Reverse Engineering a 5g 'Bioshield'
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
https://ift.tt/3es2QbA
Submitted May 28, 2021 at 02:27PM by ChariseVillatoro
via reddit https://ift.tt/3fPoKI9
Pentestpartners
Reverse Engineering a 5g ‘Bioshield’ | Pen Test Partners
Six months ago the UK’s Glastonbury Town Council set up a 5g Advisory Committee to explore the safety of the technology, and last month the local paper reported their findings. […]
Abusing LNK "Features" for Initial Access and Persistence
https://ift.tt/34tSEwi
Submitted May 28, 2021 at 07:32PM by v3ded
via reddit https://ift.tt/3i0RNeO
https://ift.tt/34tSEwi
Submitted May 28, 2021 at 07:32PM by v3ded
via reddit https://ift.tt/3i0RNeO
v3ded.github.io
Abusing LNK "Features" for Initial Access and Persistence
Preface Today we’ll talk about the misuse of .LNK trigger keys as a means of achieving initial access and persistence. I first heard about this topic myself ...
The Race to Native Code Execution in Siemens PLCs
https://ift.tt/3vwmdZX
Submitted May 29, 2021 at 12:21AM by n0llbyte
via reddit https://ift.tt/2TrXJmI
https://ift.tt/3vwmdZX
Submitted May 29, 2021 at 12:21AM by n0llbyte
via reddit https://ift.tt/2TrXJmI
Claroty
The Race to Native Code Execution in Siemens PLCs
Claroty has found a memory protection bypass vulnerability in Siemens SIMATIC S7-1200 and S7-1500 PLCs that enables native code execution.
Reverse engineered Opera VPN client
https://ift.tt/3deHU9d
Submitted May 30, 2021 at 01:57AM by yarmak
via reddit https://ift.tt/3wISFbT
https://ift.tt/3deHU9d
Submitted May 30, 2021 at 01:57AM by yarmak
via reddit https://ift.tt/3wISFbT
GitHub
GitHub - Snawoot/opera-proxy: Standalone client for proxies of Opera VPN
Standalone client for proxies of Opera VPN. Contribute to Snawoot/opera-proxy development by creating an account on GitHub.
“Half-Double”: Next-Row-Over Assisted Rowhammer: demonstrates a new attack that bypasses row hammer defenses. It is based on a discovery of weak coupling between two rows that are not immediately adjacent to each other but one row removed.
https://ift.tt/3c6mT0J
Submitted May 30, 2021 at 02:38PM by digicat
via reddit https://ift.tt/3yM4mAp
https://ift.tt/3c6mT0J
Submitted May 30, 2021 at 02:38PM by digicat
via reddit https://ift.tt/3yM4mAp
GitHub
hammer-kit/20210525_half_double.pdf at main · google/hammer-kit
Contribute to google/hammer-kit development by creating an account on GitHub.
Write-up: runc mount destinations can be swapped via symlink-exchange to cause mounts outside the rootfs (CVE-2021-30465)
https://ift.tt/3p2DTu1
Submitted May 30, 2021 at 11:22PM by champtar
via reddit https://ift.tt/3uB5R0Q
https://ift.tt/3p2DTu1
Submitted May 30, 2021 at 11:22PM by champtar
via reddit https://ift.tt/3uB5R0Q
Trivial file transfer between separate VMs executed on the same host by modulating the CPU load. This is intended as an illustration for the M1RACLES discussion, to support the point that the M1's system register does not add new means of data exchange and is not a real vulnerability
https://ift.tt/3fUPyXI
Submitted May 31, 2021 at 02:41AM by spym_
via reddit https://ift.tt/2R6zQAl
https://ift.tt/3fUPyXI
Submitted May 31, 2021 at 02:41AM by spym_
via reddit https://ift.tt/2R6zQAl
GitHub
GitHub - pavel-kirienko/cpu-load-side-channel: Side-channel file transfer between independent VMs or processes executed on the…
Side-channel file transfer between independent VMs or processes executed on the same physical host. - GitHub - pavel-kirienko/cpu-load-side-channel: Side-channel file transfer between independent V...
Playing with ImageTragick like it's 2016
https://ift.tt/3p3kF7o
Submitted May 31, 2021 at 07:26AM by Gallus
via reddit https://ift.tt/34wPact
https://ift.tt/3p3kF7o
Submitted May 31, 2021 at 07:26AM by Gallus
via reddit https://ift.tt/34wPact
Synacktiv
Playing with ImageTragick like it's 2016
You probably already have encountered document converting features that deal with ImageMagick during engagements but for some reason you were not able to exploit them. This article will mention some t
CVE-2021-21985 (another NSE quick checker)
https://ift.tt/2TuDp49
Submitted May 31, 2021 at 11:24AM by alt3kx
via reddit https://ift.tt/2TwbssI
https://ift.tt/2TuDp49
Submitted May 31, 2021 at 11:24AM by alt3kx
via reddit https://ift.tt/2TwbssI
GitHub
GitHub - alt3kx/CVE-2021-21985_PoC
Contribute to alt3kx/CVE-2021-21985_PoC development by creating an account on GitHub.
HardenedVault's whitepaper on building the digital bunker
https://ift.tt/3vBnAql
Submitted May 31, 2021 at 11:58AM by hardenedvault
via reddit https://ift.tt/3fPJfo0
https://ift.tt/3vBnAql
Submitted May 31, 2021 at 11:58AM by hardenedvault
via reddit https://ift.tt/3fPJfo0
Analysis report of the Facefish rootkit
https://ift.tt/2TmWuFn
Submitted May 31, 2021 at 12:41PM by c0r3dump3d
via reddit https://ift.tt/2S0JmoV
https://ift.tt/2TmWuFn
Submitted May 31, 2021 at 12:41PM by c0r3dump3d
via reddit https://ift.tt/2S0JmoV
360 Netlab Blog - Network Security Research Lab at 360
Analysis report of the Facefish rootkit
Background
In Feb 2021, we came across an ELF sample using some CWP’s Ndays exploits, we did some analysis, but after checking with a partner who has some nice visibility in network traffic in some China areas, we discovered there is literarily 0 hit for…
In Feb 2021, we came across an ELF sample using some CWP’s Ndays exploits, we did some analysis, but after checking with a partner who has some nice visibility in network traffic in some China areas, we discovered there is literarily 0 hit for…
.NET Managed Injector Library
https://ift.tt/2RXFIMD
Submitted May 31, 2021 at 04:26PM by aparata_s4tan
via reddit https://ift.tt/3wJoH7F
https://ift.tt/2RXFIMD
Submitted May 31, 2021 at 04:26PM by aparata_s4tan
via reddit https://ift.tt/3wJoH7F
GitHub
GitHub - enkomio/ManagedInjector: A C# DLL injection library
A C# DLL injection library. Contribute to enkomio/ManagedInjector development by creating an account on GitHub.
Overwolf 1-Click Remote Code Execution - CVE-2021-33501
https://ift.tt/3wL35Ia
Submitted May 31, 2021 at 09:04PM by Nhoty
via reddit https://ift.tt/3p5YyNG
https://ift.tt/3wL35Ia
Submitted May 31, 2021 at 09:04PM by Nhoty
via reddit https://ift.tt/3p5YyNG
Overwolf 1-Click Remote Code Execution - CVE-2021-33501 | SwordBytes Security
SwordBytes researchers have identified an Unauthenticated Remote Code Execution (RCE) vulnerability in Overwolf’s Client Application by abusing a Reflected Cross-Site Scripting (XSS) issue present in the “overwolfstore://” URL handler. This vulnerability…
AppCache's forgotten tales
https://ift.tt/34AUZFK
Submitted June 01, 2021 at 02:31AM by herrera_
via reddit https://ift.tt/3c44qlu
https://ift.tt/34AUZFK
Submitted June 01, 2021 at 02:31AM by herrera_
via reddit https://ift.tt/3c44qlu
blog.lbherrera.me
AppCache's forgotten tales
Leveraging AppCache's network section to leak the complete URL of cross-origin redirects.
Threat Hunting AMSI Bypasses
https://ift.tt/3fDpotF
Submitted June 01, 2021 at 02:43PM by netbiosX
via reddit https://ift.tt/34CicaA
https://ift.tt/3fDpotF
Submitted June 01, 2021 at 02:43PM by netbiosX
via reddit https://ift.tt/34CicaA
Pentest Laboratories
Threat Hunting AMSI Bypasses
The Antimalware Scan Interface (AMSI) was developed to provider an additional layer of security towards the execution of malicious noscripts on Windows environments. AMSI can be utilized by different…
Defeating Code Obfuscation with Angr
https://ift.tt/3i9mSN5
Submitted June 01, 2021 at 03:01PM by NapongiZero
via reddit https://ift.tt/2SJeM3d
https://ift.tt/3i9mSN5
Submitted June 01, 2021 at 03:01PM by NapongiZero
via reddit https://ift.tt/2SJeM3d
NapongiZero’s Blog
Defeating Code Obfuscation with Angr
A few weeks back I encountered an obfuscated piece of code. Reversing it seemed very tedious.
New AWS attack technique - Attackers can spoof their IP address on CloudTrail logs
https://ift.tt/3oKFSCW
Submitted May 30, 2021 at 08:32PM by Sayag_Security
via reddit https://ift.tt/2Tw6v38
https://ift.tt/3oKFSCW
Submitted May 30, 2021 at 08:32PM by Sayag_Security
via reddit https://ift.tt/2Tw6v38
www.hunters.security
Hunters Research: Detecting Obfuscated Attacker IPs in AWS
Hunters' research team discovers obfuscation technique using AWS VPC feature. Attackers could change the IP address written to AWS CloudTrail logs.
what do you think guys, is it OK to hook API call to get key or part of the key which is generated from a ransomware side.
https://ift.tt/3c92TKS
Submitted June 01, 2021 at 04:26PM by vah_13
via reddit https://ift.tt/3i51zwb
https://ift.tt/3c92TKS
Submitted June 01, 2021 at 04:26PM by vah_13
via reddit https://ift.tt/3i51zwb
French Quebec/Quebecker passwords list for your pentest!
https://ift.tt/3wRakxZ
Submitted June 01, 2021 at 08:13PM by pathetiq
via reddit https://ift.tt/3uE1emT
https://ift.tt/3wRakxZ
Submitted June 01, 2021 at 08:13PM by pathetiq
via reddit https://ift.tt/3uE1emT
Reddit
From the netsec community on Reddit: French Quebec/Quebecker passwords list for your pentest!
Posted by pathetiq - No votes and no comments
Configure AWS DNS Firewall to Control DNS Traffic in VPCs (Terraform and CloudFormation Templates)
https://ift.tt/3fZOim6
Submitted June 01, 2021 at 08:42PM by elitistAlmond
via reddit https://ift.tt/3fYqyP7
https://ift.tt/3fZOim6
Submitted June 01, 2021 at 08:42PM by elitistAlmond
via reddit https://ift.tt/3fYqyP7
asecure.cloud
Route53 Resolver Security: Route53 Resolver DNS Firewall Custom Template
CloudFormation, Terraform, and AWS CLI Templates: Configuration templates to deploy an AWS Route53 Resolver Firewall and related settings including firewall rule groups, custom domain lists, and VPC associations. This configuration can be used to block DNS…
Technical analysis of two RCE in Grav CMS 1.7.10 (CVE-2021-29439, CVE-2021-29440)
https://ift.tt/3i7WuDn
Submitted June 01, 2021 at 08:35PM by monoimpact
via reddit https://ift.tt/3g0YTgz
https://ift.tt/3i7WuDn
Submitted June 01, 2021 at 08:35PM by monoimpact
via reddit https://ift.tt/3g0YTgz
Sonarsource
SonarSource Blog
SonarSource builds world-class Code Quality & Code Security tools. Our products, SonarLint, SonarQube, and SonarCloud are trusted by 200k+ organizations globally.