NK News is targeted by assumed North Korean affiliated actors using novel attack vector
https://ift.tt/3lEjmM4
Submitted October 14, 2021 at 10:08PM by ravioli207
via reddit https://ift.tt/3aAUkr9
https://ift.tt/3lEjmM4
Submitted October 14, 2021 at 10:08PM by ravioli207
via reddit https://ift.tt/3aAUkr9
NK News - North Korea News
North Korean hackers likely behind barrage of cyberattacks against journalists | NK News
Two prolific hacking groups assumed to be working on behalf of North Korea have launched a series of unusual attacks against journalists covering the DPRK, an NK News investigation in cooperation with cybersecurity firm Kaspersky found. The unsuccessful…
Import and export queries and packs in Fleet
https://ift.tt/3DH6Lhn
Submitted October 15, 2021 at 04:13AM by Silly-Pop-7437
via reddit https://ift.tt/30nixz7
https://ift.tt/3DH6Lhn
Submitted October 15, 2021 at 04:13AM by Silly-Pop-7437
via reddit https://ift.tt/30nixz7
Medium
Import and export queries and packs in Fleet
When managing multiple Fleet environments, you may want to move queries and/or packs from one environment to the other. Or, when inspired…
Ddosify | High-performance load testing tool, written in Golang (Listed in GitHub Trending)
https://ift.tt/3FkBFxM
Submitted October 15, 2021 at 02:24PM by krstCB
via reddit https://ift.tt/3FSHF1c
https://ift.tt/3FkBFxM
Submitted October 15, 2021 at 02:24PM by krstCB
via reddit https://ift.tt/3FSHF1c
GitHub
GitHub - ddosify/ddosify: High-performance load testing tool, written in Golang.
High-performance load testing tool, written in Golang. - GitHub - ddosify/ddosify: High-performance load testing tool, written in Golang.
Bugs in our Pockets: The Risks of Client-Side Scanning
https://ift.tt/3DLaavA
Submitted October 15, 2021 at 04:21PM by yawkat
via reddit https://ift.tt/3joPMZN
https://ift.tt/3DLaavA
Submitted October 15, 2021 at 04:21PM by yawkat
via reddit https://ift.tt/3joPMZN
Best Programming Languages to Learn Hacking
https://ift.tt/3j4gjvd
Submitted October 15, 2021 at 06:07PM by Techflashesinfo
via reddit https://ift.tt/3j5hr1k
https://ift.tt/3j4gjvd
Submitted October 15, 2021 at 06:07PM by Techflashesinfo
via reddit https://ift.tt/3j5hr1k
techflashes.com
Best Programming Languages to Learn Hacking - techflashes.com
This article gives great information for the hacking and programming lovers to best programming languages to learn hacking techflashes.com
Building a POC for CVE-2021-40438 – SSRF in apache2 mod_proxy
https://ift.tt/2YTEN32
Submitted October 15, 2021 at 06:52PM by 0xdea
via reddit https://ift.tt/3mZpjme
https://ift.tt/2YTEN32
Submitted October 15, 2021 at 06:52PM by 0xdea
via reddit https://ift.tt/3mZpjme
Security Experts Sound Alarm on Apple and E.U. Phone Scanning Plans
https://ift.tt/3aGidgJ
Submitted October 15, 2021 at 06:44PM by danyork
via reddit https://ift.tt/2YY3qf5
https://ift.tt/3aGidgJ
Submitted October 15, 2021 at 06:44PM by danyork
via reddit https://ift.tt/2YY3qf5
NY Times
Cybersecurity Experts Sound Alarm on Apple and E.U. Phone Scanning Plans
A group of researchers said the “dangerous technology” was invasive and not effective at detecting images of child sexual abuse.
Hacktoberfest Using Open Source For Evil
https://ift.tt/3j5en5C
Submitted October 15, 2021 at 08:01PM by banginpadr
via reddit https://ift.tt/3ver9n7
https://ift.tt/3j5en5C
Submitted October 15, 2021 at 08:01PM by banginpadr
via reddit https://ift.tt/3ver9n7
Medium
Hacktoberfest Using Open Source For Evil
The open secret no one tells you about this programming challenge
Bluetooth WarDriving with the nRF52
https://ift.tt/30mfsiM
Submitted October 15, 2021 at 11:19PM by Machinehum
via reddit https://ift.tt/3veQ61E
https://ift.tt/30mfsiM
Submitted October 15, 2021 at 11:19PM by Machinehum
via reddit https://ift.tt/3veQ61E
Medium
Bluetooth WarDriving with the nRF52
I am an open source advocate that loves working on embedded systems. I own and operate a small consulting company: Interrupt Labs. If you…
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
https://ift.tt/3G1sPpd
Submitted October 15, 2021 at 11:48PM by transt
via reddit https://ift.tt/3j8w5VU
https://ift.tt/3G1sPpd
Submitted October 15, 2021 at 11:48PM by transt
via reddit https://ift.tt/3j8w5VU
Blogspot
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
In this blog post, we are going to walk you through the research and development process that leads to new and powerful memory analysis capa...
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
https://ift.tt/3BMd9DD
Submitted October 16, 2021 at 12:44AM by digicat
via reddit https://ift.tt/3aKC12J
https://ift.tt/3BMd9DD
Submitted October 16, 2021 at 12:44AM by digicat
via reddit https://ift.tt/3aKC12J
NCC Group Research
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
This blog post proposes an approach to crack Pseudo-Random Number Generators (PRNGs) using machine learning. By cracking here, we mean that we can predict the sequence of the random numbers using previously generated numbers without the knowledge of the seed.…
GitHub - Arinerron/heaptrace - helps visualize heap operations for pwn and debugging
https://ift.tt/3APl0ip
Submitted October 16, 2021 at 12:44PM by Arinerron
via reddit https://ift.tt/30qUcs9
https://ift.tt/3APl0ip
Submitted October 16, 2021 at 12:44PM by Arinerron
via reddit https://ift.tt/30qUcs9
GitHub
GitHub - Arinerron/heaptrace: helps visualize heap operations for pwn and debugging
helps visualize heap operations for pwn and debugging - GitHub - Arinerron/heaptrace: helps visualize heap operations for pwn and debugging
A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy
https://ift.tt/2XGqX3d
Submitted October 16, 2021 at 06:12PM by CyberMasterV
via reddit https://ift.tt/3DQQWVF
https://ift.tt/2XGqX3d
Submitted October 16, 2021 at 06:12PM by CyberMasterV
via reddit https://ift.tt/3DQQWVF
reddit
A step-by-step analysis of the new malware used by APT28/Sofacy...
Posted in r/netsec by u/CyberMasterV • 204 points and 6 comments
Creating a Basic Python Reverse Shell Listener
https://ift.tt/3viXc5c
Submitted October 16, 2021 at 09:49PM by pythonpsycho1337
via reddit https://ift.tt/3vmMvi7
https://ift.tt/3viXc5c
Submitted October 16, 2021 at 09:49PM by pythonpsycho1337
via reddit https://ift.tt/3vmMvi7
Home
Creating a Basic Python Reverse Shell Listener
Introduction This week I wanted to create a listener in python which functioned like the command nc -lp [port], which is commonly used to catch reverse shells. At first, I thought it would be a piece of cake and would simply be something like reading the…
It's OK to Speed
https://ift.tt/3AOKOek
Submitted October 16, 2021 at 11:57PM by w8rbt
via reddit https://ift.tt/2YVc1Pg
https://ift.tt/3AOKOek
Submitted October 16, 2021 at 11:57PM by w8rbt
via reddit https://ift.tt/2YVc1Pg
Go350
It's OK to speed
When you need to
Top 10 Horrible Attacks in History
https://ift.tt/3B0nlY5
Submitted October 17, 2021 at 11:24AM by Techflashesinfo
via reddit https://ift.tt/3FTmMme
https://ift.tt/3B0nlY5
Submitted October 17, 2021 at 11:24AM by Techflashesinfo
via reddit https://ift.tt/3FTmMme
This edition (Part 2 of the 4-part SAST primer) focuses on how SAST tools work. This one was interesting to write. There's so much detail that it's hard to abstract some (to keep it readable) and leave out the rest.
https://ift.tt/3p72Lmo
Submitted October 17, 2021 at 01:55PM by jubbaonjeans
via reddit https://ift.tt/30t5oVb
https://ift.tt/3p72Lmo
Submitted October 17, 2021 at 01:55PM by jubbaonjeans
via reddit https://ift.tt/30t5oVb
Boring AppSec
Edition 12: AppSec Primer - How SAST tools work?
2nd in a 4-part primer on Static Application Security Testing (SAST). This edition gives you an overview of what SAST tools look like under the hood.
Compromising a Domain With the Help of a Spooler
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
Cymulate
Compromising a Domain With the Help of a Spooler
In this blog, Cymulate's Research Lab shares how to compromise a domain with the help of a spooler.
House of IO - Heap Reuse
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
reddit
House of IO - Heap Reuse
Posted in r/netsec by u/mdulin2 • 19 points and 2 comments
"...depending on how you managed to get this VPN-over-Tor setup working, you may have even broken the local state separation of Tor Browser. If any of this traffic is identifying of you, you've potentially tainted all of your traffic."
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
reddit
"...depending on how you managed to get this VPN-over-Tor setup...
Posted in r/netsec by u/dontbenebby • 6 points and 5 comments
Experimenting with TempestSDR. Decoding the "leaking" HDMI signal. Got much higher resolution with a HackRF than with a RTL-SDR
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
reddit
Yet another TempestSDR demo with a HackRF. Much higher resolution...
Posted in r/RTLSDR by u/-Alchem1st- • 217 points and 53 comments