uBlock Origin (and uMatrix) DoS with strict-blocking filter and crafted URL
https://ift.tt/3wEXq5V
Submitted July 14, 2021 at 09:20PM by vtriolet
via reddit https://ift.tt/3ibJGKM
https://ift.tt/3wEXq5V
Submitted July 14, 2021 at 09:20PM by vtriolet
via reddit https://ift.tt/3ibJGKM
GitHub
writings/ublock_origin_and_umatrix_denial_of_service.adoc at main · vtriolet/writings
Assorted writings. Contribute to vtriolet/writings development by creating an account on GitHub.
15 years old heap out-of-bounds write vulnerability in Linux Netfilter powerful enough to bypass all modern security mitigations and achieve kernel code execution
https://ift.tt/3B6SkTe
Submitted July 15, 2021 at 07:43AM by trenno
via reddit https://ift.tt/3zd5c8X
https://ift.tt/3B6SkTe
Submitted July 15, 2021 at 07:43AM by trenno
via reddit https://ift.tt/3zd5c8X
security-research
CVE-2021-22555: Turning \x00\x00 into 10000$
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Hashing Phone Numbers For 2-Factor Authentication
https://ift.tt/3B4zj3Q
Submitted July 15, 2021 at 11:57AM by theabbiee
via reddit https://ift.tt/3ekBLtq
https://ift.tt/3B4zj3Q
Submitted July 15, 2021 at 11:57AM by theabbiee
via reddit https://ift.tt/3ekBLtq
TheAbbie
Hashing Phone Numbers For 2-Factor Authentication
With the rise of internet and increasing risks of getting hacked, it's more than necessary nowadays that we have an extra layer of security on our accounts, since password alone is not enough. Thus, using Phone numbers for 2FA sounds much more secure, but…
CVE-2021-31956 Exploiting the Windows Kernel via NTFS with WNF – Part 1
https://ift.tt/3wGVBFA
Submitted July 15, 2021 at 05:46PM by digicat
via reddit https://ift.tt/3z3WBF9
https://ift.tt/3wGVBFA
Submitted July 15, 2021 at 05:46PM by digicat
via reddit https://ift.tt/3z3WBF9
NCC Group Research
CVE-2021-31956 Exploiting the Windows Kernel (NTFS with WNF) – Part 1
NCC Group’s Exploit Development Group look at exploiting CVE-2021-31956 – the Windows Kernel (NTFS with WNF)
Aruba in Chains: Chaining Vulnerabilities for Fun and Profit
https://ift.tt/3elSRqC
Submitted July 15, 2021 at 06:49PM by Gr33nh4tt
via reddit https://ift.tt/3xHgi5H
https://ift.tt/3elSRqC
Submitted July 15, 2021 at 06:49PM by Gr33nh4tt
via reddit https://ift.tt/3xHgi5H
Alephsecurity
Aruba in Chains: Chaining Vulnerabilities for Fun and Profit
Hidden Bugs in The Mines: Examining Vulnerabilities within Cryptocurrency Miners
https://ift.tt/3hFhyAp
Submitted July 15, 2021 at 09:16PM by DLLCoolJ
via reddit https://ift.tt/36H9toN
https://ift.tt/3hFhyAp
Submitted July 15, 2021 at 09:16PM by DLLCoolJ
via reddit https://ift.tt/36H9toN
Lacework
Hidden Bugs in The Mines: Examining Vulnerabilities within Cryptocurrency Miners - Lacework -Lacework
Lacework Labs identified an XMRigCC binary being used in conjunction with an opportunistic Cryptojacking (T1496) campaign. We examine for vulnerabilities to identify additional risks to victims.
We’re gonna need a bigger boat: An analysis of recently caught phishing kits
https://ift.tt/3wB7Bsg
Submitted July 15, 2021 at 09:49PM by securehoney
via reddit https://ift.tt/3emWFIx
https://ift.tt/3wB7Bsg
Submitted July 15, 2021 at 09:49PM by securehoney
via reddit https://ift.tt/3emWFIx
Nortonlifelock
We’re gonna need a bigger boat: An analysis of recently caught phishing kits
Anatomy of a phishing attack
Integrate VirusTotal with your threat data warehouse using SQL
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
https://ift.tt/36FZJuM
Submitted July 16, 2021 at 12:31AM by CloudSpout
via reddit https://ift.tt/3raYrSd
GitHub
GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.
Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal. - GitHub - turbot/steampipe-plugin-virustotal: Use SQL to instantly query file, domain, URL and IP scanning res...
Threat Hunting Dune themed scenario I made in my home lab that’s beginner friendly.
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
https://ift.tt/3yXuWWo
Submitted July 16, 2021 at 02:21AM by m_edmondson
via reddit https://ift.tt/3wFQ6H7
Marcus Edmondson | Threat Hunting | Information Security
To Catch a Hacker in My Home Lab – Noabar
Today I wanted to write a blog post to answer the questions to the Noabar scenario located here: A little background on what Noabar is, this is a Windows machine in my home lab that I attacked to c…
What every CISO and security engineer should know about Intel CSME
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
https://ift.tt/2UktCOJ
Submitted July 16, 2021 at 09:41AM by hardenedvault
via reddit https://ift.tt/3B9ddNO
Remote code execution in cdnjs of Cloudflare
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
https://ift.tt/2UfFxxn
Submitted July 16, 2021 at 12:03PM by _vavkamil_
via reddit https://ift.tt/3kn4i5t
blog.ryotak.me
Remote code execution in cdnjs of Cloudflare
Preface (日本語版も公開されています。) Cloudflare, which runs cdnjs, is running a “Vulnerability Disclosure Program” on HackerOne, which allows hackers to perform vulnerability assessments. This article describes vulnerabilities reported through this program and published…
Shakti - small bash noscript to fix long repetitive tasks/commads
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
https://ift.tt/3ko5lSA
Submitted July 16, 2021 at 11:52AM by spajky_yt
via reddit https://ift.tt/3wNVfgd
Amit Merchant - Software Engineer
Shakti - More than alias
Introduction
OpenSecurityTraining2 public betas of refreshed classes on x86-64 assembly, x86-64 OS internals, and coreboot are now open
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
https://ost2.fyi
Submitted July 16, 2021 at 04:59PM by BIOS4breakfast
via reddit https://ift.tt/2U8UBwR
reddit
OpenSecurityTraining2 public betas of refreshed classes on x86-64...
Posted in r/netsec by u/BIOS4breakfast • 29 points and 1 comment
Mitmproxy 7 released, now with TCP and TLS-over-TLS support.
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
https://ift.tt/2VKukoR
Submitted July 16, 2021 at 05:54PM by mhils
via reddit https://ift.tt/2UUzEp6
ppfuzz v1.0 released! Now, if it's indeed vulnerable: it'll fingerprint the noscript gadgets used and then display additional payload info that could potentially escalate its impact to XSS, bypass/cookie injection.
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
https://ift.tt/3ijgcdL
Submitted July 15, 2021 at 08:29PM by dwisiswant0
via reddit https://ift.tt/3rbOdAY
GitHub
GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀 - GitHub - dwisiswant0/ppfuzz: A fast tool to scan client-side prototype pollution vulnerability written in Rust. 🦀
Security Analysis of Telegram (Symmetric Part)
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
https://ift.tt/3BcMyzu
Submitted July 16, 2021 at 09:28PM by giuliomagnifico
via reddit https://ift.tt/3z7a674
reddit
Security Analysis of Telegram (Symmetric Part)
Posted in r/netsec by u/giuliomagnifico • 116 points and 9 comments
Packet-Editing Games and Binary Protocols in Go
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
https://ift.tt/2UiK6XM
Submitted July 16, 2021 at 11:57PM by netsecfriends
via reddit https://ift.tt/3rgzLYz
remyhax.xyz
Packet-Editing Games in Golang
It’s easy to set up an IDS or other infrastructure to drop packets that match rules. There are many tools for real-time inspection of connections that can handle higher level protocols like HTTP or TLS.
RCE vulnerability in fail2ban mailing action using mailutils (mail-whois)
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
https://ift.tt/3Bdd9Na
Submitted July 17, 2021 at 12:20PM by 0xdea
via reddit https://ift.tt/3BegoDJ
GitHub
Possible RCE vulnerability in mailing action using mailutils (mail-whois)
### Discovered-by
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
Jakub Żoczek
### Impact
Possible remote code execution vulnerability in mailing action mail-whois
### Summary
Command `mail` from mailutils package used in mail actions...
A new PowerShell obfuscation tool for AMSI bypass written in Python
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
https://ift.tt/342Bd65
Submitted July 17, 2021 at 01:00PM by R3dCr0wn
via reddit https://ift.tt/3ktic5W
GitHub
GitHub - klezVirus/chameleon: PowerShell Script Obfuscator
PowerShell Script Obfuscator. Contribute to klezVirus/chameleon development by creating an account on GitHub.
Set of tools for lateral movement (DCOM, SM, PS Remoting, MSSQL and RDP)
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
https://ift.tt/3z42WkX
Submitted July 17, 2021 at 12:54PM by R3dCr0wn
via reddit https://ift.tt/2UkdGw2
GitHub
GitHub - klezVirus/CheeseTools: Self-developed tools for Lateral Movement/Code Execution
Self-developed tools for Lateral Movement/Code Execution - klezVirus/CheeseTools
OG-Sadpanda/SharpExcelibur
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
https://ift.tt/2VUHGPy
Submitted July 18, 2021 at 12:01AM by RNBnoscripting
via reddit https://ift.tt/3ijpPct
GitHub
GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly
Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly - GitHub - OG-Sadpanda/SharpExcelibur: Read Excel Spreadsheets (XLS/XLSX) using Cobalt Strike's Execute-Assembly