log4j — Getting to 2.16 and 2.17 is Only Critical If You Have Non-Default Logging Enabled
https://ift.tt/3pgW9Sh
Submitted December 19, 2021 at 11:24PM by danielrm26
via reddit https://ift.tt/3IYOy2x
https://ift.tt/3pgW9Sh
Submitted December 19, 2021 at 11:24PM by danielrm26
via reddit https://ift.tt/3IYOy2x
Daniel Miessler
The Subsequent Waves of log4j Vulnerabilities Aren't as Bad as People Think
If you're reading this you're underslept and over-caffeinated due to log4j. Thank you for your service. I have some good news. I know a super-smart guy
Log4j Vulnerability CVE-2021-45105: What You Need to Know (and how it differs from CVE-2021-45046)
https://ift.tt/3qd68qU
Submitted December 20, 2021 at 01:02PM by ScottContini
via reddit https://ift.tt/3yQBh7u
https://ift.tt/3qd68qU
Submitted December 20, 2021 at 01:02PM by ScottContini
via reddit https://ift.tt/3yQBh7u
letme.go - A minimalistic Meterpreter stager written in Go
https://ift.tt/3miTF3E
Submitted December 20, 2021 at 02:00PM by 0xdea
via reddit https://ift.tt/3yIbWfE
https://ift.tt/3miTF3E
Submitted December 20, 2021 at 02:00PM by 0xdea
via reddit https://ift.tt/3yIbWfE
HN Security
letme.go - A minimalistic Meterpreter stager written in Go - HN Security
Introducing a minimalistic Meterpreter stager written in Go (letme.go), useful in red teaming engagements.
Alan c2 post-exploitation framework v5.0 - All you can in-memory edition
https://ift.tt/3e7zHoc
Submitted December 19, 2021 at 09:51AM by aparata_s4tan
via reddit https://ift.tt/3Eb4JpO
https://ift.tt/3e7zHoc
Submitted December 19, 2021 at 09:51AM by aparata_s4tan
via reddit https://ift.tt/3Eb4JpO
Blogspot
Alan c2 Framework v5.0 - All you can in-memory edition
Twitter: @s4tan Download: https://github.com/enkomio/AlanFramework Documentation: https://github.com/enkomio/AlanFramework/tree/mai...
Inside a PBX - Discovering a Firmware Backdoor
https://ift.tt/3pcy5j9
Submitted December 20, 2021 at 06:29PM by RedTeamPentesting
via reddit https://ift.tt/3smuocS
https://ift.tt/3pcy5j9
Submitted December 20, 2021 at 06:29PM by RedTeamPentesting
via reddit https://ift.tt/3smuocS
OSS Getting Hammered for BigCorp Failures
https://ift.tt/3eaRTx8
Submitted December 20, 2021 at 10:50PM by GelosSnake
via reddit https://ift.tt/3qd6WMj
https://ift.tt/3eaRTx8
Submitted December 20, 2021 at 10:50PM by GelosSnake
via reddit https://ift.tt/3qd6WMj
Medium
OSS Getting Hammered for BigCorp Failures
Everyone heard of log4j by now
Intruding 5G SA core networks from outside and inside
https://ift.tt/3yIHWR7
Submitted December 21, 2021 at 03:37AM by sebazzen
via reddit https://ift.tt/3ed4kZb
https://ift.tt/3yIHWR7
Submitted December 21, 2021 at 03:37AM by sebazzen
via reddit https://ift.tt/3ed4kZb
Penthertz
Intruding 5G core networks from outside and inside | PentHertz Blog
Wireless and hardware security, firmware, mobile, pentest, trainings, development, hacking
RCE in Visual Studio Code's Remote WSL for Fun and Negative Profit
https://ift.tt/3pcjEM7
Submitted December 21, 2021 at 10:46AM by parsiya2
via reddit https://ift.tt/3pbz3fE
https://ift.tt/3pcjEM7
Submitted December 21, 2021 at 10:46AM by parsiya2
via reddit https://ift.tt/3pbz3fE
parsiya.net
RCE in Visual Studio Code's Remote WSL for Fun and Negative Profit
The Visual Studio Code server in Windows Subsystem for Linux uses a local
WebSocket WebSocket connection to communicate with the Remote WSL extension.
JavaScript in websites can connect to this server and execute arbitrary commands
on the target system. Assigned…
WebSocket WebSocket connection to communicate with the Remote WSL extension.
JavaScript in websites can connect to this server and execute arbitrary commands
on the target system. Assigned…
Android application testing using windows 11 and windows subsystem for android
https://ift.tt/3q8tIoJ
Submitted December 21, 2021 at 12:34PM by 0xdea
via reddit https://ift.tt/3ph5ZUa
https://ift.tt/3q8tIoJ
Submitted December 21, 2021 at 12:34PM by 0xdea
via reddit https://ift.tt/3ph5ZUa
Sensepost
SensePost | Android application testing using windows 11 and windows subsystem for android
Leaders in Information Security
Definitely Maybe with Bloom Filters
https://ift.tt/3edtLdi
Submitted December 21, 2021 at 01:51PM by selbekk
via reddit https://ift.tt/3ehcQX2
https://ift.tt/3edtLdi
Submitted December 21, 2021 at 01:51PM by selbekk
via reddit https://ift.tt/3ehcQX2
Common security issues when configuring HTTPs connections in Android
https://ift.tt/3JbApPl
Submitted December 21, 2021 at 06:36PM by Masrepus
via reddit https://ift.tt/3H2Ghsp
https://ift.tt/3JbApPl
Submitted December 21, 2021 at 06:36PM by Masrepus
via reddit https://ift.tt/3H2Ghsp
Hook Heaps and Live Free
https://ift.tt/3Ech0Kp
Submitted December 21, 2021 at 08:24PM by jat0369
via reddit https://ift.tt/3sp2aOH
https://ift.tt/3Ech0Kp
Submitted December 21, 2021 at 08:24PM by jat0369
via reddit https://ift.tt/3sp2aOH
Cyberark
Hook Heaps and Live Free
I wanted to write this blog post to talk a bit about Cobalt Strike, function hooking and the Windows heap. We will be targeting BeaconEye (https://github.com/CCob/BeaconEye) as our detection tool...
I made a tool to cover your tracks post-exploitation on Linux machines for Red Teamers
https://ift.tt/3yHk3cn
Submitted December 21, 2021 at 11:58PM by mufeedvh
via reddit https://ift.tt/3FpShUE
https://ift.tt/3yHk3cn
Submitted December 21, 2021 at 11:58PM by mufeedvh
via reddit https://ift.tt/3FpShUE
GitHub
GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. - GitHub - mufeedvh/moonwalk: Cover your tracks during Linux Exploitation by leaving zer...
Why it's hard to fix the Java ecosystem
https://ift.tt/3sfHVCT
Submitted December 22, 2021 at 06:56AM by Jazzlike-Vegetable69
via reddit https://ift.tt/3JcdNhV
https://ift.tt/3sfHVCT
Submitted December 22, 2021 at 06:56AM by Jazzlike-Vegetable69
via reddit https://ift.tt/3JcdNhV
Google Online Security Blog
Understanding the Impact of Apache Log4j Vulnerability
Posted by James Wetter and Nicky Ringland, Open Source Insights Team Editors Note: The below numbers were calculated based on both log4j-co...
intuitive advanced cryptography [PDF]
https://ift.tt/32mvNQ9
Submitted December 22, 2021 at 01:20PM by netfortius
via reddit https://ift.tt/3mkPRPx
https://ift.tt/32mvNQ9
Submitted December 22, 2021 at 01:20PM by netfortius
via reddit https://ift.tt/3mkPRPx
Vulnerabilities in the Abode IOTA security system (fixed as of Dec 17th 2021)
https://ift.tt/3yQJ1X1
Submitted December 22, 2021 at 03:33PM by jaymzu
via reddit https://ift.tt/3Eoveb7
https://ift.tt/3yQJ1X1
Submitted December 22, 2021 at 03:33PM by jaymzu
via reddit https://ift.tt/3Eoveb7
Microsoft Teams: 1 feature, 4 vulnerabilities
https://ift.tt/3pgwNUs
Submitted December 22, 2021 at 03:29PM by breakingsystems
via reddit https://ift.tt/3EdMtMo
https://ift.tt/3pgwNUs
Submitted December 22, 2021 at 03:29PM by breakingsystems
via reddit https://ift.tt/3EdMtMo
positive.security
MS Teams: 1 feature, 4 vulnerabilities | Positive Security
Microsoft Team's link preview feature is susceptible to spoofing and vulnerable to Server-Side Request Forgery. Team's Android users can be DoS'ed and, in the past, their IP address could be leaked.
Responder and IPv6 attacks - Inject a DNS suffix on Active Directory via IPv6 DNSSL
https://ift.tt/3pkNpul
Submitted December 22, 2021 at 08:40AM by Gallus
via reddit https://ift.tt/3piMlH9
https://ift.tt/3pkNpul
Submitted December 22, 2021 at 08:40AM by Gallus
via reddit https://ift.tt/3piMlH9
Blogspot
Responder and IPv6 attacks
Responder 3.1.1.0 comes with full IPv6 support by default, which allows you to perform more attacks on IPv4 and IPv6 networks. As pointed b...
Cloud Web Application Firewall (WAF) CyberRisk Validation Comparative Report
https://ift.tt/3yOsFOs
Submitted December 22, 2021 at 09:00PM by markcartertm
via reddit https://ift.tt/3ySD2Ba
https://ift.tt/3yOsFOs
Submitted December 22, 2021 at 09:00PM by markcartertm
via reddit https://ift.tt/3ySD2Ba
Cross Examination: Unveiling JavaScript injection based browser fingerprint masking attempts
https://ift.tt/32pOjws
Submitted December 22, 2021 at 11:34PM by ziyahanalbeniz
via reddit https://ift.tt/3phXHva
https://ift.tt/32pOjws
Submitted December 22, 2021 at 11:34PM by ziyahanalbeniz
via reddit https://ift.tt/3phXHva
Elastic Security disrupts new BLISTER campaign leveraging code signing certificates.
https://ift.tt/3yUdGCH
Submitted December 22, 2021 at 11:09PM by expertsnowboarder
via reddit https://ift.tt/3yRVqdh
https://ift.tt/3yUdGCH
Submitted December 22, 2021 at 11:09PM by expertsnowboarder
via reddit https://ift.tt/3yRVqdh
www.elastic.co
Elastic Security uncovers BLISTER malware campaign — Elastic Security Labs
Elastic Security has identified active intrusions leveraging the newly identified BLISTER malware loader utilizing valid code-signing certificates to evade detection. We are providing detection guidance for security teams to protect themselves.