Compromising a Domain With the Help of a Spooler
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
https://ift.tt/3vqiKM8
Submitted October 17, 2021 at 01:46PM by layahwet
via reddit https://ift.tt/3aIqHnR
Cymulate
Compromising a Domain With the Help of a Spooler
In this blog, Cymulate's Research Lab shares how to compromise a domain with the help of a spooler.
House of IO - Heap Reuse
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
https://ift.tt/3APmucx
Submitted October 17, 2021 at 09:41PM by mdulin2
via reddit https://ift.tt/30zG3sW
reddit
House of IO - Heap Reuse
Posted in r/netsec by u/mdulin2 • 19 points and 2 comments
"...depending on how you managed to get this VPN-over-Tor setup working, you may have even broken the local state separation of Tor Browser. If any of this traffic is identifying of you, you've potentially tainted all of your traffic."
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
https://ift.tt/3aLHMx3
Submitted October 18, 2021 at 01:05AM by dontbenebby
via reddit https://ift.tt/3n4a8sc
reddit
"...depending on how you managed to get this VPN-over-Tor setup...
Posted in r/netsec by u/dontbenebby • 6 points and 5 comments
Experimenting with TempestSDR. Decoding the "leaking" HDMI signal. Got much higher resolution with a HackRF than with a RTL-SDR
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
https://ift.tt/3AKdB3S
Submitted October 18, 2021 at 01:31AM by Palaksa
via reddit https://ift.tt/2XpfdCC
reddit
Yet another TempestSDR demo with a HackRF. Much higher resolution...
Posted in r/RTLSDR by u/-Alchem1st- • 217 points and 53 comments
L0phtCrack Is Now Open Source
https://ift.tt/3rKFWUK
Submitted October 18, 2021 at 05:38AM by binaryfor
via reddit https://ift.tt/3paMMni
https://ift.tt/3rKFWUK
Submitted October 18, 2021 at 05:38AM by binaryfor
via reddit https://ift.tt/3paMMni
reddit
L0phtCrack Is Now Open Source
Posted in r/netsec by u/binaryfor • 1 point and 0 comments
Experience the impact of CVE-2021-41773 in Apache 2.4.49
https://ift.tt/3jbGhwW
Submitted October 18, 2021 at 03:40PM by DebugDucky
via reddit https://ift.tt/3vnbQsm
https://ift.tt/3jbGhwW
Submitted October 18, 2021 at 03:40PM by DebugDucky
via reddit https://ift.tt/3vnbQsm
Securecodewarrior
Experience the impact of the Path Traversal Vulnerability to blame for the recent Apache woes
At the beginning of October, Apache released version 2.4.49 to fix a Path Traversal and Remote Code Execution vulnerability and then 2.4.50 to address the fact that the fix was incomplete. We’ve built a mission to demonstrate the risks in a real-life environment.…
Methodology to perform Resource Based Constrained Delegation for Privilege Escalation
https://ift.tt/2YX04cb
Submitted October 18, 2021 at 07:26PM by netbiosX
via reddit https://ift.tt/3BOpya2
https://ift.tt/2YX04cb
Submitted October 18, 2021 at 07:26PM by netbiosX
via reddit https://ift.tt/3BOpya2
Penetration Testing Lab
Resource Based Constrained Delegation
Microsoft in an attempt to provide more flexibility to domain users enabled owner of resources to configure which accounts are trusted and allowed to delegate to them. This is achieved by modificat…
BlackByte Ransomware – Pt. 1 In-depth Analysis
https://ift.tt/3BSaTus
Submitted October 18, 2021 at 08:43PM by ksr_malware
via reddit https://ift.tt/3BVrQUK
https://ift.tt/3BSaTus
Submitted October 18, 2021 at 08:43PM by ksr_malware
via reddit https://ift.tt/3BVrQUK
Levelblue
BlackByte Ransomware – Pt. 1 In-depth Analysis | Trustwave
During a recent malware incident response case, we encountered an interesting piece of ransomware that goes by the name of BlackByte.
Cracking Random Number Generators using Machine Learning – Part 2: Mersenne Twister
https://ift.tt/3DSVsTr
Submitted October 18, 2021 at 10:39PM by digicat
via reddit https://ift.tt/3BWq0mF
https://ift.tt/3DSVsTr
Submitted October 18, 2021 at 10:39PM by digicat
via reddit https://ift.tt/3BWq0mF
NCC Group Research
Cracking Random Number Generators using Machine Learning – Part 2: Mersenne Twister
part 1 of this post, we showed how to train a Neural Network to generate the exact sequence of a relatively simple pseudo-random number generator (PRNG), namely xorshift128. In that PRNG, each number is totally dependent on the last four generated numbers…
Platform with PBQs and Labs to Learn IT by Doing
https://ift.tt/2YXt2IM
Submitted October 19, 2021 at 01:58AM by Complex_Temperature5
via reddit https://ift.tt/2Z56qGI
https://ift.tt/2YXt2IM
Submitted October 19, 2021 at 01:58AM by Complex_Temperature5
via reddit https://ift.tt/2Z56qGI
CompTIA Labs, PBQs and more - DojoLab
Explore Labs - CompTIA Labs, PBQs and more - DojoLab
Available Labs Coming Soon Labs Get All-Inclusive Access Get lifetime access and benefit from the new updates and features. GET ACCESS TODAY!
Security Information and Event Management cheat sheet (free) just released:
https://ift.tt/3aRY8Eh
Submitted October 19, 2021 at 09:45AM by blokdijkg
via reddit https://ift.tt/3lTam5V
https://ift.tt/3aRY8Eh
Submitted October 19, 2021 at 09:45AM by blokdijkg
via reddit https://ift.tt/3lTam5V
Theartofservice
Security Information and Event Management Kanban- The Art of Service, Standard Requirements Self Assessments
Ready to use prioritized Security Information and Event Management requirements, to: Develop experience managing security information and event management
IcedID to XingLocker Ransomware in 24 hours - Towards the end of July, we observed an intrusion that began with IcedID malware and ended in XingLocker ransomware, a Mountlocker variant.
https://ift.tt/3FZ45h1
Submitted October 19, 2021 at 06:10PM by TheDFIRReport
via reddit https://ift.tt/3ASA1Qt
https://ift.tt/3FZ45h1
Submitted October 19, 2021 at 06:10PM by TheDFIRReport
via reddit https://ift.tt/3ASA1Qt
The DFIR Report
IcedID to XingLocker Ransomware in 24 hours
Intro Towards the end of July, we observed an intrusion that began with IcedID malware and ended in XingLocker ransomware, a Mountlocker variant. XingLocker made its first appearance in early May o…
Comparing Microservice Permissions Strategies
https://ift.tt/3C166XK
Submitted October 19, 2021 at 06:31PM by awoxp
via reddit https://ift.tt/3aPryD5
https://ift.tt/3C166XK
Submitted October 19, 2021 at 06:31PM by awoxp
via reddit https://ift.tt/3aPryD5
cerbos.dev
Comparing User Permissions Strategies
Microservices architectures are the dominant force in today’s software engineering realm, but how do they stack up at providing permissions strategies?
TPM Carte Blanche write-up
https://ift.tt/3vpvrbt
Submitted October 19, 2021 at 06:53PM by ccnafr
via reddit https://ift.tt/3aRb65j
https://ift.tt/3vpvrbt
Submitted October 19, 2021 at 06:53PM by ccnafr
via reddit https://ift.tt/3aRb65j
A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection
https://ift.tt/3DWgUHm
Submitted October 19, 2021 at 09:32PM by obilodeau
via reddit https://ift.tt/3nabm5e
https://ift.tt/3DWgUHm
Submitted October 19, 2021 at 09:32PM by obilodeau
via reddit https://ift.tt/3nabm5e
GoSecure
A Scientific Notation Bug in MySQL left AWS WAF Clients Vulnerable to SQL Injection - GoSecure
GoSecure ethical hackers found a bug in MySQL that left AWS WAF users vulnerable to SQL injection. Our team further confirmed modsecurity to be affected.
How a simple Linux kernel memory corruption bug can lead to complete system compromise
https://ift.tt/2Z7k4ZX
Submitted October 19, 2021 at 11:21PM by 0xdea
via reddit https://ift.tt/3vtbf8t
https://ift.tt/2Z7k4ZX
Submitted October 19, 2021 at 11:21PM by 0xdea
via reddit https://ift.tt/3vtbf8t
Blogspot
How a simple Linux kernel memory corruption bug can lead to complete system compromise
An analysis of current and potential kernel security mitigations Posted by Jann Horn, Project Zero Introduction This blog post de...
Lateral Movement – WebClient
https://ift.tt/3BZ17XD
Submitted October 20, 2021 at 04:50PM by netbiosX
via reddit https://ift.tt/3C2k77v
https://ift.tt/3BZ17XD
Submitted October 20, 2021 at 04:50PM by netbiosX
via reddit https://ift.tt/3C2k77v
Penetration Testing Lab
Lateral Movement – WebClient
Coercing elevated accounts such as machine accounts to authenticate to a host under the control of an attacker can provide an opportunity for privilege escalation and domain escalation. There are v…
CVE-2020-27304 – RCE via Directory Traversal in CivetWeb HTTP server
https://ift.tt/3BZ6NAT
Submitted October 20, 2021 at 07:34PM by SRMish3
via reddit https://ift.tt/30A6UVC
https://ift.tt/3BZ6NAT
Submitted October 20, 2021 at 07:34PM by SRMish3
via reddit https://ift.tt/30A6UVC
JFrog
CVE-2020-27304 - RCE via Directory Traversal in CivetWeb HTTP server
Security research team discloses vulnerability in open-src web server software. Learn which ver are vulnerable & how to check if the CVE is exploitable in your software
SuDump: Exploiting sudo through kernel vulnerability
https://ift.tt/3CecZoV
Submitted October 20, 2021 at 07:25PM by Gr33nh4tt
via reddit https://ift.tt/2Z8CnO9
https://ift.tt/3CecZoV
Submitted October 20, 2021 at 07:25PM by Gr33nh4tt
via reddit https://ift.tt/2Z8CnO9
Alephsecurity
SuDump: Exploiting suid binaries through the kernel
WinRAR’s vulnerable trialware: when free software isn’t free
https://ift.tt/3jkHdyW
Submitted October 20, 2021 at 07:43PM by yarbabin
via reddit https://ift.tt/3vtRY6Q
https://ift.tt/3jkHdyW
Submitted October 20, 2021 at 07:43PM by yarbabin
via reddit https://ift.tt/3vtRY6Q
PT SWARM
WinRAR’s vulnerable trialware: when free software isn’t free
In this article we discuss a vulnerability in the trial version of WinRAR which has significant consequences for the management of third-party software. This vulnerability allows an attacker to intercept and modify requests sent to the user of the application.…
Utilizing Programmatic Identifiers (ProgIDs) for UAC Bypasses
https://ift.tt/3aV7Y8t
Submitted October 20, 2021 at 09:43PM by v3ded
via reddit https://ift.tt/3jlnuzc
https://ift.tt/3aV7Y8t
Submitted October 20, 2021 at 09:43PM by v3ded
via reddit https://ift.tt/3jlnuzc
v3ded.github.io
Utilizing Programmatic Identifiers (ProgIDs) for UAC Bypasses
Introduction In today’s blog, we will specifically talk about evading antivirus signatures that target registry keys which are associated with UAC (User Acco...