Garlicshare - Private and secure file sharing over the Tor network
https://ift.tt/3qW6yC9
Submitted January 07, 2022 at 12:06AM by ILDVUCE
via reddit https://ift.tt/31vpVJE
https://ift.tt/3qW6yC9
Submitted January 07, 2022 at 12:06AM by ILDVUCE
via reddit https://ift.tt/31vpVJE
GitHub
GitHub - R4yGM/garlicshare: Private and self-hosted file sharing over the Tor network written in golang
Private and self-hosted file sharing over the Tor network written in golang - GitHub - R4yGM/garlicshare: Private and self-hosted file sharing over the Tor network written in golang
The JNDI Strikes Back – Unauthenticated RCE in H2 Database Console
https://ift.tt/3pZHISD
Submitted January 07, 2022 at 02:52AM by SRMish3
via reddit https://ift.tt/3F7bXeF
https://ift.tt/3pZHISD
Submitted January 07, 2022 at 02:52AM by SRMish3
via reddit https://ift.tt/3F7bXeF
JFrog
JNDI-Related Vulnerability Discovered in H2 Database Console
Critical JNDI-based vulnerability exploiting the same root cause of Log4Shell. Read more from the JFrog Security Research Team describing the attack vector >
PHP 7.3-8.1 disable_functions bypass using string concatenation (PoC)
https://ift.tt/33a2oyi
Submitted January 07, 2022 at 07:42AM by dradzenglor
via reddit https://ift.tt/3t9lrnt
https://ift.tt/33a2oyi
Submitted January 07, 2022 at 07:42AM by dradzenglor
via reddit https://ift.tt/3t9lrnt
GitHub
exploits/php-concat-bypass at master · mm0r1/exploits
Pwn stuff. Contribute to mm0r1/exploits development by creating an account on GitHub.
Lopsided routing, a stealthy hole punch into FortiGate
https://ift.tt/33fwv7P
Submitted January 07, 2022 at 11:18PM by oherrala
via reddit https://ift.tt/34piFQB
https://ift.tt/33fwv7P
Submitted January 07, 2022 at 11:18PM by oherrala
via reddit https://ift.tt/34piFQB
Medium
Lopsided routing, a stealthy hole punch into FortiGate
A critical infrastructure player found a way for traffic to leak out from their isolated network and asked us for help. They had updated…
Mutual Authentication: A Component of Zero Trust
https://ift.tt/32SZZIS
Submitted January 08, 2022 at 01:26AM by alexfornuto
via reddit https://ift.tt/3G5plS8
https://ift.tt/32SZZIS
Submitted January 08, 2022 at 01:26AM by alexfornuto
via reddit https://ift.tt/3G5plS8
Pomerium
Mutual Authentication | Pomerium
This page describes the concept of mutual authentication and why it's important.
NPM might be executing malicious code in your CI without your knowledge
https://ift.tt/3G2sHoO
Submitted January 08, 2022 at 03:39AM by words_are_sacred
via reddit https://ift.tt/3q7u2Fa
https://ift.tt/3G2sHoO
Submitted January 08, 2022 at 03:39AM by words_are_sacred
via reddit https://ift.tt/3q7u2Fa
Medium
NPM might be executing malicious code in your CI without your knowledge
How to tell if you are using NPM safely within your CI
Project to Regularly and Automatically Update Docker Images that contains a lot of NetSec related tools
https://ift.tt/33dL77I
Submitted January 08, 2022 at 07:53PM by deleee
via reddit https://ift.tt/31DZj9r
https://ift.tt/33dL77I
Submitted January 08, 2022 at 07:53PM by deleee
via reddit https://ift.tt/31DZj9r
GitHub
GitHub - cybersecsi/RAUDI: A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.
A repo to automatically generate and keep updated a series of Docker images through GitHub Actions. - GitHub - cybersecsi/RAUDI: A repo to automatically generate and keep updated a series of Docker...
Scanning millions of domains and compromising the email supply chain of Australia's most respected institutions
https://ift.tt/3F9WM4w
Submitted January 10, 2022 at 01:55AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GgpxxR
https://ift.tt/3F9WM4w
Submitted January 10, 2022 at 01:55AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GgpxxR
Caniphish
Scanning millions of domains and compromising email supply chains | CanIPhish
Scanning millions of domains and compromising the email supply chain of Australia's most respected institutions.
ProtonVPN TCP Accleration SYN+ACK Spoofing Analysis
https://ift.tt/32YCAWv
Submitted January 10, 2022 at 08:19PM by netsecfriends
via reddit https://ift.tt/32WSQY1
https://ift.tt/32YCAWv
Submitted January 10, 2022 at 08:19PM by netsecfriends
via reddit https://ift.tt/32WSQY1
remyhax.xyz
ProtonVPN TCP Accleration SYN+ACK Spoofing Analysis
I was a Private Internet Access (PIA) customer for many, many years. Some recent changes spurred me to look for a new VPN provider and I ended up landing on ProtonVPN which I’ve been using for a few months now.
Domain Escalation – sAMAccountName Spoofing
https://ift.tt/3naUVq8
Submitted January 10, 2022 at 11:46PM by netbiosX
via reddit https://ift.tt/33nrvy1
https://ift.tt/3naUVq8
Submitted January 10, 2022 at 11:46PM by netbiosX
via reddit https://ift.tt/33nrvy1
Penetration Testing Lab
Domain Escalation – sAMAccountName Spoofing
Computer accounts have the $ sign appended at the end of their names in contrast with standard user accounts. By default Microsoft operating systems lack of security controls and hardening that wou…
Abusing terminal emulators with ANSI escape characters can lead to remote DDoS, character injection and more.
https://ift.tt/3qemT6m
Submitted January 11, 2022 at 12:04AM by jat0369
via reddit https://ift.tt/3f6RrjV
https://ift.tt/3qemT6m
Submitted January 11, 2022 at 12:04AM by jat0369
via reddit https://ift.tt/3f6RrjV
Cyberark
Don’t Trust This Title: Abusing Terminal Emulators with ANSI Escape Characters
One day, while I was working on OpenShift, a Kubernetes distribution by RedHat focused on developer experience and application security, I noticed that I was able to inject ANSI escape characters...
Domain Escalation - ShadowCoerce [MS-FSRVP]
https://ift.tt/3r6tbEj
Submitted January 11, 2022 at 05:38PM by netbiosX
via reddit https://ift.tt/3ngkhCW
https://ift.tt/3r6tbEj
Submitted January 11, 2022 at 05:38PM by netbiosX
via reddit https://ift.tt/3ngkhCW
Pentest Laboratories
ShadowCoerce
Coercing the domain controller machine account to authenticate to a host which is under the control of a threat actor could lead to domain compromise. The most notable technique which involves coer…
Writing an Exploit for CVE-2021-20038 (SonicWall SSL VPN)
https://ift.tt/3K2O8bG
Submitted January 11, 2022 at 07:44PM by chicksdigthelongrun
via reddit https://ift.tt/3raA3jM
https://ift.tt/3K2O8bG
Submitted January 11, 2022 at 07:44PM by chicksdigthelongrun
via reddit https://ift.tt/3raA3jM
AttackerKB
CVE-2021-20038 | AttackerKB
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to po…
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
https://ift.tt/3HLSe6e
Submitted January 11, 2022 at 10:24PM by tylous
via reddit https://ift.tt/3ti6mQL
https://ift.tt/3HLSe6e
Submitted January 11, 2022 at 10:24PM by tylous
via reddit https://ift.tt/3ti6mQL
GitHub
GitHub - optiv/Ivy: Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory.…
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen...
CVE-2021-41577: MITM to RCE in EVGA Precision X1
https://ift.tt/3zN3A73
Submitted January 11, 2022 at 10:10PM by hackers_and_builders
via reddit https://ift.tt/3HSm7BV
https://ift.tt/3zN3A73
Submitted January 11, 2022 at 10:10PM by hackers_and_builders
via reddit https://ift.tt/3HSm7BV
Rhino Security Labs
CVE-2021-41577: MITM to RCE in EVGA Precision X1 - Rhino Security Labs
Precision X1 is a software overclocking tool released by EVGA, which has recently received CVE-2021-41577.
TyphoonCon 2022 Early bird tickets are now on sale. Don’t miss out on the best All Offensive Security Conference in Asia.
https://ift.tt/3nd2tIH
Submitted January 11, 2022 at 09:59PM by JamesSalah
via reddit https://ift.tt/33lyur5
https://ift.tt/3nd2tIH
Submitted January 11, 2022 at 09:59PM by JamesSalah
via reddit https://ift.tt/33lyur5
Risk-aware applications
https://ift.tt/3GlTtbT
Submitted January 11, 2022 at 10:59PM by TolgaDevSec
via reddit https://ift.tt/3qeRjoX
https://ift.tt/3GlTtbT
Submitted January 11, 2022 at 10:59PM by TolgaDevSec
via reddit https://ift.tt/3qeRjoX
www.jerkeby.se
Risk-aware applications
Last year ended in a rush to patch the Log4j vulnerability. Most organisations lack controls to prevent or even detect exploitation of log4shell and similar vulnerabilities. That meant overtime, blocking productivity and costly delays. Once the dust settled…
Finding vulnerabiities in LoRaWAN's Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)
https://ift.tt/335FTLr
Submitted January 12, 2022 at 12:19AM by sebazzen
via reddit https://ift.tt/3Fcbp7u
https://ift.tt/335FTLr
Submitted January 12, 2022 at 12:19AM by sebazzen
via reddit https://ift.tt/3Fcbp7u
Trend Micro
LoRaWAN's Protocol Stacks: The Forgotten Targets at Risk
How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more.
https://ift.tt/34AQXQZ
Submitted January 11, 2022 at 11:58PM by jat0369
via reddit https://ift.tt/3HWvrVq
https://ift.tt/34AQXQZ
Submitted January 11, 2022 at 11:58PM by jat0369
via reddit https://ift.tt/3HWvrVq
Cyberark
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines…
In this blog post we are going to discuss the details of a vulnerability in Windows Remote Desktop Services, which we recently uncovered. We reported the vulnerability to Microsoft in a...
[CFP] Call for Papers for Hardwear.io Security Conference USA 2022 is OPEN!
https://ift.tt/3GAX5al
Submitted January 12, 2022 at 03:35PM by hardweario
via reddit https://ift.tt/33qxsu6
https://ift.tt/3GAX5al
Submitted January 12, 2022 at 03:35PM by hardweario
via reddit https://ift.tt/33qxsu6
www.hardwear.io
Call for Papers | hardwear.io | USA 2022
hardwear.io USA 2022 - Hardware Security Conference & Training is seeking innovative research on attacks or mitigation on any hardware. Submit your research paper.
Ransomware Actor May Have Leaked Their Previous Victims
https://ift.tt/3tlUf5a
Submitted January 12, 2022 at 07:08PM by Acrobatic-Pen-9949
via reddit https://ift.tt/3KgmnwH
https://ift.tt/3tlUf5a
Submitted January 12, 2022 at 07:08PM by Acrobatic-Pen-9949
via reddit https://ift.tt/3KgmnwH
reddit
Ransomware Actor May Have Leaked Their Previous Victims
Posted in r/netsec by u/Acrobatic-Pen-9949 • 1 point and 0 comments