhan58
via reddit http://ift.tt/2vlm1Aw
http://ift.tt/2uhARnB
Submitted August 02, 2017 at 02:40AM by Madhan58
via reddit http://ift.tt/2vlm1Aw
AlphaStreet.com
FEYE - Infographic
AlphaStreet is a complete social ecosystem that significantly reduces the complexity and friction in making investment decisions.
Extract passwords from TeamViewer memory using Frida
http://ift.tt/2u1zH4z
Submitted August 02, 2017 at 03:46AM by vah_13
via reddit http://ift.tt/2uhz1TD
http://ift.tt/2u1zH4z
Submitted August 02, 2017 at 03:46AM by vah_13
via reddit http://ift.tt/2uhz1TD
GitHub
vah13/extractTVpasswords
extractTVpasswords - tool to extract passwords from TeamViewer memory using Frida
Evading Machine Learning Malware Detection
http://ift.tt/2uTtCpj
Submitted August 02, 2017 at 11:37AM by UmamiSalami
via reddit http://ift.tt/2vn2C26
http://ift.tt/2uTtCpj
Submitted August 02, 2017 at 11:37AM by UmamiSalami
via reddit http://ift.tt/2vn2C26
A quick look at an Android RAT named DroidJack. This article describes what it can do and how to detect it. If you're an Android user, you're going to want to read this...
http://ift.tt/2hmDtiP
Submitted August 02, 2017 at 01:16PM by InfoSecJim
via reddit http://ift.tt/2w5eTXa
http://ift.tt/2hmDtiP
Submitted August 02, 2017 at 01:16PM by InfoSecJim
via reddit http://ift.tt/2w5eTXa
Jim Wilbur's Blog
DroidJack- A Look at an Android RAT
A quick look at DroidJack an Android RAT. DroidJack is a RAT that can build and bind Android Packages (APK) for install on any Android device.
A quick look at an Android RAT named DroidJack. This article explains what it can do and how to detect its use. Key take-aways 1. Don't check the allow unknown sources checkbox and 2. Install AV
http://ift.tt/2hmDtiP
Submitted August 02, 2017 at 02:16PM by InfoSecJim
via reddit http://ift.tt/2uiZ1y0
http://ift.tt/2hmDtiP
Submitted August 02, 2017 at 02:16PM by InfoSecJim
via reddit http://ift.tt/2uiZ1y0
Jim Wilbur's Blog
DroidJack- A Look at an Android RAT
A quick look at DroidJack an Android RAT. DroidJack is a RAT that can build and bind Android Packages (APK) for install on any Android device.
Vocabularies to describe Exploit-Kit, adversary groups or threat actors...
http://ift.tt/2tYum9R
Submitted August 02, 2017 at 02:40PM by adulau
via reddit http://ift.tt/2tYTpd6
http://ift.tt/2tYum9R
Submitted August 02, 2017 at 02:40PM by adulau
via reddit http://ift.tt/2tYTpd6
Client-side injection vectors in ReactJS apps: Elements, props, and other good friends
http://ift.tt/2u33ytp
Submitted August 02, 2017 at 03:35PM by berndtzl
via reddit http://ift.tt/2u3hSBP
http://ift.tt/2u33ytp
Submitted August 02, 2017 at 03:35PM by berndtzl
via reddit http://ift.tt/2u3hSBP
Medium
Exploiting Script Injection Flaws in ReactJS Apps
ReactJS is a popular JavaScript library for building user interfaces. It enables client-rendered, “rich” web apps that load entirely…
OnePlus 2 Lack of SBL1 Validation, Broken Secure Boot (CVE-2017-11105)
http://ift.tt/2uSr0YQ
Submitted August 02, 2017 at 07:10PM by dv80
via reddit http://ift.tt/2uYVmY7
http://ift.tt/2uSr0YQ
Submitted August 02, 2017 at 07:10PM by dv80
via reddit http://ift.tt/2uYVmY7
alephsecurity.github.io
CVE-2017-11105
OnePlus 2 Lack of SBL1 Validation Broken Secure Boot
From BlackEnergy to ExPetr
http://ift.tt/2t0g9eL
Submitted August 02, 2017 at 09:59PM by QuirkySpiceBush
via reddit http://ift.tt/2f9njZr
http://ift.tt/2t0g9eL
Submitted August 02, 2017 at 09:59PM by QuirkySpiceBush
via reddit http://ift.tt/2f9njZr
Securelist
From BlackEnergy to ExPetr
To date, nobody has been able to find any significant code sharing between ExPetr/Petya and older malware. Given our love for unsolved mysteries, we jumped right on it. We’d like to think of this ongoing research as an opportunity for an open invitation to…
BEAST: An Explanation of the CBC Padding Oracle Attack on TLS
https://www.youtube.com/watch?v=-_8-2pDFvmg
Submitted August 02, 2017 at 06:36PM by davidw_-
via reddit http://ift.tt/2hoACWE
https://www.youtube.com/watch?v=-_8-2pDFvmg
Submitted August 02, 2017 at 06:36PM by davidw_-
via reddit http://ift.tt/2hoACWE
YouTube
BEAST: An Explanation of the CBC Attack on TLS
This is an explanation of the BEAST attack. For more details, check this blog: http://commandlinefanatic.com/cgi-bin/showarticle.cgi?article=art027