CVE-2021-32682 / CVE-2021-23394 - Write-up of several pre-auth RCEs in elFinder < 2.1.59
https://ift.tt/3iVdfSk
Submitted August 22, 2021 at 11:03PM by monoimpact
via reddit https://ift.tt/3y5wHjz
https://ift.tt/3iVdfSk
Submitted August 22, 2021 at 11:03PM by monoimpact
via reddit https://ift.tt/3y5wHjz
Sonarsource
elFinder - A Case Study of Web File Manager Vulnerabilities
Our case study of elFinder 2.1.57 describes several critical code vulnerabilities commonly found in web file managers and how to patch them.
macOS 11's hidden security improvements
https://ift.tt/3iUbcOr
Submitted August 23, 2021 at 01:52AM by 0xdea
via reddit https://ift.tt/386tnKo
https://ift.tt/3iUbcOr
Submitted August 23, 2021 at 01:52AM by 0xdea
via reddit https://ift.tt/386tnKo
Malwarebytes
macOS 11’s hidden security improvements
A deep dive into macOS 11's internals reveals some security surprises that deserve to be more widely known.
https://ift.tt/2Wk2YXf
https://ift.tt/2Wk2YXf
Submitted August 23, 2021 at 03:14AM by russell1492
via reddit https://ift.tt/3mpfwHq
https://ift.tt/2Wk2YXf
Submitted August 23, 2021 at 03:14AM by russell1492
via reddit https://ift.tt/3mpfwHq
Google
Real-time meetings by Google. Using your browser, share your video, desktop, and presentations with teammates and customers.
Anti-Debug JS/WASM Polyglots by Hand
https://ift.tt/3y8WhEg
Submitted August 23, 2021 at 03:54AM by netsecfriends
via reddit https://ift.tt/3B3DiNn
https://ift.tt/3y8WhEg
Submitted August 23, 2021 at 03:54AM by netsecfriends
via reddit https://ift.tt/3B3DiNn
remyhax.xyz
Anti-Debug JS/WASM by Hand
Last week a friend of mine asked me to debug/RE some phishing emails that had been sent to them. These phishing emails were visually very clever and looked identical to the real site! But as I looked at the javanoscript I frankly became embarassed for the developer.
Zoom RCE from Pwn2Own 2021 writeup
https://ift.tt/3j7VVcQ
Submitted August 23, 2021 at 05:50PM by xnyhps
via reddit https://ift.tt/2XQumwA
https://ift.tt/3j7VVcQ
Submitted August 23, 2021 at 05:50PM by xnyhps
via reddit https://ift.tt/2XQumwA
sector7.computest.nl
Zoom RCE from Pwn2Own 2021
On April 7 2021, Thijs Alkemade and Daan Keuper demonstrated a zero-click remote code execution exploit in the Zoom video client during Pwn2Own 2021. Now that related bugs have been fixed for all users (see ZDI-21-971 and ZSB-22003) we can safely detail the…
GitHub - aktsk/ipa-medit: Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking.
https://ift.tt/3nfJn3q
Submitted August 23, 2021 at 06:32PM by tkmru
via reddit https://ift.tt/382H39s
https://ift.tt/3nfJn3q
Submitted August 23, 2021 at 06:32PM by tkmru
via reddit https://ift.tt/382H39s
GitHub
GitHub - aktsk/ipa-medit: Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac…
Memory modification tool for re-signed ipa supports iOS apps running on iPhone and Apple Silicon Mac without jailbreaking. - GitHub - aktsk/ipa-medit: Memory modification tool for re-signed ipa sup...
PyHook: New little tool. A python implementation of my SharpHook project
https://ift.tt/3gpnehg
Submitted August 23, 2021 at 08:23PM by Fun_Preference1113
via reddit https://ift.tt/3ygWHsA
https://ift.tt/3gpnehg
Submitted August 23, 2021 at 08:23PM by Fun_Preference1113
via reddit https://ift.tt/3ygWHsA
GitHub
GitHub - IlanKalendarov/PyHook: PyHook is an offensive API hooking tool written in python designed to catch various credentials…
PyHook is an offensive API hooking tool written in python designed to catch various credentials within the API call. - IlanKalendarov/PyHook
Killing Defender through NT symbolic links redirection
https://ift.tt/3gqyWbj
Submitted August 24, 2021 at 02:23AM by Void_Sec
via reddit https://ift.tt/3ze8JnB
https://ift.tt/3gqyWbj
Submitted August 24, 2021 at 02:23AM by Void_Sec
via reddit https://ift.tt/3ze8JnB
Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019
https://ift.tt/3y9p8s9
Submitted August 24, 2021 at 09:43AM by w1n11
via reddit https://ift.tt/3kjyQDp
https://ift.tt/3y9p8s9
Submitted August 24, 2021 at 09:43AM by w1n11
via reddit https://ift.tt/3kjyQDp
GitHub
GitHub - w1u0u1/smb2os: Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019
Use smb2 protocol to detect remote computer os version, support win7/server2008-win10/server2019 - w1u0u1/smb2os
SSD Secure Disclosure Advisory: Find out how a vulnerability discovered in Samsung S10+/S9 kernel allows leaking of sensitive function address information.
https://ift.tt/389vgGg
Submitted August 24, 2021 at 03:44PM by SSDisclosure
via reddit https://ift.tt/2WbXaiJ
https://ift.tt/389vgGg
Submitted August 24, 2021 at 03:44PM by SSDisclosure
via reddit https://ift.tt/2WbXaiJ
SSD Secure Disclosure
SSD Advisory – Samsung S10+/S9 kernel 4.14 (Android 10) Kernel Function Address (.text) and Heap Address Information Leak - SSD…
TL;DR Find out how a vulnerability discovered in Samsung S10+/S9 kernel allows leaking of sensitive function address information. Vulnerability Summary Samsung S10+/S9 kernel […]
Cloud Security Orienteering: How to rapidly understand and secure a cloud environment
https://ift.tt/2WlJstx
Submitted August 24, 2021 at 08:40PM by ramimac
via reddit https://ift.tt/3DePRXV
https://ift.tt/2WlJstx
Submitted August 24, 2021 at 08:40PM by ramimac
via reddit https://ift.tt/3DePRXV
tl;dr sec
Cloud Security Orienteering
How to orienteer in a cloud environment, dig in to identify the risks that matter, and put together actionable plans that address short, medium, and long term goals.
Cobalt Strike Aggressor Script - Profiles Systems AV/EDR via Windows Registry
https://ift.tt/3gtvKM8
Submitted August 24, 2021 at 08:55PM by eth3real
via reddit https://ift.tt/3y9dgX3
https://ift.tt/3gtvKM8
Submitted August 24, 2021 at 08:55PM by eth3real
via reddit https://ift.tt/3y9dgX3
GitHub
GitHub - optiv/Registry-Recon: Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon
Cobalt Strike Aggressor Script that Performs System/AV/EDR Recon - optiv/Registry-Recon
Tutorial: 32-bit Stack-based Buffer Overflow
https://ift.tt/3DecAn9
Submitted August 25, 2021 at 02:36AM by Kondencuotaspienas
via reddit https://ift.tt/3sLYGUh
https://ift.tt/3DecAn9
Submitted August 25, 2021 at 02:36AM by Kondencuotaspienas
via reddit https://ift.tt/3sLYGUh
www.ired.team
32-bit Stack-based Buffer Overflow
URL filter subversion - new web app vuln
https://ift.tt/3sLWs7p
Submitted August 25, 2021 at 06:00PM by jodsonleandross
via reddit https://ift.tt/3yiuHV8
https://ift.tt/3sLWs7p
Submitted August 25, 2021 at 06:00PM by jodsonleandross
via reddit https://ift.tt/3yiuHV8
sidechannel.blog
URL Filter Subversion | SideChannel – Tempest
How failures related to validating conditions based on URLs can lead to security issues
Business Logic Ratings Bug
https://ift.tt/3jc8Dr8
Submitted August 25, 2021 at 06:22PM by mdulin2
via reddit https://ift.tt/38eMkKZ
https://ift.tt/3jc8Dr8
Submitted August 25, 2021 at 06:22PM by mdulin2
via reddit https://ift.tt/38eMkKZ
reddit
Business Logic Ratings Bug
Posted in r/netsec by u/mdulin2 • 8 points and 0 comments
Vulnerability in Bumble dating app reveals any user's exact location
https://ift.tt/3Bd3Coe
Submitted August 25, 2021 at 07:11PM by businesstrout
via reddit https://ift.tt/3Dh382d
https://ift.tt/3Bd3Coe
Submitted August 25, 2021 at 07:11PM by businesstrout
via reddit https://ift.tt/3Dh382d
Robert Heaton
Vulnerability in Bumble dating app reveals any user's exact location | Robert Heaton
The vulnerability in this post is real. The story and characters are obviously not.
ghidra2frida - The new bridge between Ghidra and Frida
https://ift.tt/3sYKJTr
Submitted August 25, 2021 at 07:53PM by 0xdea
via reddit https://ift.tt/3mtagCR
https://ift.tt/3sYKJTr
Submitted August 25, 2021 at 07:53PM by 0xdea
via reddit https://ift.tt/3mtagCR
hn security
ghidra2frida - The new bridge between Ghidra and Frida - hn security
Hi! Today I’m publishing a new […]
Issues with Indefinite Trust in Bluetooth - Include Security Research Blog
https://ift.tt/3zicTei
Submitted August 25, 2021 at 08:19PM by IncludeSec
via reddit https://ift.tt/38c2WmD
https://ift.tt/3zicTei
Submitted August 25, 2021 at 08:19PM by IncludeSec
via reddit https://ift.tt/38c2WmD
Include Security Research Blog
Issues with Indefinite Trust in Bluetooth - Include Security Research Blog
At IncludeSec we of course love to hack things, but we also love to use our skills and insights into security issues to explore innovative solutions, develop tools, and share resources. In this post we share a summary of a recent paper that I published with…
Meeting the new Executive Order requirements with Azure Security
https://ift.tt/3ko2wiS
Submitted August 26, 2021 at 01:11AM by SCI_Rusher
via reddit https://ift.tt/3mDHNdL
https://ift.tt/3ko2wiS
Submitted August 26, 2021 at 01:11AM by SCI_Rusher
via reddit https://ift.tt/3mDHNdL
TECHCOMMUNITY.MICROSOFT.COM
Meeting the Cybersecurity Executive Order requirements with Azure Security
In May 2021, the Biden Administration signed Executive Order (EO) 14028, placing cloud security at the forefront of national security. Federal agencies are at different stages in their digital transformations yet are all facing similar challenges: rapidly…
The Evolution of a Magecart Attack Leveraging the Recaptcha.tech Domain
https://ift.tt/3DkAI7K
Submitted August 26, 2021 at 02:25AM by amirshk
via reddit https://ift.tt/3jhcVxv
https://ift.tt/3DkAI7K
Submitted August 26, 2021 at 02:25AM by amirshk
via reddit https://ift.tt/3jhcVxv
PerimeterX
The Evolution of a Magecart Attack Leveraging the Recaptcha.tech Domain
PerimeterX Cybersecurity Researcher Ben Baryo discovered a skimmer served from recaptcha[.]tech and examined its progression over the course of two years.
Glowworm Attack - Optical TEMPEST Sound Recovery via a Device’s Power Indicator LED
https://ift.tt/2VIQx70
Submitted August 26, 2021 at 06:17AM by Gallus
via reddit https://ift.tt/38eHlu4
https://ift.tt/2VIQx70
Submitted August 26, 2021 at 06:17AM by Gallus
via reddit https://ift.tt/38eHlu4
Ben Nassi
Glowworm-Attack
In this paper, we identify a new class of optical TEMPEST attacks: recovering sound by analyzing optical emanations from a device’s power indicator LED. We analyze the response of the power indicator LED of various devices to sound and show that there is…