Patch Gapping a Safari Type Confusion
https://ift.tt/34kc3Qn
Submitted May 26, 2021 at 10:41PM by more_muscle_aim
via reddit https://ift.tt/3hWtVbR
https://ift.tt/34kc3Qn
Submitted May 26, 2021 at 10:41PM by more_muscle_aim
via reddit https://ift.tt/3hWtVbR
Theori
Patch Gapping a Safari Type Confusion
Safari 14.1 shipped in late April with many new features, including its long-awaited implementation of AudioWorklets. Shortly after, a commit landed in WebKit, fixing an AudioWorklet bug which “crashes Safari”. As it turns out, this is an exploitable type…
Weaponizing CVE-2021-21551 Dell BIOS Driver
https://ift.tt/3oZi5zl
Submitted May 26, 2021 at 11:08PM by ustayready
via reddit https://ift.tt/3vjQ8oh
https://ift.tt/3oZi5zl
Submitted May 26, 2021 at 11:08PM by ustayready
via reddit https://ift.tt/3vjQ8oh
Crowdstrike
CVE-2021-21551: Learning Through Exploitation | CrowdStrike
Using CVE-2021-21551 as an example, learn how adversaries approach weaponizing vulnerabilities, and the technologies that work best to mitigate their tactics.
Detecting DLL Unhooking
https://ift.tt/34h5Q7Q
Submitted May 26, 2021 at 11:29PM by mako_sec
via reddit https://ift.tt/34hXaOq
https://ift.tt/34h5Q7Q
Submitted May 26, 2021 at 11:29PM by mako_sec
via reddit https://ift.tt/34hXaOq
Makosecblog
Detecting Dll Unhooking
Socials Twitter: https://twitter.com/Mako_Sec GitHub: https://github.com/MakoSec
Materials Used x64 Debugger https://x64dbg.com/#start
Frida https://frida.re/
Sysinternals https://docs.microsoft.com/en-us/sysinternals/downloads/
Unhooking DLL…
Materials Used x64 Debugger https://x64dbg.com/#start
Frida https://frida.re/
Sysinternals https://docs.microsoft.com/en-us/sysinternals/downloads/
Unhooking DLL…
Prepr Foundation and CertNexus Partner to Develop IT Skills of the Future
https://ift.tt/3bWlb1N
Submitted May 27, 2021 at 02:13AM by PreprCaitlin
via reddit https://ift.tt/3voQnP2
https://ift.tt/3bWlb1N
Submitted May 27, 2021 at 02:13AM by PreprCaitlin
via reddit https://ift.tt/3voQnP2
Join the Trap Network Discord Server!
https://ift.tt/3oX8M34
Submitted May 27, 2021 at 06:51AM by External-Plus
via reddit https://ift.tt/3fOtcqH
https://ift.tt/3oX8M34
Submitted May 27, 2021 at 06:51AM by External-Plus
via reddit https://ift.tt/3fOtcqH
Discord
Discord - A New Way to Chat with Friends & Communities
Discord is the easiest way to communicate over voice, video, and text. Chat, hang out, and stay close with your friends and communities.
CVE-2021-33564 Argument Injection in Ruby Dragonfly
https://ift.tt/3hWKKUk
Submitted May 27, 2021 at 09:39AM by Gallus
via reddit https://ift.tt/2TmNBf1
https://ift.tt/3hWKKUk
Submitted May 27, 2021 at 09:39AM by Gallus
via reddit https://ift.tt/2TmNBf1
ZX Security
CVE-2021-33564 Argument Injection in Ruby Dragonfly
Introduction During a recent client engagement we discovered an argument injection vulnerability in certain configurations of Refinery CMS. Upon further investigation, it was understood that the root cause of this issue existed in the Ruby Gem Dragonfly,…
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
https://ift.tt/3fI9JaY
Submitted May 27, 2021 at 08:28PM by yarbabin
via reddit https://ift.tt/3oVHTw9
https://ift.tt/3fI9JaY
Submitted May 27, 2021 at 08:28PM by yarbabin
via reddit https://ift.tt/3oVHTw9
PT SWARM
Creating a Ghidra processor module in SLEIGH using V8 bytecode as an example
Last year our team had to analyze V8 bytecode. Back then, there were no tools in place to decompile such code and facilitate convenient navigation over it. We decided to try writing a processor module for the Ghidra framework. Thanks to the features of the…
Sekura - An Encryption tool heavily inspired by the Rubberhose file system
https://ift.tt/3urtPf2
Submitted May 27, 2021 at 10:37PM by Cookie04_DE
via reddit https://ift.tt/2RIFfOs
https://ift.tt/3urtPf2
Submitted May 27, 2021 at 10:37PM by Cookie04_DE
via reddit https://ift.tt/2RIFfOs
GitHub
GitHub - Cookie04DE/Sekura: Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wi…
Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)). - GitHub - Cookie04DE/Sekura: Encryption tool that's ...
Detecting Rclone – An Effective Tool for Exfiltration - detecting rclone via Sigma rules - which is a precursor step for some threat actors to do their exfil before ransomware deployment
https://ift.tt/3uq3KNE
Submitted May 28, 2021 at 10:18AM by digicat
via reddit https://ift.tt/3fPBMp1
https://ift.tt/3uq3KNE
Submitted May 28, 2021 at 10:18AM by digicat
via reddit https://ift.tt/3fPBMp1
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Write-up: Plone Authenticated RCE (CVE-2021-32633) 🤠
https://ift.tt/34p2sYr
Submitted May 28, 2021 at 10:38AM by InfoSecJanitor
via reddit https://ift.tt/2TkBfE1
https://ift.tt/34p2sYr
Submitted May 28, 2021 at 10:38AM by InfoSecJanitor
via reddit https://ift.tt/2TkBfE1
cyllective Blog
Write-up: Plone Authenticated RCE (CVE-2021-32633)
Join the journey into Plone CMS that lead us to discover an authenticated RCE vulnerability
Reverse Engineering a 5g 'Bioshield'
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
Pentestpartners
Reverse Engineering a 5g ‘Bioshield’ | Pen Test Partners
Six months ago the UK’s Glastonbury Town Council set up a 5g Advisory Committee to explore the safety of the technology, and last month the local paper reported their findings. […]
Abusing LNK "Features" for Initial Access and Persistence
https://ift.tt/34tSEwi
Submitted May 28, 2021 at 07:32PM by v3ded
via reddit https://ift.tt/3i0RNeO
https://ift.tt/34tSEwi
Submitted May 28, 2021 at 07:32PM by v3ded
via reddit https://ift.tt/3i0RNeO
v3ded.github.io
Abusing LNK "Features" for Initial Access and Persistence
Preface Today we’ll talk about the misuse of .LNK trigger keys as a means of achieving initial access and persistence. I first heard about this topic myself ...
The Race to Native Code Execution in Siemens PLCs
https://ift.tt/3vwmdZX
Submitted May 29, 2021 at 12:21AM by n0llbyte
via reddit https://ift.tt/2TrXJmI
https://ift.tt/3vwmdZX
Submitted May 29, 2021 at 12:21AM by n0llbyte
via reddit https://ift.tt/2TrXJmI
Claroty
The Race to Native Code Execution in Siemens PLCs
Claroty has found a memory protection bypass vulnerability in Siemens SIMATIC S7-1200 and S7-1500 PLCs that enables native code execution.
Reverse engineered Opera VPN client
https://ift.tt/3deHU9d
Submitted May 30, 2021 at 01:57AM by yarmak
via reddit https://ift.tt/3wISFbT
https://ift.tt/3deHU9d
Submitted May 30, 2021 at 01:57AM by yarmak
via reddit https://ift.tt/3wISFbT
GitHub
GitHub - Snawoot/opera-proxy: Standalone client for proxies of Opera VPN
Standalone client for proxies of Opera VPN. Contribute to Snawoot/opera-proxy development by creating an account on GitHub.
“Half-Double”: Next-Row-Over Assisted Rowhammer: demonstrates a new attack that bypasses row hammer defenses. It is based on a discovery of weak coupling between two rows that are not immediately adjacent to each other but one row removed.
https://ift.tt/3c6mT0J
Submitted May 30, 2021 at 02:38PM by digicat
via reddit https://ift.tt/3yM4mAp
https://ift.tt/3c6mT0J
Submitted May 30, 2021 at 02:38PM by digicat
via reddit https://ift.tt/3yM4mAp
GitHub
hammer-kit/20210525_half_double.pdf at main · google/hammer-kit
Contribute to google/hammer-kit development by creating an account on GitHub.
Write-up: runc mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs (CVE-2021-30465)
https://ift.tt/3p2DTu1
Submitted May 30, 2021 at 11:22PM by champtar
via reddit https://ift.tt/3uB5R0Q
https://ift.tt/3p2DTu1
Submitted May 30, 2021 at 11:22PM by champtar
via reddit https://ift.tt/3uB5R0Q
Trivial file transfer between separate VMs executed on the same host by modulating the CPU load. This is intended as an illustration for the M1RACLES discussion, to support the point that the M1's system register does not add new means of data exchange and is not a real vulnerability
https://ift.tt/3fUPyXI
Submitted May 31, 2021 at 02:41AM by spym_
via reddit https://ift.tt/2R6zQAl
https://ift.tt/3fUPyXI
Submitted May 31, 2021 at 02:41AM by spym_
via reddit https://ift.tt/2R6zQAl
GitHub
GitHub - pavel-kirienko/cpu-load-side-channel: Side-channel file transfer between independent VMs or processes executed on the…
Side-channel file transfer between independent VMs or processes executed on the same physical host. - GitHub - pavel-kirienko/cpu-load-side-channel: Side-channel file transfer between independent V...
Playing with ImageTragick like it's 2016
https://ift.tt/3p3kF7o
Submitted May 31, 2021 at 07:26AM by Gallus
via reddit https://ift.tt/34wPact
https://ift.tt/3p3kF7o
Submitted May 31, 2021 at 07:26AM by Gallus
via reddit https://ift.tt/34wPact
Synacktiv
Playing with ImageTragick like it's 2016
You probably already have encountered document converting features that deal with ImageMagick during engagements but for some reason you were not able to exploit them. This article will mention some t
CVE-2021-21985 (another NSE quick checker)
https://ift.tt/2TuDp49
Submitted May 31, 2021 at 11:24AM by alt3kx
via reddit https://ift.tt/2TwbssI
https://ift.tt/2TuDp49
Submitted May 31, 2021 at 11:24AM by alt3kx
via reddit https://ift.tt/2TwbssI
GitHub
GitHub - alt3kx/CVE-2021-21985_PoC
Contribute to alt3kx/CVE-2021-21985_PoC development by creating an account on GitHub.
HardenedVault's whitepaper on building the digital bunker
https://ift.tt/3vBnAql
Submitted May 31, 2021 at 11:58AM by hardenedvault
via reddit https://ift.tt/3fPJfo0
https://ift.tt/3vBnAql
Submitted May 31, 2021 at 11:58AM by hardenedvault
via reddit https://ift.tt/3fPJfo0
Analysis report of the Facefish rootkit
https://ift.tt/2TmWuFn
Submitted May 31, 2021 at 12:41PM by c0r3dump3d
via reddit https://ift.tt/2S0JmoV
https://ift.tt/2TmWuFn
Submitted May 31, 2021 at 12:41PM by c0r3dump3d
via reddit https://ift.tt/2S0JmoV
360 Netlab Blog - Network Security Research Lab at 360
Analysis report of the Facefish rootkit
Background
In Feb 2021, we came across an ELF sample using some CWP’s Ndays exploits, we did some analysis, but after checking with a partner who has some nice visibility in network traffic in some China areas, we discovered there is literarily 0 hit for…
In Feb 2021, we came across an ELF sample using some CWP’s Ndays exploits, we did some analysis, but after checking with a partner who has some nice visibility in network traffic in some China areas, we discovered there is literarily 0 hit for…