Rudroid - Writing the World's worst Android Emulator in Rust 🦀 - @ant4g0nist
https://ift.tt/3tdnvsJ
Submitted September 04, 2021 at 09:43PM by ant4g0nist
via reddit https://ift.tt/3h2895x
https://ift.tt/3tdnvsJ
Submitted September 04, 2021 at 09:43PM by ant4g0nist
via reddit https://ift.tt/3h2895x
fuzzing.science
Rudroid - Writing the World's worst Android Emulator in Rust 🦀
Introduction Rudroid - this might arguably be one of the worst Android emulators possible. In this blog, we’ll write an emulator that can run a ‘Hello World’ Android ELF binary. While doing this, we will learn how to go about writing our own emulators.
Writing…
Writing…
VED (Vault Exploit Defense): Protect the Linux kernel
https://ift.tt/2YqPCsZ
Submitted September 06, 2021 at 02:43PM by hardenedvault
via reddit https://ift.tt/3BN1Rym
https://ift.tt/2YqPCsZ
Submitted September 06, 2021 at 02:43PM by hardenedvault
via reddit https://ift.tt/3BN1Rym
reddit
VED (Vault Exploit Defense): Protect the Linux kernel
Posted in r/netsec by u/hardenedvault • 2 points and 0 comments
AppSec measurements are riddled with vanity metrics that don't tell us much. The latest edition talks about metrics that may work.
https://ift.tt/3BMHGAJ
Submitted September 06, 2021 at 07:30PM by jubbaonjeans
via reddit https://ift.tt/3h9klkZ
https://ift.tt/3BMHGAJ
Submitted September 06, 2021 at 07:30PM by jubbaonjeans
via reddit https://ift.tt/3h9klkZ
Substack
Edition 6: Top 4 AppSec metrics and why they are so hard to measure
You can't improve what you cannot measure, but measuring incorrectly can drive incentives in the wrong direction. Here's a hypothesis on "good" AppSec metrics and why they are so hard to measure.
GitHub - duc-nt/RCE-0-day-for-GhostScript-9.50: RCE 0-day for GhostScript 9.50 - Payload generator
https://ift.tt/3jOfk36
Submitted September 06, 2021 at 09:56PM by AffectionateOrchid10
via reddit https://ift.tt/38LsgAk
https://ift.tt/3jOfk36
Submitted September 06, 2021 at 09:56PM by AffectionateOrchid10
via reddit https://ift.tt/38LsgAk
GitHub
GitHub - duc-nt/RCE-0-day-for-GhostScript-9.50: RCE 0-day for GhostScript 9.50 - Payload generator
RCE 0-day for GhostScript 9.50 - Payload generator - duc-nt/RCE-0-day-for-GhostScript-9.50
A personal blog post on open redirect vulnerabilities - why it's bad, examples of vulnerable sites (including one now fixed on the UK's NCSC website), and prevention and detection (example Sigma rule!) advice
https://ift.tt/3yQqCrJ
Submitted September 07, 2021 at 07:26PM by O726564646974
via reddit https://ift.tt/3n7RzVF
https://ift.tt/3yQqCrJ
Submitted September 07, 2021 at 07:26PM by O726564646974
via reddit https://ift.tt/3n7RzVF
OllieJC
Open Redirect Vulnerability
This post is about open redirect vulnerabilities; the story of three vulnerable websites, why it’s bad, and how to prevent and detect abuse. First, a primer…
Behind BTHPORT.SYS
https://ift.tt/38OnCSg
Submitted September 08, 2021 at 03:29AM by lazybind
via reddit https://ift.tt/3zWWaxp
https://ift.tt/38OnCSg
Submitted September 08, 2021 at 03:29AM by lazybind
via reddit https://ift.tt/3zWWaxp
Blogspot
Behind BTHPORT.SYS
Paving the way for 0days Dedicated to: Zix , who spent precious-time guiding me within the last two-months . Mohammed , Jalil , Zakariae ...
SSTI vulnerability blog post
https://ift.tt/2X3rlIE
Submitted September 08, 2021 at 11:42AM by ndireddit
via reddit https://ift.tt/3tnWbI9
https://ift.tt/2X3rlIE
Submitted September 08, 2021 at 11:42AM by ndireddit
via reddit https://ift.tt/3tnWbI9
Atos
Server-Side Template Injection
Templates are pre-formatted documents, which already contain certain information. A template engine is a specific kind of template processing module that exhibits all major features of a modern programming language. The developers make use of Template engines…
Khepri: open source Cobalt Strike-like post-exploitation tool written in Golang and C++
https://ift.tt/3l0Fqzb
Submitted September 08, 2021 at 12:04PM by 0xdea
via reddit https://ift.tt/3BRHP5X
https://ift.tt/3l0Fqzb
Submitted September 08, 2021 at 12:04PM by 0xdea
via reddit https://ift.tt/3BRHP5X
GitHub
GitHub - geemion/Khepri: Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++.
Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang and C++. - GitHub - geemion/Khepri: Free,Open-Source,Cross-platform agent and Post-exploiton tool written in Golang a...
Critical Exchange Vulnerability: Quick Grab on Detection & Mitigation
https://ift.tt/2X3u45q
Submitted September 08, 2021 at 11:57AM by ndireddit
via reddit https://ift.tt/3DQIExP
https://ift.tt/2X3u45q
Submitted September 08, 2021 at 11:57AM by ndireddit
via reddit https://ift.tt/3DQIExP
Atos
Critical Exchange Vulnerability: Quick Grab on Detection & Mitigation
Microsoft has detected multiple zero-day exploits on the on-premises version of the Microsoft Exchange Server (2013,2016, and 2019). Microsoft attributes this campaign with high confidence to HAFNIUM, a group assessed to be state-sponsored and operating out…
CVE-2021-40346 - Integer Overflow leads to HTTP Smuggling in HAProxy
https://ift.tt/38P8yUd
Submitted September 08, 2021 at 05:06PM by SRMish3
via reddit https://ift.tt/3zWb0UP
https://ift.tt/38P8yUd
Submitted September 08, 2021 at 05:06PM by SRMish3
via reddit https://ift.tt/3zWb0UP
JFrog
Critical vulnerability in HAProxy | JFrog Security Research Team
JFrog security research team discovers new critical vulnerability (CVE-2021-40346) in HAProxy. The new vulnerability can be exploited for HTTP Request Smuggling attacks.
Arris Cable Modem Teardown
https://ift.tt/3BVIXFw
Submitted September 08, 2021 at 08:43PM by dinobyt3s
via reddit https://ift.tt/2X1WeNE
https://ift.tt/3BVIXFw
Submitted September 08, 2021 at 08:43PM by dinobyt3s
via reddit https://ift.tt/2X1WeNE
Medium
ARRIS CABLE MODEM TEARDOWN
Picked up one of these a little while back at the behest of a good friend…
CVE-2021-31698 - Code execution as root via AT commands on the Quectel EG25-G modem
https://ift.tt/3yUVCqr
Submitted September 08, 2021 at 09:16PM by crower
via reddit https://ift.tt/3naKMKV
https://ift.tt/3yUVCqr
Submitted September 08, 2021 at 09:16PM by crower
via reddit https://ift.tt/3naKMKV
nns.ee
Code execution as root via AT commands on the Quectel EG25-G modem
As I mentioned towards the end of my previous blog post, where I detailed running my blog on the PinePhone's GSM/WWAN/GPS modem, I suspected that the daemon ...
AWSXenos will detect and classify all the cross account trust relationships in all the IAM roles and S3 buckets, in you AWS Account.
https://ift.tt/38RW1iO
Submitted September 08, 2021 at 09:09PM by _skynet
via reddit https://ift.tt/2VqnhSB
https://ift.tt/38RW1iO
Submitted September 08, 2021 at 09:09PM by _skynet
via reddit https://ift.tt/2VqnhSB
GitHub
GitHub - AirWalk-Digital/AWSXenos: AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more
AWSXenos will list all the trust relationships in all the IAM roles, S3 buckets, and more - AirWalk-Digital/AWSXenos
Operational Mental Models - Jackson T
https://ift.tt/3hbXcy4
Submitted September 08, 2021 at 10:25PM by WM-M-GM
via reddit https://ift.tt/3jTLx91
https://ift.tt/3hbXcy4
Submitted September 08, 2021 at 10:25PM by WM-M-GM
via reddit https://ift.tt/3jTLx91
Why Rust for offensive security
https://ift.tt/2X5KYAq
Submitted September 08, 2021 at 10:42PM by z0mbie42_
via reddit https://ift.tt/3BTH6Bq
https://ift.tt/2X5KYAq
Submitted September 08, 2021 at 10:42PM by z0mbie42_
via reddit https://ift.tt/3BTH6Bq
Kerkour
Why Rust for offensive security
Imagine: all the tanks of your army are made of cardboard. Now imagine that not only your tanks but also all your airforce is composed of paper planes and your navy of paper vessels. It would be a pretty bad situation, don’t you think?
While it sounds absurd…
While it sounds absurd…
Muhstik Takes Aim at Confluence CVE 2021-26084
https://ift.tt/3l5shEU
Submitted September 09, 2021 at 01:47AM by DLLCoolJ
via reddit https://ift.tt/3tp14Rn
https://ift.tt/3l5shEU
Submitted September 09, 2021 at 01:47AM by DLLCoolJ
via reddit https://ift.tt/3tp14Rn
Lacework
Muhstik Takes Aim at Confluence CVE 2021-26084 - Lacework
Lacework Labs Team has observed a number of CVE 2021-26084 exploit attempts using the publicly available exploit code.
Vulnerability in check-spelling GitHub Actions community workflow could have allowed malicious code to be introduced to repos from Microsoft, Jekyll, NASA and PowerDNS
https://ift.tt/3nd2sW3
Submitted September 09, 2021 at 06:30AM by Gallus
via reddit https://ift.tt/2X1Th0e
https://ift.tt/3nd2sW3
Submitted September 09, 2021 at 06:30AM by Gallus
via reddit https://ift.tt/2X1Th0e
GitHub
advisories/2021_github_actions_checkspelling_token_leak_via_advice_symlink.md at master · justinsteven/advisories
Contribute to justinsteven/advisories development by creating an account on GitHub.
Good attacks make good detections make good attacks (a MySQL booby-trap)
https://ift.tt/3jV3Qe5
Submitted September 09, 2021 at 10:23AM by thinkst
via reddit https://ift.tt/3tv4h1J
https://ift.tt/3jV3Qe5
Submitted September 09, 2021 at 10:23AM by thinkst
via reddit https://ift.tt/3tv4h1J
Thinkst Thoughts
Good attacks make good detections make good attacks make..
(The making of a MySQL Canarytoken) tl;dr Consider this scenario: An industrious attacker lands on one of your servers and finds a 5MB MySQL dump file (say, called prod_primary.dump). What do they …
ZDI-21-1053: Bypassing Windows Lock Screen
https://ift.tt/3tszsLd
Submitted September 09, 2021 at 11:12AM by 0xdea
via reddit https://ift.tt/3BUqGsu
https://ift.tt/3tszsLd
Submitted September 09, 2021 at 11:12AM by 0xdea
via reddit https://ift.tt/3BUqGsu
Blogspot
ZDI-21-1053: Bypassing Windows Lock Screen
In April 2021, I discovered a security flaw in Windows Recovery Environment Agent which allowed an unauthenticated attacker to gain elevat...
Introduction to OWASP Top 10 2021
https://ift.tt/3DYBY0q
Submitted September 09, 2021 at 01:07PM by Fugitif
via reddit https://ift.tt/2YH7boT
https://ift.tt/3DYBY0q
Submitted September 09, 2021 at 01:07PM by Fugitif
via reddit https://ift.tt/2YH7boT
owasp.org
OWASP Top 10
OWASP Top 10 2021 Draft
Mēris botnet, climbing to the record RPS DDoS attack
https://ift.tt/3nhOVwI
Submitted September 09, 2021 at 02:58PM by shapelez
via reddit https://ift.tt/3BVUvZK
https://ift.tt/3nhOVwI
Submitted September 09, 2021 at 02:58PM by shapelez
via reddit https://ift.tt/3BVUvZK
blog.qrator.net
Blog — Mēris botnet, climbing to the record
End of June 2021, Qrator Labs started to see signs of a new assaulting force on the Internet – a botnet of a new kind. That is a joint research we conducted together with Yandex to elaborate on the specifics of the DDoS attacks enabler emerging in almost…