Exploiting CSP in Webkit to Break Authentication & Authorization
https://ift.tt/3C7WGZK
Submitted November 14, 2021 at 10:41AM by 1lastBr3ath
via reddit https://ift.tt/3ndVUGw
https://ift.tt/3C7WGZK
Submitted November 14, 2021 at 10:41AM by 1lastBr3ath
via reddit https://ift.tt/3ndVUGw
threatnix.io
Exploiting CSP in Webkit to Break Authentication & Authorization
This blog post will discuss our findings that we presented in our Blackhat Europe talk noscriptd "Exploiting CSP in Webkit to break Authentication/Authorization", a vulnerability that enabled us to takeover user accounts on most of the web applications out thereby…
Exploiting CSP in Webkit to Break Authentication & Authorization
https://ift.tt/3C7WGZK
Submitted November 14, 2021 at 04:20PM by antfigunio
via reddit https://ift.tt/3caABzm
https://ift.tt/3C7WGZK
Submitted November 14, 2021 at 04:20PM by antfigunio
via reddit https://ift.tt/3caABzm
threatnix.io
Exploiting CSP in Webkit to Break Authentication & Authorization
This blog post will discuss our findings that we presented in our Blackhat Europe talk noscriptd "Exploiting CSP in Webkit to break Authentication/Authorization", a vulnerability that enabled us to takeover user accounts on most of the web applications out thereby…
Revealing LAMBERTS/LONGHORN Malware Capabilities using a step-by-step approach
https://ift.tt/3wGCgpI
Submitted November 14, 2021 at 07:50PM by CyberMasterV
via reddit https://ift.tt/3Dinmbs
https://ift.tt/3wGCgpI
Submitted November 14, 2021 at 07:50PM by CyberMasterV
via reddit https://ift.tt/3Dinmbs
reddit
Revealing LAMBERTS/LONGHORN Malware Capabilities using a...
Posted in r/netsec by u/CyberMasterV • 26 points and 6 comments
Living Off Trusted Sites (LOTS) Project Attackers are using popular legitimate domains when conducting phishing, C&C, exfiltration and downloading tools to evade detection. The list of websites below allow attackers to use their domain or subdomain
https://ift.tt/3CjV52V
Submitted November 14, 2021 at 11:29PM by digicat
via reddit https://ift.tt/3orBhpI
https://ift.tt/3CjV52V
Submitted November 14, 2021 at 11:29PM by digicat
via reddit https://ift.tt/3orBhpI
reddit
Living Off Trusted Sites (LOTS) Project Attackers are using...
Posted in r/netsec by u/digicat • 153 points and 14 comments
RCE in Concrete CMS by exploiting a double race condition (and some php tricks)
https://ift.tt/31Sf5gE
Submitted November 15, 2021 at 12:54PM by adrian_rt
via reddit https://ift.tt/31Sfj7u
https://ift.tt/31Sf5gE
Submitted November 15, 2021 at 12:54PM by adrian_rt
via reddit https://ift.tt/31Sfj7u
Cyber Security Services - London
Multiple Concrete CMS vulnerabilities ( part1 - RCE )
Multiple vulnerabilities in concrete cms. File upload, double race condition, RCE, turbo intruder.
Running a WiFi-less Home Network: Security Paranoid Edition
https://ift.tt/3DmrzLA
Submitted November 15, 2021 at 06:46PM by Robbedoes_
via reddit https://ift.tt/3FeVW79
https://ift.tt/3DmrzLA
Submitted November 15, 2021 at 06:46PM by Robbedoes_
via reddit https://ift.tt/3FeVW79
Medium
Running a WiFi-less Home Network: Security Paranoid Edition
And a few reason why you should consider it.
Exchange Exploit Leads to Domain Wide Ransomware
https://ift.tt/3wLCEDb
Submitted November 15, 2021 at 05:54PM by TheDFIRReport
via reddit https://ift.tt/3HmOIjk
https://ift.tt/3wLCEDb
Submitted November 15, 2021 at 05:54PM by TheDFIRReport
via reddit https://ift.tt/3HmOIjk
The DFIR Report
Exchange Exploit Leads to Domain Wide Ransomware
In late September 2021, we observed an intrusion in which initial access was gained by the threat actor exploiting multiple vulnerabilities in Microsoft Exchange. The threat actors in this case wer…
T-Reqs: HTTP Request Smuggling with Differential Fuzzing
https://ift.tt/30wbXqv
Submitted November 15, 2021 at 07:52PM by albinowax
via reddit https://ift.tt/3qIuSZQ
https://ift.tt/30wbXqv
Submitted November 15, 2021 at 07:52PM by albinowax
via reddit https://ift.tt/3qIuSZQ
Domain Persistence - Golden Certificate
https://ift.tt/3HmxUJa
Submitted November 15, 2021 at 09:49PM by netbiosX
via reddit https://ift.tt/3oz3YAO
https://ift.tt/3HmxUJa
Submitted November 15, 2021 at 09:49PM by netbiosX
via reddit https://ift.tt/3oz3YAO
Penetration Testing Lab
Golden Certificate
Domain persistence techniques enable red teams that have compromised the domain to operate with the highest level of privileges in a large period. One of the most common domain persistence techniqu…
Blacksmith – Rowhammer is back on DDR4
https://ift.tt/3qEUZRn
Submitted November 15, 2021 at 09:37PM by braincrowd
via reddit https://ift.tt/3kGp0wy
https://ift.tt/3qEUZRn
Submitted November 15, 2021 at 09:37PM by braincrowd
via reddit https://ift.tt/3kGp0wy
reddit
Blacksmith – Rowhammer is back on DDR4
Posted in r/netsec by u/braincrowd • 1 point and 0 comments
Taking the pain out of C2 infrastructure (Part 2)
https://ift.tt/3DnqN0A
Submitted November 16, 2021 at 12:15AM by scopedsecurity
via reddit https://ift.tt/3ngNyO7
https://ift.tt/3DnqN0A
Submitted November 16, 2021 at 12:15AM by scopedsecurity
via reddit https://ift.tt/3ngNyO7
Substack
Taking the pain out of C2 infrastructure (Part 2)
Modernizing the CIA's operational infrastructure. Multi/Hybrid Cloud Docker Swarm clusters and mesh VPN networks 🐿
AFL++ on Android with QEMU support
https://ift.tt/3nj6Oul
Submitted November 16, 2021 at 06:46PM by Gr33nh4tt
via reddit https://ift.tt/3HnGE1T
https://ift.tt/3nj6Oul
Submitted November 16, 2021 at 06:46PM by Gr33nh4tt
via reddit https://ift.tt/3HnGE1T
Alephsecurity
AFL++ on Android with QEMU support
Seamlessly Discovering Netgear Universal Plug-and-Pwn (UPnP) 0-days (Even More Netgear Pwnage)
https://ift.tt/3Fr97C9
Submitted November 16, 2021 at 06:34PM by pocorgtfoftw
via reddit https://ift.tt/3Dm04kZ
https://ift.tt/3Fr97C9
Submitted November 16, 2021 at 06:34PM by pocorgtfoftw
via reddit https://ift.tt/3Dm04kZ
Grimm-Co
Seamlessly Discovering Netgear Universal Plug-and-Pwn (UPnP) 0-days
Introduction A Vulnerability Researcher’s Favorite Stress Relief Continuing in our series of research findings involving Netgear 1 produc...
INTENT 2021: Security Research Summit is LIVE!
https://ift.tt/3CmP2ej
Submitted November 16, 2021 at 06:56PM by IdoHoo
via reddit https://ift.tt/3cedeF3
https://ift.tt/3CmP2ej
Submitted November 16, 2021 at 06:56PM by IdoHoo
via reddit https://ift.tt/3cedeF3
On24
INTENT 2021: Security Research Summit
CVE-2021-41228: TensorFlow Python Code Injection - More eval() Woes
https://ift.tt/3HlO8SZ
Submitted November 16, 2021 at 08:13PM by SRMish3
via reddit https://ift.tt/3ow9JiV
https://ift.tt/3HlO8SZ
Submitted November 16, 2021 at 08:13PM by SRMish3
via reddit https://ift.tt/3ow9JiV
JFrog
New code injection vulnerability discovered in TensorFlow
JFrog Security research team identifies vulnerability in TensorFlow allowing an attacker to insert a malicious input that runs arbitrary Python code. Learn more >
BazarLoader ‘call me back’ attack abuses Windows 10 Apps mechanism
https://ift.tt/30kWc5I
Submitted November 16, 2021 at 09:29PM by ksr_malware
via reddit https://ift.tt/3kJLgFH
https://ift.tt/30kWc5I
Submitted November 16, 2021 at 09:29PM by ksr_malware
via reddit https://ift.tt/3kJLgFH
Sophos News
BazarLoader ‘call me back’ attack abuses Windows 10 Apps mechanism
The unusual technique invokes the Windows App Installer to deliver malware
Cryptominer attacks are on the rise. Muhstik Botnet attacking a Kubernetes Pod
https://ift.tt/31WLv9M
Submitted November 16, 2021 at 09:54PM by MiguelHzBz
via reddit https://ift.tt/3DyMris
https://ift.tt/31WLv9M
Submitted November 16, 2021 at 09:54PM by MiguelHzBz
via reddit https://ift.tt/3DyMris
Sysdig
Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes – Sysdig
How to detect the Muhstik Botnet attacking a Kubernetes Pod to control the Pod and mine cryptocurrency and DDoS.
Windows Security Updates for Hackers
https://ift.tt/30cT77a
Submitted November 17, 2021 at 12:32PM by 0xdea
via reddit https://ift.tt/30sRoec
https://ift.tt/30cT77a
Submitted November 17, 2021 at 12:32PM by 0xdea
via reddit https://ift.tt/30sRoec
bitsadm.in
Windows Security Updates for Hackers « Bitsadmin's blog - Mystery guest in your IT infrastructure
Frequently colleagues and clients get to my (virtual) desk and pose the following question to me: “I know which patches (KBs) are installed on a Windows syst...
Easily Identify Malicious Servers on the Internet with JARM.
https://ift.tt/38RZwXG
Submitted November 17, 2021 at 09:47PM by j_b_11
via reddit https://ift.tt/3FjPoUG
https://ift.tt/38RZwXG
Submitted November 17, 2021 at 09:47PM by j_b_11
via reddit https://ift.tt/3FjPoUG
Salesforce Engineering Blog
Easily Identify Malicious Servers on the Internet with JARM - Salesforce Engineering Blog
JARM is an active Transport Layer Security server fingerprinting tool that provides the ability to identify and group malicious servers.
CVE-2021-41349 Exchange XSS PoC
https://ift.tt/3wTB4PG
Submitted November 16, 2021 at 07:52PM by 0x0021h
via reddit https://ift.tt/3CCLZPj
https://ift.tt/3wTB4PG
Submitted November 16, 2021 at 07:52PM by 0x0021h
via reddit https://ift.tt/3CCLZPj
Cobalt Strike: Decrypting Obfuscated Traffic – Part 4
https://ift.tt/3HxJyRt
Submitted November 18, 2021 at 02:35AM by ksr_malware
via reddit https://ift.tt/3nshPde
https://ift.tt/3HxJyRt
Submitted November 18, 2021 at 02:35AM by ksr_malware
via reddit https://ift.tt/3nshPde