ExtraReplica: cross-account database vulnerability in Azure PostgreSQL
https://ift.tt/nrDjFsf
Submitted April 28, 2022 at 06:59PM by sagitz_
via reddit https://ift.tt/o64nucd
https://ift.tt/nrDjFsf
Submitted April 28, 2022 at 06:59PM by sagitz_
via reddit https://ift.tt/o64nucd
wiz.io
Wiz Research discovers "ExtraReplica"— a cross-account database vulnerability in Azure PostgreSQL | Wiz Blog
Wiz Research discovers a chain of critical vulnerabilities in the widely used Azure Database for PostgreSQL Flexible Server.
How to save fiddler everywhere result in SEQUENCE it captured ? I'm trying to save the raw date IN SEQUENCE it captured but unable to save in sequece it captured.
https://ift.tt/B1Gsnar
Submitted April 28, 2022 at 09:36PM by sahastra
via reddit https://ift.tt/i0dqYyk
https://ift.tt/B1Gsnar
Submitted April 28, 2022 at 09:36PM by sahastra
via reddit https://ift.tt/i0dqYyk
Telerik.com
The Ultimate Web Debugging Tool - Download Fiddler Everywhere | Telerik
Download Fiddler Everywhere, the professionally built and supported web debugging proxy tool for Windows, macOS, and Linux. Free and fully-functional trial.
How to master Google Hacking (Dorking)
https://ift.tt/61sRBU4
Submitted April 28, 2022 at 09:33PM by hisfuntie
via reddit https://ift.tt/UIEFB63
https://ift.tt/61sRBU4
Submitted April 28, 2022 at 09:33PM by hisfuntie
via reddit https://ift.tt/UIEFB63
Medium
How to master Google Hacking (Dorking)
Google hacking, sometimes, referred to as Google Dorking, is an information-gathering technique used by an attacker leveraging advanced…
Bypassing LDAP Channel Binding with StartTLS
https://ift.tt/FUA1g5S
Submitted April 28, 2022 at 09:33PM by AlmondOffSec
via reddit https://ift.tt/kLH57zN
https://ift.tt/FUA1g5S
Submitted April 28, 2022 at 09:33PM by AlmondOffSec
via reddit https://ift.tt/kLH57zN
reddit
Bypassing LDAP Channel Binding with StartTLS
Posted in r/netsec by u/AlmondOffSec • 14 points and 0 comments
Anatomy of a Zero Day - How to decrypt....a robot?
https://ift.tt/3ZcE2MO
Submitted April 28, 2022 at 10:12PM by 312sec
via reddit https://ift.tt/lG2VRje
https://ift.tt/3ZcE2MO
Submitted April 28, 2022 at 10:12PM by 312sec
via reddit https://ift.tt/lG2VRje
Dolos Group
Anatomy of a Zero Day - How to decrypt....a robot? — Dolos Group
That noscript would have sounded very weird to me a year ago but that’s exactly what happened. Let me walk you through how we were approached by a client for a code review, had to find a zero day just to get started (CVE-2022-29856), and ultimately “decrypted…
reposaur - use Rego to audit your GitHub org security posture
https://ift.tt/oOM4fxU
Submitted April 28, 2022 at 11:48PM by fproulx
via reddit https://ift.tt/RfSMA94
https://ift.tt/oOM4fxU
Submitted April 28, 2022 at 11:48PM by fproulx
via reddit https://ift.tt/RfSMA94
GitHub
GitHub - reposaur/reposaur: Open source compliance tool for development platforms.
Open source compliance tool for development platforms. - GitHub - reposaur/reposaur: Open source compliance tool for development platforms.
Colibri Loader's Unique Persistence Technique Using Get-Variable Cmdlet
https://ift.tt/hRTAMZE
Submitted April 28, 2022 at 11:10PM by sciencestudent99
via reddit https://ift.tt/wlmnZhG
https://ift.tt/hRTAMZE
Submitted April 28, 2022 at 11:10PM by sciencestudent99
via reddit https://ift.tt/wlmnZhG
FourCore
Colibri Loader's unique Persistence Technique using Get-Variable cmdlet - FourCore
Colibri Loader uses a novel method of Persistence which makes use of Get-Variable cmdlet to run its executable every time powershell is launched. Here we cover the method, why it works, and how to detect such TTPs.
Kubernetes Goat - Interactive Kubernetes Security Learning Playground 🚀
https://ift.tt/Z2IQ76o
Submitted April 29, 2022 at 12:42AM by madhuakula
via reddit https://ift.tt/r3yZC58
https://ift.tt/Z2IQ76o
Submitted April 29, 2022 at 12:42AM by madhuakula
via reddit https://ift.tt/r3yZC58
Madhuakula
Welcome to Kubernetes Goat | Kubernetes Goat
Interactive Kubernetes Security Learning Playground
Socket: New tool takes a proactive approach to prevent OSS supply chain attacks
https://ift.tt/RTBtv56
Submitted April 29, 2022 at 01:42AM by feross
via reddit https://ift.tt/Jy15eVx
https://ift.tt/RTBtv56
Submitted April 29, 2022 at 01:42AM by feross
via reddit https://ift.tt/Jy15eVx
The Daily Swig | Cybersecurity news and views
Socket: New tool takes a proactive approach to prevent OSS supply chain attacks
Signal detector aims to help developers to stay ahead of threats
LAPSUS$: Recent techniques, tactics and procedures
https://ift.tt/wI7KQol
Submitted April 29, 2022 at 12:57AM by digicat
via reddit https://ift.tt/VDnaHRJ
https://ift.tt/wI7KQol
Submitted April 29, 2022 at 12:57AM by digicat
via reddit https://ift.tt/VDnaHRJ
NCC Group Research
LAPSUS$: Recent techniques, tactics and procedures
This post describes the techniques, tactics and procedures we observed during recent LAPSUS$ incidents.
Be aware of this trick: Python module hijacking leading to code execution
https://ift.tt/pMzTeaO
Submitted April 29, 2022 at 03:39PM by slashtmp00
via reddit https://ift.tt/lNZGkO2
https://ift.tt/pMzTeaO
Submitted April 29, 2022 at 03:39PM by slashtmp00
via reddit https://ift.tt/lNZGkO2
GitHub
GitHub - echo-devim/pyjacktrick: Python module hijacking POC
Python module hijacking POC. Contribute to echo-devim/pyjacktrick development by creating an account on GitHub.
Introducting MutableSecurity: Seamlessly deployment and management of security solutions
https://ift.tt/WLKEarI
Submitted April 29, 2022 at 08:11PM by iosifache
via reddit https://ift.tt/8TmCiLn
https://ift.tt/WLKEarI
Submitted April 29, 2022 at 08:11PM by iosifache
via reddit https://ift.tt/8TmCiLn
GitHub
GitHub - MutableSecurity/mutablesecurity: CLI program for automating the setup, configuration, and use of cybersecurity solutions
CLI program for automating the setup, configuration, and use of cybersecurity solutions - GitHub - MutableSecurity/mutablesecurity: CLI program for automating the setup, configuration, and use of c...
RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
https://ift.tt/BQct9vj
Submitted April 30, 2022 at 01:05PM by paran0ide
via reddit https://ift.tt/K0VuUxT
https://ift.tt/BQct9vj
Submitted April 30, 2022 at 01:05PM by paran0ide
via reddit https://ift.tt/K0VuUxT
Wiley Online Library
RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This paper proposes a new method for router admin portal vulnerability mining...
Releasing some free tools ⚒️ ✏️🔩
http://net-tools.io
Submitted May 01, 2022 at 08:01AM by xeonproc
via reddit https://ift.tt/BRrhzMF
http://net-tools.io
Submitted May 01, 2022 at 08:01AM by xeonproc
via reddit https://ift.tt/BRrhzMF
reddit
Releasing some free tools ⚒️ ✏️🔩
Posted in r/netsec by u/xeonproc • 17 points and 9 comments
Hacker to Receive $10 Million If He Returns $80 Million Stolen From Rari Capital's Lending Pools
https://ift.tt/waM5xTy
Submitted May 01, 2022 at 01:19PM by bugcat970
via reddit https://ift.tt/ZGYWPku
https://ift.tt/waM5xTy
Submitted May 01, 2022 at 01:19PM by bugcat970
via reddit https://ift.tt/ZGYWPku
Times Tabloid
Hacker to Receive $10 Million If He Returns $80 Million Stolen From Rari Capital's Lending Pools - Times Tabloid
Rari Capital, a decentralized finance (DeFI) platform, has recently been hacked for more than $80 million in various crypto assets held in multiple lending pools. In a recent tweet by the smart contract audit company BlockSec, an unknown hacker targeted Rari…
As an ethical hacker, network scanning techniques, also known as path tracing, can assist you in learning about a network’s logical configuration.
https://ift.tt/hOZ47Ud
Submitted May 01, 2022 at 03:30PM by RaccoonCivil5453
via reddit https://ift.tt/PSZ6p2f
https://ift.tt/hOZ47Ud
Submitted May 01, 2022 at 03:30PM by RaccoonCivil5453
via reddit https://ift.tt/PSZ6p2f
Sekurenet
Network Scanning Techniques: Ethical Hacking Basics - Sekurenet
Introduction As an ethical hacker, network scanning techniques, also known as path tracing, can assist you in learning about a network’s logical configuration. You can employ network scanning techniques to see if there are any firewalls, intrusion detection…
Analysis of phishing kill chain identifies emerging technique that exploits trust in your collaboration platforms
https://ift.tt/hAkKJYN
Submitted May 01, 2022 at 03:01PM by boybeaid
via reddit https://ift.tt/KMmAXcH
https://ift.tt/hAkKJYN
Submitted May 01, 2022 at 03:01PM by boybeaid
via reddit https://ift.tt/KMmAXcH
Cato Networks
Analysis of Phishing Kill Chain Identifies Emerging Technique That Exploits Trust in Your Collaboration Platforms
Trust Office 365? Think again. Phishing attacks are exploiting trust in collaboration platforms. Cato security analyst Zohar Buber explains.
AWS Targeted by a Package Backfill Attack
https://ift.tt/KoNi7Y9
Submitted May 02, 2022 at 01:58PM by viagas472
via reddit https://ift.tt/utMCiZg
https://ift.tt/KoNi7Y9
Submitted May 02, 2022 at 01:58PM by viagas472
via reddit https://ift.tt/utMCiZg
Mend
AWS Targeted by a Package Backfill Attack | Mend
On April 28 and April 30, respectively, Supply Chain Defender identified, blocked, and reported two packages we deemed were malicious versions of original
Augury Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest (on Apple M1 and similar)
https://ift.tt/UWgnRio
Submitted May 02, 2022 at 06:21PM by nicuramar
via reddit https://ift.tt/r6fPwIQ
https://ift.tt/UWgnRio
Submitted May 02, 2022 at 06:21PM by nicuramar
via reddit https://ift.tt/r6fPwIQ
Augury
Using Data Memory-Dependent Prefetchers to Leak Data at Rest
How masscan works
https://ift.tt/XlJa2k7
Submitted May 02, 2022 at 07:44PM by rushter_
via reddit https://ift.tt/9z8thgA
https://ift.tt/XlJa2k7
Submitted May 02, 2022 at 07:44PM by rushter_
via reddit https://ift.tt/9z8thgA
Artem Golubin
How masscan works
This article describes how masscan works and why it is very fast.
DOing Harm
https://ift.tt/8l4gqoN
Submitted May 03, 2022 at 07:31AM by netsecfriends
via reddit https://ift.tt/JoV6Bzg
https://ift.tt/8l4gqoN
Submitted May 03, 2022 at 07:31AM by netsecfriends
via reddit https://ift.tt/JoV6Bzg
remyhax.xyz
DOing Harm
There’s this thing called Windows Delivery Optimization which allows “you to get Windows updates and Microsoft Store apps from sources in addition to Microsoft, like other PCs on your local network, or PCs on the internet that are downloading the same files.