TLS.support - A tool (and REST API) for debugging client TLS version and cipher support issues
https://tls.support/
Submitted September 30, 2021 at 02:27AM by sullivanmatt
via reddit https://ift.tt/3okUBpV
https://tls.support/
Submitted September 30, 2021 at 02:27AM by sullivanmatt
via reddit https://ift.tt/3okUBpV
tls.support
Test your browser's TLS configuration - TLS.support
TLS.support is a free diagnostic tool and REST API for testing browser and client TLS version and cipher support. The service also checks browsers and clients for common TLS-related issues and misconfigurations.
FaPro: A mass network protocol server simulator
https://ift.tt/3hxewOx
Submitted September 30, 2021 at 01:21PM by ntestoc3
via reddit https://ift.tt/2Wqu2nX
https://ift.tt/3hxewOx
Submitted September 30, 2021 at 01:21PM by ntestoc3
via reddit https://ift.tt/2Wqu2nX
GitHub
GitHub - fofapro/fapro: Fake Protocol Server
Fake Protocol Server. Contribute to fofapro/fapro development by creating an account on GitHub.
new NIST SP 800-204C (Draft), DevSecOps for Microservices-based App with Service Mesh | CSRC
https://ift.tt/3ofBdea
Submitted September 30, 2021 at 03:12PM by markcartertm
via reddit https://ift.tt/3mbSVfR
https://ift.tt/3ofBdea
Submitted September 30, 2021 at 03:12PM by markcartertm
via reddit https://ift.tt/3mbSVfR
CSRC | NIST
NIST Special Publication (SP) 800-204C (Withdrawn), Implementation of DevSecOps for a Microservices-based Application with Service…
Cloud-native applications have evolved into a standardized architecture consisting of multiple loosely coupled components called microservices (implemented as containers), supported by code for providing application services called service mesh. Both of these…
FaPro: A mass network protocol server simulator tool
https://ift.tt/3hxewOx
Submitted September 30, 2021 at 03:26PM by ntestoc3
via reddit https://ift.tt/3B2F5CY
https://ift.tt/3hxewOx
Submitted September 30, 2021 at 03:26PM by ntestoc3
via reddit https://ift.tt/3B2F5CY
GitHub
GitHub - fofapro/fapro: Fake Protocol Server
Fake Protocol Server. Contribute to fofapro/fapro development by creating an account on GitHub.
Privilege Escalation in Crucial MODAPI.sys driver
https://ift.tt/2XXMqFd
Submitted September 30, 2021 at 09:02PM by Void_Sec
via reddit https://ift.tt/39Vef3D
https://ift.tt/2XXMqFd
Submitted September 30, 2021 at 09:02PM by Void_Sec
via reddit https://ift.tt/39Vef3D
VoidSec
Crucial’s MOD Utility LPE - CVE-2021-41285 - VoidSec
Crucial's Ballistix MOD Utility v.<= 2.0.2.5 is affected by multiple Privilege Escalation (LPE) vulnerabilities in the MODAPI.sys driver.
The fugitive in Java: Escaping to Java to escape the Chrome sandbox
https://ift.tt/39RVJZP
Submitted September 30, 2021 at 09:38PM by 0xdea
via reddit https://ift.tt/3kVqNy7
https://ift.tt/39RVJZP
Submitted September 30, 2021 at 09:38PM by 0xdea
via reddit https://ift.tt/3kVqNy7
GitHub Security Lab
The fugitive in Java: Escaping to Java to escape the Chrome sandbox
In this post, I’ll exploit a use-after-free (CVE-2021-30528) in the Chrome browser process that I reported to escape the Chrome sandbox. This is a fairly interesting bug that shows some of the subtleties involved in the interactions between C++ and Java in…
Pre-loading HSTS for sibling domains through this one weird trick
https://ift.tt/3D3dbqH
Submitted September 30, 2021 at 09:31PM by sjmurdoch
via reddit https://ift.tt/3zRyTvT
https://ift.tt/3D3dbqH
Submitted September 30, 2021 at 09:31PM by sjmurdoch
via reddit https://ift.tt/3zRyTvT
Bentham’s Gaze
Pre-loading HSTS for sibling domains through this one weird trick
The vast majority of websites now support encrypted connections over HTTPS. This prevents eavesdroppers from monitoring or tampering with people’s web activity and is great for privacy. However, HTTPS is optional, and all browsers still support plain unsecured…
Penetration Testing Tool Project
https://ift.tt/3uuECqI
Submitted October 01, 2021 at 04:43AM by Ok_Demand_682
via reddit https://ift.tt/3kUPwm5
https://ift.tt/3uuECqI
Submitted October 01, 2021 at 04:43AM by Ok_Demand_682
via reddit https://ift.tt/3kUPwm5
GitHub
GitHub - medpaf/hawk: Network, recon and offensive-security tool for Linux systems.
Network, recon and offensive-security tool for Linux systems. - GitHub - medpaf/hawk: Network, recon and offensive-security tool for Linux systems.
BruteShark Version V1.2.5 Released: Identify open ports, domains and users simply by entering PCAP files. Export it to JSON with few clicks :-)
https://ift.tt/2WwZ39Q
Submitted October 01, 2021 at 05:10AM by BruteShark
via reddit https://ift.tt/3kVzfxi
https://ift.tt/2WwZ39Q
Submitted October 01, 2021 at 05:10AM by BruteShark
via reddit https://ift.tt/3kVzfxi
GitHub
Release Network Map Supports Domain Users And Data Transferred Amounts · odedshimon/BruteShark
This version contains few improvements and features:
First, the network map had upgraded by adding additional fields that enables to get insights about domain users and the amount of data transferr...
First, the network map had upgraded by adding additional fields that enables to get insights about domain users and the amount of data transferr...
SNIF ~ e2e TLS trust for IoT
https://snif.host
Submitted October 01, 2021 at 08:31AM by vesvault
via reddit https://ift.tt/2ZCFXjC
https://snif.host
Submitted October 01, 2021 at 08:31AM by vesvault
via reddit https://ift.tt/2ZCFXjC
reddit
SNIF ~ e2e TLS trust for IoT
Posted in r/netsec by u/vesvault • 1 point and 0 comments
DigitalOcean Hacktoberfest 2021
https://ift.tt/372IQee
Submitted October 01, 2021 at 12:26PM by keybeebig
via reddit https://ift.tt/3mbZ3VC
https://ift.tt/372IQee
Submitted October 01, 2021 at 12:26PM by keybeebig
via reddit https://ift.tt/3mbZ3VC
Hacktoberfest presented by DigitalOcean
Hacktoberfest '21
Drive-By Compromise: A Tale Of Four WiFi Routers
https://ift.tt/3B3O5Yc
Submitted October 01, 2021 at 05:48PM by IncludeSec
via reddit https://ift.tt/3AZNeYN
https://ift.tt/3B3O5Yc
Submitted October 01, 2021 at 05:48PM by IncludeSec
via reddit https://ift.tt/3AZNeYN
Include Security Research Blog
Drive-By Compromise: A Tale Of Four WiFi Routers - Include Security Research Blog
Determining the overall security posture of consumer electronics is an exceedingly hard task. In this post, we analyze four 'budget' devices.
WebGoat is a deliberately insecure application
https://ift.tt/1BjjBRy
Submitted October 02, 2021 at 09:19PM by binaryfor
via reddit https://ift.tt/2Wxv7u4
https://ift.tt/1BjjBRy
Submitted October 02, 2021 at 09:19PM by binaryfor
via reddit https://ift.tt/2Wxv7u4
GitHub
GitHub - WebGoat/WebGoat: WebGoat is a deliberately insecure application
WebGoat is a deliberately insecure application. Contribute to WebGoat/WebGoat development by creating an account on GitHub.
DroneSploit – A pentesting console framework dedicated to drones
https://ift.tt/36rpmgL
Submitted October 02, 2021 at 09:16PM by binaryfor
via reddit https://ift.tt/3osLymY
https://ift.tt/36rpmgL
Submitted October 02, 2021 at 09:16PM by binaryfor
via reddit https://ift.tt/3osLymY
GitHub
GitHub - dhondta/dronesploit: Drone pentesting framework console
Drone pentesting framework console. Contribute to dhondta/dronesploit development by creating an account on GitHub.
Alan post-exploitation framework v4.0 released
https://ift.tt/2Y4OAml
Submitted October 01, 2021 at 01:04PM by aparata_s4tan
via reddit https://ift.tt/3iqUbeb
https://ift.tt/2Y4OAml
Submitted October 01, 2021 at 01:04PM by aparata_s4tan
via reddit https://ift.tt/3iqUbeb
Blogspot
Alan post-exploitation framework v4.0 released
Twitter: @s4tan Download: GitHub Documentation: https://github.com/enkomio/AlanFramework/tree/main/doc I just released version 4...
The discovery of Gatekeeper bypass CVE-2021-1810
https://ift.tt/3mkUKHx
Submitted October 03, 2021 at 12:10PM by 0xdea
via reddit https://ift.tt/3ioCr2U
https://ift.tt/3mkUKHx
Submitted October 03, 2021 at 12:10PM by 0xdea
via reddit https://ift.tt/3ioCr2U
Authentication Encounter: OIDC vs OAuth2
https://ift.tt/2Wz30e0
Submitted October 03, 2021 at 12:56PM by prescojan
via reddit https://ift.tt/3l2Migw
https://ift.tt/2Wz30e0
Submitted October 03, 2021 at 12:56PM by prescojan
via reddit https://ift.tt/3l2Migw
Frontegg
Authentication Encounter: OIDC vs OAuth2 | Frontegg
Not sure about the winner in the OIDC vs OAuth2 encounter? We’ve got you covered with this detailed authentication comparison.
Working with the sales team during my consulting days was eye opening. In this edition, I argue that there are many lessons AppSec teams can learn from how Sales teams operate.
https://ift.tt/3mnNKcM
Submitted October 03, 2021 at 05:05PM by jubbaonjeans
via reddit https://ift.tt/3oySUpj
https://ift.tt/3mnNKcM
Submitted October 03, 2021 at 05:05PM by jubbaonjeans
via reddit https://ift.tt/3oySUpj
Substack
Edition 10: Selling AppSec
In AppSec, most Security controls are implemented by folks outside the Security team. You cannot improve your AppSec posture, without "selling" the virtue of AppSec to your stakeholders.
Conditionally-Perfect Secrecy and a Provably-Secure Randomized Cipher [PDF]
https://ift.tt/3a8qyJL
Submitted October 03, 2021 at 07:34PM by Uberhipster
via reddit https://ift.tt/3mjEOVN
https://ift.tt/3a8qyJL
Submitted October 03, 2021 at 07:34PM by Uberhipster
via reddit https://ift.tt/3mjEOVN
Undectable backdooring of PE file using dual code caves & encoding
https://ift.tt/3a614Nn
Submitted October 04, 2021 at 02:46AM by InformationSecurity
via reddit https://ift.tt/2YeVy8X
https://ift.tt/3a614Nn
Submitted October 04, 2021 at 02:46AM by InformationSecurity
via reddit https://ift.tt/2YeVy8X
Haider Mahmood Infosec Blog
undetectable backdooring PE file
backdooring exe files, backdooring PE file, backdoor windows executable, fully undetectable backdoor, encoding shellcode, FUD,codecaves,
/r/netsec's Q4 2021 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 04, 2021 at 02:39AM by ranok
via reddit https://ift.tt/3FfhFfV
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted October 04, 2021 at 02:39AM by ranok
via reddit https://ift.tt/3FfhFfV