Project to Regularly and Automatically Update Docker Images that contains a lot of NetSec related tools
https://ift.tt/33dL77I
Submitted January 08, 2022 at 07:53PM by deleee
via reddit https://ift.tt/31DZj9r
https://ift.tt/33dL77I
Submitted January 08, 2022 at 07:53PM by deleee
via reddit https://ift.tt/31DZj9r
GitHub
GitHub - cybersecsi/RAUDI: A repo to automatically generate and keep updated a series of Docker images through GitHub Actions.
A repo to automatically generate and keep updated a series of Docker images through GitHub Actions. - GitHub - cybersecsi/RAUDI: A repo to automatically generate and keep updated a series of Docker...
Scanning millions of domains and compromising the email supply chain of Australia's most respected institutions
https://ift.tt/3F9WM4w
Submitted January 10, 2022 at 01:55AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GgpxxR
https://ift.tt/3F9WM4w
Submitted January 10, 2022 at 01:55AM by Jumpy_Resolution3089
via reddit https://ift.tt/3GgpxxR
Caniphish
Scanning millions of domains and compromising email supply chains | CanIPhish
Scanning millions of domains and compromising the email supply chain of Australia's most respected institutions.
ProtonVPN TCP Accleration SYN+ACK Spoofing Analysis
https://ift.tt/32YCAWv
Submitted January 10, 2022 at 08:19PM by netsecfriends
via reddit https://ift.tt/32WSQY1
https://ift.tt/32YCAWv
Submitted January 10, 2022 at 08:19PM by netsecfriends
via reddit https://ift.tt/32WSQY1
remyhax.xyz
ProtonVPN TCP Accleration SYN+ACK Spoofing Analysis
I was a Private Internet Access (PIA) customer for many, many years. Some recent changes spurred me to look for a new VPN provider and I ended up landing on ProtonVPN which I’ve been using for a few months now.
Domain Escalation – sAMAccountName Spoofing
https://ift.tt/3naUVq8
Submitted January 10, 2022 at 11:46PM by netbiosX
via reddit https://ift.tt/33nrvy1
https://ift.tt/3naUVq8
Submitted January 10, 2022 at 11:46PM by netbiosX
via reddit https://ift.tt/33nrvy1
Penetration Testing Lab
Domain Escalation – sAMAccountName Spoofing
Computer accounts have the $ sign appended at the end of their names in contrast with standard user accounts. By default Microsoft operating systems lack of security controls and hardening that wou…
Abusing terminal emulators with ANSI escape characters can lead to remote DDoS, character injection and more.
https://ift.tt/3qemT6m
Submitted January 11, 2022 at 12:04AM by jat0369
via reddit https://ift.tt/3f6RrjV
https://ift.tt/3qemT6m
Submitted January 11, 2022 at 12:04AM by jat0369
via reddit https://ift.tt/3f6RrjV
Cyberark
Don’t Trust This Title: Abusing Terminal Emulators with ANSI Escape Characters
One day, while I was working on OpenShift, a Kubernetes distribution by RedHat focused on developer experience and application security, I noticed that I was able to inject ANSI escape characters...
Domain Escalation - ShadowCoerce [MS-FSRVP]
https://ift.tt/3r6tbEj
Submitted January 11, 2022 at 05:38PM by netbiosX
via reddit https://ift.tt/3ngkhCW
https://ift.tt/3r6tbEj
Submitted January 11, 2022 at 05:38PM by netbiosX
via reddit https://ift.tt/3ngkhCW
Pentest Laboratories
ShadowCoerce
Coercing the domain controller machine account to authenticate to a host which is under the control of a threat actor could lead to domain compromise. The most notable technique which involves coer…
Writing an Exploit for CVE-2021-20038 (SonicWall SSL VPN)
https://ift.tt/3K2O8bG
Submitted January 11, 2022 at 07:44PM by chicksdigthelongrun
via reddit https://ift.tt/3raA3jM
https://ift.tt/3K2O8bG
Submitted January 11, 2022 at 07:44PM by chicksdigthelongrun
via reddit https://ift.tt/3raA3jM
AttackerKB
CVE-2021-20038 | AttackerKB
A Stack-based buffer overflow vulnerability in SMA100 Apache httpd server's mod_cgi module environment variables allows a remote unauthenticated attacker to po…
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environment to load, decrypt and execute shellcode.
https://ift.tt/3HLSe6e
Submitted January 11, 2022 at 10:24PM by tylous
via reddit https://ift.tt/3ti6mQL
https://ift.tt/3HLSe6e
Submitted January 11, 2022 at 10:24PM by tylous
via reddit https://ift.tt/3ti6mQL
GitHub
GitHub - optiv/Ivy: Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory.…
Ivy is a payload creation framework for the execution of arbitrary VBA (macro) source code directly in memory. Ivy’s loader does this by utilizing programmatical access in the VBA object environmen...
CVE-2021-41577: MITM to RCE in EVGA Precision X1
https://ift.tt/3zN3A73
Submitted January 11, 2022 at 10:10PM by hackers_and_builders
via reddit https://ift.tt/3HSm7BV
https://ift.tt/3zN3A73
Submitted January 11, 2022 at 10:10PM by hackers_and_builders
via reddit https://ift.tt/3HSm7BV
Rhino Security Labs
CVE-2021-41577: MITM to RCE in EVGA Precision X1 - Rhino Security Labs
Precision X1 is a software overclocking tool released by EVGA, which has recently received CVE-2021-41577.
TyphoonCon 2022 Early bird tickets are now on sale. Don’t miss out on the best All Offensive Security Conference in Asia.
https://ift.tt/3nd2tIH
Submitted January 11, 2022 at 09:59PM by JamesSalah
via reddit https://ift.tt/33lyur5
https://ift.tt/3nd2tIH
Submitted January 11, 2022 at 09:59PM by JamesSalah
via reddit https://ift.tt/33lyur5
Risk-aware applications
https://ift.tt/3GlTtbT
Submitted January 11, 2022 at 10:59PM by TolgaDevSec
via reddit https://ift.tt/3qeRjoX
https://ift.tt/3GlTtbT
Submitted January 11, 2022 at 10:59PM by TolgaDevSec
via reddit https://ift.tt/3qeRjoX
www.jerkeby.se
Risk-aware applications
Last year ended in a rush to patch the Log4j vulnerability. Most organisations lack controls to prevent or even detect exploitation of log4shell and similar vulnerabilities. That meant overtime, blocking productivity and costly delays. Once the dust settled…
Finding vulnerabiities in LoRaWAN's Protocol Stacks: Emulation with Qiling/Unicorn, P-Code emulation with Ghidra and AFL++ Fuzzing (Quick summary + complete 40 pages paper)
https://ift.tt/335FTLr
Submitted January 12, 2022 at 12:19AM by sebazzen
via reddit https://ift.tt/3Fcbp7u
https://ift.tt/335FTLr
Submitted January 12, 2022 at 12:19AM by sebazzen
via reddit https://ift.tt/3Fcbp7u
Trend Micro
LoRaWAN's Protocol Stacks: The Forgotten Targets at Risk
How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines and more.
https://ift.tt/34AQXQZ
Submitted January 11, 2022 at 11:58PM by jat0369
via reddit https://ift.tt/3HWvrVq
https://ift.tt/34AQXQZ
Submitted January 11, 2022 at 11:58PM by jat0369
via reddit https://ift.tt/3HWvrVq
Cyberark
Attacking RDP from Inside: How we abused named pipes for smart-card hijacking, unauthorized file system access to client machines…
In this blog post we are going to discuss the details of a vulnerability in Windows Remote Desktop Services, which we recently uncovered. We reported the vulnerability to Microsoft in a...
[CFP] Call for Papers for Hardwear.io Security Conference USA 2022 is OPEN!
https://ift.tt/3GAX5al
Submitted January 12, 2022 at 03:35PM by hardweario
via reddit https://ift.tt/33qxsu6
https://ift.tt/3GAX5al
Submitted January 12, 2022 at 03:35PM by hardweario
via reddit https://ift.tt/33qxsu6
www.hardwear.io
Call for Papers | hardwear.io | USA 2022
hardwear.io USA 2022 - Hardware Security Conference & Training is seeking innovative research on attacks or mitigation on any hardware. Submit your research paper.
Ransomware Actor May Have Leaked Their Previous Victims
https://ift.tt/3tlUf5a
Submitted January 12, 2022 at 07:08PM by Acrobatic-Pen-9949
via reddit https://ift.tt/3KgmnwH
https://ift.tt/3tlUf5a
Submitted January 12, 2022 at 07:08PM by Acrobatic-Pen-9949
via reddit https://ift.tt/3KgmnwH
reddit
Ransomware Actor May Have Leaked Their Previous Victims
Posted in r/netsec by u/Acrobatic-Pen-9949 • 1 point and 0 comments
Researchers release final version of academic study testing 25 EDR and EPP vendors against attacks vectors via CPL, HTA, DLL and EXE
https://ift.tt/3FlTI5i
Submitted January 12, 2022 at 07:02PM by woja111
via reddit https://ift.tt/3Ieyqc3
https://ift.tt/3FlTI5i
Submitted January 12, 2022 at 07:02PM by woja111
via reddit https://ift.tt/3Ieyqc3
Pre-Auth RCE in Moodle Part II - Session Hijack in Moodle's Shibboleth
https://ift.tt/3zPHjWl
Submitted January 12, 2022 at 08:03PM by albinowax
via reddit https://ift.tt/3ngysrt
https://ift.tt/3zPHjWl
Submitted January 12, 2022 at 08:03PM by albinowax
via reddit https://ift.tt/3ngysrt
Haxolot
Pre-Auth RCE in Moodle Part II - Session Hijack in Moodle's Shibboleth
In our previous blogpost we have introduced a pre-auth RCE in Moodles Shibboleth plugin. This RCE could be triggered when Moodle was configured to store sessions in individual files which is the default configuration for new installations. However, Moodle…
Malicious modifications to open source projects affecting thousands
https://ift.tt/3Gq3eWs
Submitted January 12, 2022 at 09:35PM by MiguelHzBz
via reddit https://ift.tt/3qkMaf9
https://ift.tt/3Gq3eWs
Submitted January 12, 2022 at 09:35PM by MiguelHzBz
via reddit https://ift.tt/3qkMaf9
Sysdig
Malicious modifications to open source projects affecting thousands - Sysdig Secure – Sysdig
Two extremely popular JavaScript open source packages, colors.js, and faker.js, were maliciously modified to the point of being unusable.
Exploit Kits vs. Google Chrome
https://ift.tt/3zQsvGZ
Submitted January 12, 2022 at 10:38PM by stashing_the_smack
via reddit https://ift.tt/3K5BPLS
https://ift.tt/3zQsvGZ
Submitted January 12, 2022 at 10:38PM by stashing_the_smack
via reddit https://ift.tt/3K5BPLS
Gendigital
Exploit Kits vs. Google Chrome
Chromium Exploits Fail to Gain Traction
ThePhish is an open-source tool that automates the entire phishing email analysis process starting from the extraction of the observables from the header and the body of an email to the elaboration of a verdict which is final in most cases. It is based on TheHive, Cortex and MISP.
https://ift.tt/3DHbcc3
Submitted January 12, 2022 at 07:45PM by emalderson
via reddit https://ift.tt/33s9n6a
https://ift.tt/3DHbcc3
Submitted January 12, 2022 at 07:45PM by emalderson
via reddit https://ift.tt/33s9n6a
GitHub
GitHub - emalderson/ThePhish: ThePhish: an automated phishing email analysis tool
ThePhish: an automated phishing email analysis tool - GitHub - emalderson/ThePhish: ThePhish: an automated phishing email analysis tool
Exploiting URL Parsing Confusion Vulnerabilities
https://ift.tt/3tlqm4O
Submitted January 13, 2022 at 03:44AM by ScottContini
via reddit https://ift.tt/3zTTAJp
https://ift.tt/3tlqm4O
Submitted January 13, 2022 at 03:44AM by ScottContini
via reddit https://ift.tt/3zTTAJp
Claroty
Exploiting URL Parsing Confusion
Discover how inconsistencies in different libraries parse URLs can be abused by attackers with Team82 and Claroty.