Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
https://ift.tt/3G1sPpd
Submitted October 15, 2021 at 11:48PM by transt
via reddit https://ift.tt/3j8w5VU
https://ift.tt/3G1sPpd
Submitted October 15, 2021 at 11:48PM by transt
via reddit https://ift.tt/3j8w5VU
Blogspot
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
In this blog post, we are going to walk you through the research and development process that leads to new and powerful memory analysis capa...
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
https://ift.tt/3BMd9DD
Submitted October 16, 2021 at 12:44AM by digicat
via reddit https://ift.tt/3aKC12J
https://ift.tt/3BMd9DD
Submitted October 16, 2021 at 12:44AM by digicat
via reddit https://ift.tt/3aKC12J
NCC Group Research
Cracking Random Number Generators using Machine Learning – Part 1: xorshift128
This blog post proposes an approach to crack Pseudo-Random Number Generators (PRNGs) using machine learning. By cracking here, we mean that we can predict the sequence of the random numbers using previously generated numbers without the knowledge of the seed.…
GitHub - Arinerron/heaptrace - helps visualize heap operations for pwn and debugging
https://ift.tt/3APl0ip
Submitted October 16, 2021 at 12:44PM by Arinerron
via reddit https://ift.tt/30qUcs9
https://ift.tt/3APl0ip
Submitted October 16, 2021 at 12:44PM by Arinerron
via reddit https://ift.tt/30qUcs9
GitHub
GitHub - Arinerron/heaptrace: helps visualize heap operations for pwn and debugging
helps visualize heap operations for pwn and debugging - GitHub - Arinerron/heaptrace: helps visualize heap operations for pwn and debugging
A step-by-step analysis of the new malware used by APT28/Sofacy called SkinnyBoy
https://ift.tt/2XGqX3d
Submitted October 16, 2021 at 06:12PM by CyberMasterV
via reddit https://ift.tt/3DQQWVF
https://ift.tt/2XGqX3d
Submitted October 16, 2021 at 06:12PM by CyberMasterV
via reddit https://ift.tt/3DQQWVF
reddit
A step-by-step analysis of the new malware used by APT28/Sofacy...
Posted in r/netsec by u/CyberMasterV • 204 points and 6 comments
Creating a Basic Python Reverse Shell Listener
https://ift.tt/3viXc5c
Submitted October 16, 2021 at 09:49PM by pythonpsycho1337
via reddit https://ift.tt/3vmMvi7
https://ift.tt/3viXc5c
Submitted October 16, 2021 at 09:49PM by pythonpsycho1337
via reddit https://ift.tt/3vmMvi7
Home
Creating a Basic Python Reverse Shell Listener
Introduction This week I wanted to create a listener in python which functioned like the command nc -lp [port], which is commonly used to catch reverse shells. At first, I thought it would be a piece of cake and would simply be something like reading the…
It's OK to Speed
https://ift.tt/3AOKOek
Submitted October 16, 2021 at 11:57PM by w8rbt
via reddit https://ift.tt/2YVc1Pg
https://ift.tt/3AOKOek
Submitted October 16, 2021 at 11:57PM by w8rbt
via reddit https://ift.tt/2YVc1Pg
Go350
It's OK to speed
When you need to
Top 10 Horrible Attacks in History
https://ift.tt/3B0nlY5
Submitted October 17, 2021 at 11:24AM by Techflashesinfo
via reddit https://ift.tt/3FTmMme
https://ift.tt/3B0nlY5
Submitted October 17, 2021 at 11:24AM by Techflashesinfo
via reddit https://ift.tt/3FTmMme
This edition (Part 2 of the 4-part SAST primer) focuses on how SAST tools work. This one was interesting to write. There's so much detail that it's hard to abstract some (to keep it readable) and leave out the rest.
https://ift.tt/3p72Lmo
Submitted October 17, 2021 at 01:55PM by jubbaonjeans
via reddit https://ift.tt/30t5oVb
https://ift.tt/3p72Lmo
Submitted October 17, 2021 at 01:55PM by jubbaonjeans
via reddit https://ift.tt/30t5oVb
Boring AppSec
Edition 12: AppSec Primer - How SAST tools work?
2nd in a 4-part primer on Static Application Security Testing (SAST). This edition gives you an overview of what SAST tools look like under the hood.
Compromising a Domain With the Help of a Spooler
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
Cymulate
Compromising a Domain With the Help of a Spooler
In this blog, Cymulate's Research Lab shares how to compromise a domain with the help of a spooler.
House of IO - Heap Reuse
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
reddit
House of IO - Heap Reuse
Posted in r/netsec by u/mdulin2 • 19 points and 2 comments
"...depending on how you managed to get this VPN-over-Tor setup working, you may have even broken the local state separation of Tor Browser. If any of this traffic is identifying of you, you've potentially tainted all of your traffic."
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
reddit
"...depending on how you managed to get this VPN-over-Tor setup...
Posted in r/netsec by u/dontbenebby • 6 points and 5 comments
Experimenting with TempestSDR. Decoding the "leaking" HDMI signal. Got much higher resolution with a HackRF than with a RTL-SDR
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
reddit
Yet another TempestSDR demo with a HackRF. Much higher resolution...
Posted in r/RTLSDR by u/-Alchem1st- • 217 points and 53 comments
L0phtCrack Is Now Open Source
https://ift.tt/3rKFWUK
Submitted October 18, 2021 at 05:38AM by binaryfor
via reddit https://ift.tt/3paMMni
https://ift.tt/3rKFWUK
Submitted October 18, 2021 at 05:38AM by binaryfor
via reddit https://ift.tt/3paMMni
reddit
L0phtCrack Is Now Open Source
Posted in r/netsec by u/binaryfor • 1 point and 0 comments
Experience the impact of CVE-2021-41773 in Apache 2.4.49
https://ift.tt/3jbGhwW
Submitted October 18, 2021 at 03:40PM by DebugDucky
via reddit https://ift.tt/3vnbQsm
https://ift.tt/3jbGhwW
Submitted October 18, 2021 at 03:40PM by DebugDucky
via reddit https://ift.tt/3vnbQsm
Securecodewarrior
Experience the impact of the Path Traversal Vulnerability to blame for the recent Apache woes
At the beginning of October, Apache released version 2.4.49 to fix a Path Traversal and Remote Code Execution vulnerability and then 2.4.50 to address the fact that the fix was incomplete. We’ve built a mission to demonstrate the risks in a real-life environment.…
Methodology to perform Resource Based Constrained Delegation for Privilege Escalation
https://ift.tt/2YX04cb
Submitted October 18, 2021 at 07:26PM by netbiosX
via reddit https://ift.tt/3BOpya2
https://ift.tt/2YX04cb
Submitted October 18, 2021 at 07:26PM by netbiosX
via reddit https://ift.tt/3BOpya2
Penetration Testing Lab
Resource Based Constrained Delegation
Microsoft in an attempt to provide more flexibility to domain users enabled owner of resources to configure which accounts are trusted and allowed to delegate to them. This is achieved by modificat…
BlackByte Ransomware – Pt. 1 In-depth Analysis
https://ift.tt/3BSaTus
Submitted October 18, 2021 at 08:43PM by ksr_malware
via reddit https://ift.tt/3BVrQUK
https://ift.tt/3BSaTus
Submitted October 18, 2021 at 08:43PM by ksr_malware
via reddit https://ift.tt/3BVrQUK
Levelblue
BlackByte Ransomware – Pt. 1 In-depth Analysis | Trustwave
During a recent malware incident response case, we encountered an interesting piece of ransomware that goes by the name of BlackByte.
Cracking Random Number Generators using Machine Learning – Part 2: Mersenne Twister
https://ift.tt/3DSVsTr
Submitted October 18, 2021 at 10:39PM by digicat
via reddit https://ift.tt/3BWq0mF
https://ift.tt/3DSVsTr
Submitted October 18, 2021 at 10:39PM by digicat
via reddit https://ift.tt/3BWq0mF
NCC Group Research
Cracking Random Number Generators using Machine Learning – Part 2: Mersenne Twister
part 1 of this post, we showed how to train a Neural Network to generate the exact sequence of a relatively simple pseudo-random number generator (PRNG), namely xorshift128. In that PRNG, each number is totally dependent on the last four generated numbers…
Platform with PBQs and Labs to Learn IT by Doing
https://ift.tt/2YXt2IM
Submitted October 19, 2021 at 01:58AM by Complex_Temperature5
via reddit https://ift.tt/2Z56qGI
https://ift.tt/2YXt2IM
Submitted October 19, 2021 at 01:58AM by Complex_Temperature5
via reddit https://ift.tt/2Z56qGI
CompTIA Labs, PBQs and more - DojoLab
Explore Labs - CompTIA Labs, PBQs and more - DojoLab
Available Labs Coming Soon Labs Get All-Inclusive Access Get lifetime access and benefit from the new updates and features. GET ACCESS TODAY!
Security Information and Event Management cheat sheet (free) just released:
https://ift.tt/3aRY8Eh
Submitted October 19, 2021 at 09:45AM by blokdijkg
via reddit https://ift.tt/3lTam5V
https://ift.tt/3aRY8Eh
Submitted October 19, 2021 at 09:45AM by blokdijkg
via reddit https://ift.tt/3lTam5V
Theartofservice
Security Information and Event Management Kanban- The Art of Service, Standard Requirements Self Assessments
Ready to use prioritized Security Information and Event Management requirements, to: Develop experience managing security information and event management
IcedID to XingLocker Ransomware in 24 hours - Towards the end of July, we observed an intrusion that began with IcedID malware and ended in XingLocker ransomware, a Mountlocker variant.
https://ift.tt/3FZ45h1
Submitted October 19, 2021 at 06:10PM by TheDFIRReport
via reddit https://ift.tt/3ASA1Qt
https://ift.tt/3FZ45h1
Submitted October 19, 2021 at 06:10PM by TheDFIRReport
via reddit https://ift.tt/3ASA1Qt
The DFIR Report
IcedID to XingLocker Ransomware in 24 hours
Intro Towards the end of July, we observed an intrusion that began with IcedID malware and ended in XingLocker ransomware, a Mountlocker variant. XingLocker made its first appearance in early May o…
Comparing Microservice Permissions Strategies
https://ift.tt/3C166XK
Submitted October 19, 2021 at 06:31PM by awoxp
via reddit https://ift.tt/3aPryD5
https://ift.tt/3C166XK
Submitted October 19, 2021 at 06:31PM by awoxp
via reddit https://ift.tt/3aPryD5
cerbos.dev
Comparing User Permissions Strategies
Microservices architectures are the dominant force in today’s software engineering realm, but how do they stack up at providing permissions strategies?