GitHub - GhostPack/Certify: Active Directory certificate abuse.
https://ift.tt/3fxf8Tj
Submitted August 05, 2021 at 07:17AM by mubix
via reddit https://ift.tt/3xqypvq
https://ift.tt/3fxf8Tj
Submitted August 05, 2021 at 07:17AM by mubix
via reddit https://ift.tt/3xqypvq
GitHub
GitHub - GhostPack/Certify: Active Directory certificate abuse.
Active Directory certificate abuse. Contribute to GhostPack/Certify development by creating an account on GitHub.
Analysis of Prometheus Traffic Direction System (TDS): an underground service that distributes malicious files and redirects visitors to phishing and malicious sites
https://ift.tt/3xtHdAO
Submitted August 05, 2021 at 03:52PM by securehoney
via reddit https://ift.tt/3fy8axi
https://ift.tt/3xtHdAO
Submitted August 05, 2021 at 03:52PM by securehoney
via reddit https://ift.tt/3fy8axi
Group-IB
Prometheus TDS
Group-IB TI analysts examined Prometheus TDS — an underground service designed to distribute malicious files and redirect users to phishing and malicious sites.
Bitdefender Anti-Virus Engine Incorporated in SpamTitan v7.00 - SpamTitan Email Security
https://ift.tt/37kYZf1
Submitted August 05, 2021 at 04:51PM by Aystrological
via reddit https://ift.tt/3rV5UFe
https://ift.tt/37kYZf1
Submitted August 05, 2021 at 04:51PM by Aystrological
via reddit https://ift.tt/3rV5UFe
SpamTitan Email Security
Bitdefender Anti-Virus Engine Incorporated in SpamTitan v7.00 - SpamTitan Email Security
A new version of TitanHQ’s cloud-based anti-spam service and anti-spam software was released on March 5, 2018. SpamTitan version 7.00 includes patches for recently identified vulnerabilities in the ClamAV antivirus engine and a change to the primary AV engine…
I2P Chat for Windows 10 instant messenger allows chat anonymously. Get I2P here ->> https://geti2p.net/en/ You need to enable SAM by visiting 127.0.0.1:7657/configclients
https://ift.tt/30J82TA
Submitted August 05, 2021 at 07:28PM by ComprehensiveFudge22
via reddit https://ift.tt/3im2Fn8
https://ift.tt/30J82TA
Submitted August 05, 2021 at 07:28PM by ComprehensiveFudge22
via reddit https://ift.tt/3im2Fn8
geti2p.net
I2P Anonymous Network
Anonymous peer-to-peer distributed communication layer built with open source tools and designed to run any traditional Internet service such as email, IRC or web hosting.
HTTP/2: The Sequel is Always Worse - more HTTP request smuggling attacks from albinowax
https://ift.tt/2WPVg7a
Submitted August 06, 2021 at 12:39AM by virodoran
via reddit https://ift.tt/3fCM50m
https://ift.tt/2WPVg7a
Submitted August 06, 2021 at 12:39AM by virodoran
via reddit https://ift.tt/3fCM50m
PortSwigger Research
HTTP/2: The Sequel is Always Worse
In this research paper James Kettle introduces multiple new classes of HTTP/2-exclusive attacks, demonstrated on popular websites and servers.
Knock knock, who's there? Your new DA!
https://ift.tt/3yy6POo
Submitted August 06, 2021 at 11:28AM by m8urn
via reddit https://ift.tt/3fxPgGz
https://ift.tt/3yy6POo
Submitted August 06, 2021 at 11:28AM by m8urn
via reddit https://ift.tt/3fxPgGz
Truesec
From Stranger to DA // Using PetitPotam to NTLM relay to Domain Administrato - Truesec
Proof that snaps from Snapchat don't disappear and can easily be recovered
https://ift.tt/2VlxpvZ
Submitted August 06, 2021 at 11:50AM by imakethingswhenbored
via reddit https://ift.tt/2VxGjWX
https://ift.tt/2VlxpvZ
Submitted August 06, 2021 at 11:50AM by imakethingswhenbored
via reddit https://ift.tt/2VxGjWX
GitHub
GitHub - sdushantha/snaprecovery: Recover old Snaps that have “disappeared” from Snapchat
Recover old Snaps that have “disappeared” from Snapchat - GitHub - sdushantha/snaprecovery: Recover old Snaps that have “disappeared” from Snapchat
Microsoft Patches Windows Container Escape
https://ift.tt/2X3le7p
Submitted August 06, 2021 at 04:28PM by pingpongfifa
via reddit https://ift.tt/37qZSme
https://ift.tt/2X3le7p
Submitted August 06, 2021 at 04:28PM by pingpongfifa
via reddit https://ift.tt/37qZSme
Unit42
Microsoft Patched the Issue That Enabled a Windows Container Escape
Microsoft recently added additional security checks that address the Windows container escape that enabled Siloscape.
Shielder - Corero SecureWatch Managed Services 9.7.2.0020 Multiple Broken Access Control
https://ift.tt/37o5HAT
Submitted August 06, 2021 at 06:27PM by smaury
via reddit https://ift.tt/3AkkZ62
https://ift.tt/37o5HAT
Submitted August 06, 2021 at 06:27PM by smaury
via reddit https://ift.tt/3AkkZ62
Shielder
Shielder - Corero SecureWatch Managed Services 9.7.2.0020 Multiple Broken Access Control
Corero SecureWatch Managed Services 9.7.2.0020 does not correctly check swa-monitor and cns-monitor user's privileges, allowing a user to perform actions not belonging to his role.
Shielder - Corero SecureWatch Managed Services 9.7.2.0020 get_snapshot Path Traversal
https://ift.tt/3xr65ta
Submitted August 06, 2021 at 06:26PM by smaury
via reddit https://ift.tt/3Cn6FM8
https://ift.tt/3xr65ta
Submitted August 06, 2021 at 06:26PM by smaury
via reddit https://ift.tt/3Cn6FM8
Shielder
Shielder - Corero SecureWatch Managed Services 9.7.2.0020 get_snapshot Path Traversal
Corero SecureWatch Managed Services 9.7.2.0020 is affected by a Path Traversal vulnerability via the `snap_file` parameter in the `/it-IT/splunkd/__raw/services/get_snapshot` HTTP API endpoint. A 'low privileged' attacker can read any file on the target host.
A Practical Introduction to Semgrep
https://ift.tt/2VEn4L2
Submitted August 07, 2021 at 12:26AM by iterablewords
via reddit https://ift.tt/3s6Bwba
https://ift.tt/2VEn4L2
Submitted August 07, 2021 at 12:26AM by iterablewords
via reddit https://ift.tt/3s6Bwba
Bernardoamc
A Practical Introduction to Semgrep
Let's explore this modern static analysis tool and how it allows us to identify patterns in our code for linting or security purposes.
A New Attack Surface on MS Exchange Part 1 - ProxyLogon
https://ift.tt/2VvBq0q
Submitted August 07, 2021 at 07:26AM by hyperreality_monero
via reddit https://ift.tt/3xvc28v
https://ift.tt/2VvBq0q
Submitted August 07, 2021 at 07:26AM by hyperreality_monero
via reddit https://ift.tt/3xvc28v
Orange
A New Attack Surface on MS Exchange Part 1 - ProxyLogon!
This is 🍊 speaking
ADCS + PetitPotam NTLM Relay: Obtaining krbtgt Hash with Domain Controller Machine Certificate
https://ift.tt/3Cm3yEl
Submitted August 07, 2021 at 05:01PM by Kondencuotaspienas
via reddit https://ift.tt/2VpF0K1
https://ift.tt/3Cm3yEl
Submitted August 07, 2021 at 05:01PM by Kondencuotaspienas
via reddit https://ift.tt/2VpF0K1
www.ired.team
ADCS + PetitPotam NTLM Relay: Obtaining krbtgt Hash with Domain Controller Machine Certificate
Zuthuka : A collaborative free open-souce c2 integration framework
https://ift.tt/37vSmq8
Submitted August 07, 2021 at 09:31PM by Nhoty
via reddit https://ift.tt/3Ao1IRA
https://ift.tt/37vSmq8
Submitted August 07, 2021 at 09:31PM by Nhoty
via reddit https://ift.tt/3Ao1IRA
GitHub
GitHub - pucarasec/zuthaka: Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task…
Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and other post-exploitation tools. - GitHub - pucarasec/zuthaka: Zu...
GitHub - Tylous/SourcePoint: Is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion.
https://ift.tt/3lGhQtm
Submitted August 08, 2021 at 02:38AM by tylous
via reddit https://ift.tt/37s5xc0
https://ift.tt/3lGhQtm
Submitted August 08, 2021 at 02:38AM by tylous
via reddit https://ift.tt/37s5xc0
GitHub
GitHub - Tylous/SourcePoint: SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure…
SourcePoint is a C2 profile generator for Cobalt Strike command and control servers designed to ensure evasion. - GitHub - Tylous/SourcePoint: SourcePoint is a C2 profile generator for Cobalt Stri...
Want to build a 5G Lab after watching some of the awesome talks at BH 2021 ?
https://ift.tt/30qpJp4
Submitted August 07, 2021 at 03:14AM by pentest4life
via reddit https://ift.tt/3AlYDBn
https://ift.tt/30qpJp4
Submitted August 07, 2021 at 03:14AM by pentest4life
via reddit https://ift.tt/3AlYDBn
GitHub
GitHub - W00t3k/Awesome-Cellular-Hacking: Awesome-Cellular-Hacking
Awesome-Cellular-Hacking. Contribute to W00t3k/Awesome-Cellular-Hacking development by creating an account on GitHub.
DEF CON 29 Main Stage Presentations [VIDEO]
https://www.youtube.com/playlist?list=PL9fPq3eQfaaBUD1zVxJWJmX86A6d0isBI
Submitted August 08, 2021 at 03:03AM by sanitybit
via reddit https://ift.tt/37sE6Pa
https://www.youtube.com/playlist?list=PL9fPq3eQfaaBUD1zVxJWJmX86A6d0isBI
Submitted August 08, 2021 at 03:03AM by sanitybit
via reddit https://ift.tt/37sE6Pa
CVE-2021-29922 – rust standard library “net” – Improper Input Validation of octal literals in rust 1.52 and below. (See comments for CVE-2021-29923 golang)
https://ift.tt/3lWKHtN
Submitted August 08, 2021 at 05:11PM by docker-osx
via reddit https://ift.tt/3yzhUP8
https://ift.tt/3lWKHtN
Submitted August 08, 2021 at 05:11PM by docker-osx
via reddit https://ift.tt/3yzhUP8
Sick Codes - Security Research, Hardware & Software Hacking, Consulting, Linux, IoT, Cloud, Embedded, Arch, Tweaks & Tips!
CVE-2021-29922 – rust standard library “net” – Improper Input Validation of octal literals in rust 1.52.0 std::net and below results…
Title CVE-2021-29922 rust standard library "net" - Improper Input Validation of octal literals in rust 1.52.0 std::net and below results
Intigriti’s PHP challenge breakdown
https://ift.tt/3s3LiuI
Submitted August 08, 2021 at 09:44PM by _SecurityGOAT
via reddit https://ift.tt/3AilOwi
https://ift.tt/3s3LiuI
Submitted August 08, 2021 at 09:44PM by _SecurityGOAT
via reddit https://ift.tt/3AilOwi
Medium
Intigriti’s PHP challenge breakdown
Let’s discuss issues with the PHP code shared by Initgriti! We will discuss on how you can shoot yourself in the foot with PHP’s…
Being “root” on two Agriculture Companies (in Good Faith). Maxing out the John Deere Operations Center Worldwide and Case Industrial in Brazil (ft. PEGA CVE, SQLi, exposed Java Melody)
https://ift.tt/3fLu3Jp
Submitted August 09, 2021 at 10:04AM by docker-osx
via reddit https://ift.tt/3lOhDEu
https://ift.tt/3fLu3Jp
Submitted August 09, 2021 at 10:04AM by docker-osx
via reddit https://ift.tt/3lOhDEu
Sick Codes - Security Research, Hardware & Software Hacking, Consulting, Linux, IoT, Cloud, Embedded, Arch, Tweaks & Tips!
Being “root” on two Agriculture Companies (in Good Faith). Maxing out the John Deere Operations Center Worldwide and Case Industrial…
Over the weekend, we presented an undertaking by a group of researchers that decided to "just have a look" at
Our student project (UC Berkeley) is a tool providing company intelligence with a focus on net security and safety. Would love hear any feedback and thoughts - thanks so much!
https://ift.tt/3CxYBrO
Submitted August 09, 2021 at 10:45AM by Raio95
via reddit https://ift.tt/3AqJyyk
https://ift.tt/3CxYBrO
Submitted August 09, 2021 at 10:45AM by Raio95
via reddit https://ift.tt/3AqJyyk
flowpro-test.web.app
CyberSights
Web site created using create-react-app