seL4 Whitepaper released
https://ift.tt/2ZAjilS
Submitted May 25, 2021 at 08:24PM by -Wilson_Jeffery-
via reddit https://ift.tt/3fHYHTe
https://ift.tt/2ZAjilS
Submitted May 25, 2021 at 08:24PM by -Wilson_Jeffery-
via reddit https://ift.tt/3fHYHTe
sel4.systems
About seL4 | seL4
RCE PoC walkthrough for (CVE-2021–21974) VMware ESXi OpenSLP heap-overflow vulnerability
https://ift.tt/3oVsr3d
Submitted May 25, 2021 at 09:08PM by pwnplusplus
via reddit https://ift.tt/2TlO80R
https://ift.tt/3oVsr3d
Submitted May 25, 2021 at 09:08PM by pwnplusplus
via reddit https://ift.tt/2TlO80R
Medium
My RCE PoC walkthrough for (CVE-2021–21974) VMware ESXi OpenSLP heap-overflow vulnerability
Introduction
Introducing Half-Double: New hammering technique for DRAM Rowhammer bug
https://ift.tt/3bSuKPi
Submitted May 25, 2021 at 11:12PM by Gallus
via reddit https://ift.tt/3oOsfmg
https://ift.tt/3bSuKPi
Submitted May 25, 2021 at 11:12PM by Gallus
via reddit https://ift.tt/3oOsfmg
Google Online Security Blog
Introducing Half-Double: New hammering technique for DRAM Rowhammer bug
Research Team: Salman Qazi, Yoongu Kim, Nicolas Boichat, Eric Shiu & Mattias Nissler Today, we are sharing details around our discovery of ...
OSEP Course Review
https://ift.tt/3ulvDq2
Submitted May 26, 2021 at 12:33AM by mako_sec
via reddit https://ift.tt/3ulvrqT
https://ift.tt/3ulvDq2
Submitted May 26, 2021 at 12:33AM by mako_sec
via reddit https://ift.tt/3ulvrqT
Makosecblog
OSEP Course Review
This post will cover my review of the Offensive Security Enhanced Security
The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting IT Security Firms
https://ift.tt/3oXcr0M
Submitted May 26, 2021 at 01:41AM by tazebot
via reddit https://ift.tt/3fkymvx
https://ift.tt/3oXcr0M
Submitted May 26, 2021 at 01:41AM by tazebot
via reddit https://ift.tt/3fkymvx
ProPublica
The Colonial Pipeline Ransomware Hackers Had a Secret Weapon: Self-Promoting Cybersecurity Firms
Five months before DarkSide attacked the Colonial pipeline, two researchers discovered a way to rescue its ransomware victims. Then an antivirus company’s announcement alerted the hackers.
nginx DNS Resolver Off-by-One Heap Write Vulnerability - CVE-2021-23017
https://ift.tt/3fOwOJr
Submitted May 26, 2021 at 07:04AM by Gallus
via reddit https://ift.tt/2RObkUX
https://ift.tt/3fOwOJr
Submitted May 26, 2021 at 07:04AM by Gallus
via reddit https://ift.tt/2RObkUX
X41 D-SEC
nginx DNS Resolver Off-by-One Heap Write Vulnerability
An off-by-one error in ngx_resolver_copy() while processing DNS responses allows a network attacker to write a dot character (‘.’, 0x2E) out of bounds in a heap allocated buffer.
Authenticated RCE on Pulse Connect Secure
https://ift.tt/3bTkdDv
Submitted May 26, 2021 at 09:11AM by bigbottlequorn
via reddit https://ift.tt/2RDAtlj
https://ift.tt/3bTkdDv
Submitted May 26, 2021 at 09:11AM by bigbottlequorn
via reddit https://ift.tt/2RDAtlj
reddit
Authenticated RCE on Pulse Connect Secure
Posted in r/netsec by u/bigbottlequorn • 0 points and 0 comments
M1RACLES: An Apple M1 covert channel vulnerability
https://m1racles.com/
Submitted May 26, 2021 at 09:33AM by Gallus
via reddit https://ift.tt/3uo4mmC
https://m1racles.com/
Submitted May 26, 2021 at 09:33AM by Gallus
via reddit https://ift.tt/3uo4mmC
M1Racles
M1RACLES: An Apple M1 Vulnerability
M1RACLES (CVE-2021-30747) is a covert channel vulnerability in the Apple Silicon “M1” chip.
Checklist: What Should Be Considered When Ordering a Pentest
https://ift.tt/2T9fO8P
Submitted May 26, 2021 at 05:41PM by HexwayTeam
via reddit https://ift.tt/3wNimbx
https://ift.tt/2T9fO8P
Submitted May 26, 2021 at 05:41PM by HexwayTeam
via reddit https://ift.tt/3wNimbx
Medium
Checklist: What Should Be Considered When Ordering a Pentest
A short guide on choosing a pentest service provider
PSA: Password requirements now don't need complexity and rotation, just length (reminder for anyone not keeping up with NIST SP 800-63-3 current guidance)
https://ift.tt/3fN2rCX
Submitted May 26, 2021 at 09:49PM by ToLayer7AndBeyond
via reddit https://ift.tt/3fo1Oks
https://ift.tt/3fN2rCX
Submitted May 26, 2021 at 09:49PM by ToLayer7AndBeyond
via reddit https://ift.tt/3fo1Oks
Patch Gapping a Safari Type Confusion
https://ift.tt/34kc3Qn
Submitted May 26, 2021 at 10:41PM by more_muscle_aim
via reddit https://ift.tt/3hWtVbR
https://ift.tt/34kc3Qn
Submitted May 26, 2021 at 10:41PM by more_muscle_aim
via reddit https://ift.tt/3hWtVbR
Theori
Patch Gapping a Safari Type Confusion
Safari 14.1 shipped in late April with many new features, including its long-awaited implementation of AudioWorklets. Shortly after, a commit landed in WebKit, fixing an AudioWorklet bug which “crashes Safari”. As it turns out, this is an exploitable type…
Weaponizing CVE-2021-21551 Dell BIOS Driver
https://ift.tt/3oZi5zl
Submitted May 26, 2021 at 11:08PM by ustayready
via reddit https://ift.tt/3vjQ8oh
https://ift.tt/3oZi5zl
Submitted May 26, 2021 at 11:08PM by ustayready
via reddit https://ift.tt/3vjQ8oh
Crowdstrike
CVE-2021-21551: Learning Through Exploitation | CrowdStrike
Using CVE-2021-21551 as an example, learn how adversaries approach weaponizing vulnerabilities, and the technologies that work best to mitigate their tactics.
Detecting DLL Unhooking
https://ift.tt/34h5Q7Q
Submitted May 26, 2021 at 11:29PM by mako_sec
via reddit https://ift.tt/34hXaOq
https://ift.tt/34h5Q7Q
Submitted May 26, 2021 at 11:29PM by mako_sec
via reddit https://ift.tt/34hXaOq
Makosecblog
Detecting Dll Unhooking
Socials Twitter: https://twitter.com/Mako_Sec GitHub: https://github.com/MakoSec
Materials Used x64 Debugger https://x64dbg.com/#start
Frida https://frida.re/
Sysinternals https://docs.microsoft.com/en-us/sysinternals/downloads/
Unhooking DLL…
Materials Used x64 Debugger https://x64dbg.com/#start
Frida https://frida.re/
Sysinternals https://docs.microsoft.com/en-us/sysinternals/downloads/
Unhooking DLL…
Prepr Foundation and CertNexus Partner to Develop IT Skills of the Future
https://ift.tt/3bWlb1N
Submitted May 27, 2021 at 02:13AM by PreprCaitlin
via reddit https://ift.tt/3voQnP2
https://ift.tt/3bWlb1N
Submitted May 27, 2021 at 02:13AM by PreprCaitlin
via reddit https://ift.tt/3voQnP2
Join the Trap Network Discord Server!
https://ift.tt/3oX8M34
Submitted May 27, 2021 at 06:51AM by External-Plus
via reddit https://ift.tt/3fOtcqH
https://ift.tt/3oX8M34
Submitted May 27, 2021 at 06:51AM by External-Plus
via reddit https://ift.tt/3fOtcqH
Discord
Discord - A New Way to Chat with Friends & Communities
Discord is the easiest way to communicate over voice, video, and text. Chat, hang out, and stay close with your friends and communities.
CVE-2021-33564 Argument Injection in Ruby Dragonfly
https://ift.tt/3hWKKUk
Submitted May 27, 2021 at 09:39AM by Gallus
via reddit https://ift.tt/2TmNBf1
https://ift.tt/3hWKKUk
Submitted May 27, 2021 at 09:39AM by Gallus
via reddit https://ift.tt/2TmNBf1
ZX Security
CVE-2021-33564 Argument Injection in Ruby Dragonfly
Introduction During a recent client engagement we discovered an argument injection vulnerability in certain configurations of Refinery CMS. Upon further investigation, it was understood that the root cause of this issue existed in the Ruby Gem Dragonfly,…
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
https://ift.tt/3fI9JaY
Submitted May 27, 2021 at 08:28PM by yarbabin
via reddit https://ift.tt/3oVHTw9
https://ift.tt/3fI9JaY
Submitted May 27, 2021 at 08:28PM by yarbabin
via reddit https://ift.tt/3oVHTw9
PT SWARM
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
Last year our team had to analyze V8 bytecode. Back then, there were no tools in place to decompile such code and facilitate convenient navigation over it. We decided to try writing a processor module for the Ghidra framework. Thanks to the features of the…
Sekura - An Encryption tool heavily inspired by the Rubberhose file system
https://ift.tt/3urtPf2
Submitted May 27, 2021 at 10:37PM by Cookie04_DE
via reddit https://ift.tt/2RIFfOs
https://ift.tt/3urtPf2
Submitted May 27, 2021 at 10:37PM by Cookie04_DE
via reddit https://ift.tt/2RIFfOs
GitHub
GitHub - Cookie04DE/Sekura: Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wi…
Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)). - GitHub - Cookie04DE/Sekura: Encryption tool that's ...
Detecting Rclone – An Effective Tool for Exfiltration - detecting rclone via Sigma rules - which is a precursor step for some threat actors to do their exfil before ransomware deployment
https://ift.tt/3uq3KNE
Submitted May 28, 2021 at 10:18AM by digicat
via reddit https://ift.tt/3fPBMp1
https://ift.tt/3uq3KNE
Submitted May 28, 2021 at 10:18AM by digicat
via reddit https://ift.tt/3fPBMp1
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Write-up: Plone Authenticated RCE (CVE-2021-32633) 🤠
https://ift.tt/34p2sYr
Submitted May 28, 2021 at 10:38AM by InfoSecJanitor
via reddit https://ift.tt/2TkBfE1
https://ift.tt/34p2sYr
Submitted May 28, 2021 at 10:38AM by InfoSecJanitor
via reddit https://ift.tt/2TkBfE1
cyllective Blog
Write-up: Plone Authenticated RCE (CVE-2021-32633)
Join the journey into Plone CMS that lead us to discover an authenticated RCE vulnerability
Reverse Engineering a 5g 'Bioshield'
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
Pentestpartners
Reverse Engineering a 5g ‘Bioshield’ | Pen Test Partners
Six months ago the UK’s Glastonbury Town Council set up a 5g Advisory Committee to explore the safety of the technology, and last month the local paper reported their findings. […]