Be aware of this trick: Python module hijacking leading to code execution
https://ift.tt/pMzTeaO
Submitted April 29, 2022 at 03:39PM by slashtmp00
via reddit https://ift.tt/lNZGkO2
https://ift.tt/pMzTeaO
Submitted April 29, 2022 at 03:39PM by slashtmp00
via reddit https://ift.tt/lNZGkO2
GitHub
GitHub - echo-devim/pyjacktrick: Python module hijacking POC
Python module hijacking POC. Contribute to echo-devim/pyjacktrick development by creating an account on GitHub.
Introducting MutableSecurity: Seamlessly deployment and management of security solutions
https://ift.tt/WLKEarI
Submitted April 29, 2022 at 08:11PM by iosifache
via reddit https://ift.tt/8TmCiLn
https://ift.tt/WLKEarI
Submitted April 29, 2022 at 08:11PM by iosifache
via reddit https://ift.tt/8TmCiLn
GitHub
GitHub - MutableSecurity/mutablesecurity: CLI program for automating the setup, configuration, and use of cybersecurity solutions
CLI program for automating the setup, configuration, and use of cybersecurity solutions - GitHub - MutableSecurity/mutablesecurity: CLI program for automating the setup, configuration, and use of c...
RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
https://ift.tt/BQct9vj
Submitted April 30, 2022 at 01:05PM by paran0ide
via reddit https://ift.tt/K0VuUxT
https://ift.tt/BQct9vj
Submitted April 30, 2022 at 01:05PM by paran0ide
via reddit https://ift.tt/K0VuUxT
Wiley Online Library
RW‐Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This paper proposes a new method for router admin portal vulnerability mining...
Releasing some free tools ⚒️ ✏️🔩
http://net-tools.io
Submitted May 01, 2022 at 08:01AM by xeonproc
via reddit https://ift.tt/BRrhzMF
http://net-tools.io
Submitted May 01, 2022 at 08:01AM by xeonproc
via reddit https://ift.tt/BRrhzMF
reddit
Releasing some free tools ⚒️ ✏️🔩
Posted in r/netsec by u/xeonproc • 17 points and 9 comments
Hacker to Receive $10 Million If He Returns $80 Million Stolen From Rari Capital's Lending Pools
https://ift.tt/waM5xTy
Submitted May 01, 2022 at 01:19PM by bugcat970
via reddit https://ift.tt/ZGYWPku
https://ift.tt/waM5xTy
Submitted May 01, 2022 at 01:19PM by bugcat970
via reddit https://ift.tt/ZGYWPku
Times Tabloid
Hacker to Receive $10 Million If He Returns $80 Million Stolen From Rari Capital's Lending Pools - Times Tabloid
Rari Capital, a decentralized finance (DeFI) platform, has recently been hacked for more than $80 million in various crypto assets held in multiple lending pools. In a recent tweet by the smart contract audit company BlockSec, an unknown hacker targeted Rari…
As an ethical hacker, network scanning techniques, also known as path tracing, can assist you in learning about a network’s logical configuration.
https://ift.tt/hOZ47Ud
Submitted May 01, 2022 at 03:30PM by RaccoonCivil5453
via reddit https://ift.tt/PSZ6p2f
https://ift.tt/hOZ47Ud
Submitted May 01, 2022 at 03:30PM by RaccoonCivil5453
via reddit https://ift.tt/PSZ6p2f
Sekurenet
Network Scanning Techniques: Ethical Hacking Basics - Sekurenet
Introduction As an ethical hacker, network scanning techniques, also known as path tracing, can assist you in learning about a network’s logical configuration. You can employ network scanning techniques to see if there are any firewalls, intrusion detection…
Analysis of phishing kill chain identifies emerging technique that exploits trust in your collaboration platforms
https://ift.tt/hAkKJYN
Submitted May 01, 2022 at 03:01PM by boybeaid
via reddit https://ift.tt/KMmAXcH
https://ift.tt/hAkKJYN
Submitted May 01, 2022 at 03:01PM by boybeaid
via reddit https://ift.tt/KMmAXcH
Cato Networks
Analysis of Phishing Kill Chain Identifies Emerging Technique That Exploits Trust in Your Collaboration Platforms
Trust Office 365? Think again. Phishing attacks are exploiting trust in collaboration platforms. Cato security analyst Zohar Buber explains.
AWS Targeted by a Package Backfill Attack
https://ift.tt/KoNi7Y9
Submitted May 02, 2022 at 01:58PM by viagas472
via reddit https://ift.tt/utMCiZg
https://ift.tt/KoNi7Y9
Submitted May 02, 2022 at 01:58PM by viagas472
via reddit https://ift.tt/utMCiZg
Mend
AWS Targeted by a Package Backfill Attack | Mend
On April 28 and April 30, respectively, Supply Chain Defender identified, blocked, and reported two packages we deemed were malicious versions of original
Augury Augury: Using Data Memory-Dependent Prefetchers to Leak Data at Rest (on Apple M1 and similar)
https://ift.tt/UWgnRio
Submitted May 02, 2022 at 06:21PM by nicuramar
via reddit https://ift.tt/r6fPwIQ
https://ift.tt/UWgnRio
Submitted May 02, 2022 at 06:21PM by nicuramar
via reddit https://ift.tt/r6fPwIQ
Augury
Using Data Memory-Dependent Prefetchers to Leak Data at Rest
How masscan works
https://ift.tt/XlJa2k7
Submitted May 02, 2022 at 07:44PM by rushter_
via reddit https://ift.tt/9z8thgA
https://ift.tt/XlJa2k7
Submitted May 02, 2022 at 07:44PM by rushter_
via reddit https://ift.tt/9z8thgA
Artem Golubin
How masscan works
This article describes how masscan works and why it is very fast.
DOing Harm
https://ift.tt/8l4gqoN
Submitted May 03, 2022 at 07:31AM by netsecfriends
via reddit https://ift.tt/JoV6Bzg
https://ift.tt/8l4gqoN
Submitted May 03, 2022 at 07:31AM by netsecfriends
via reddit https://ift.tt/JoV6Bzg
remyhax.xyz
DOing Harm
There’s this thing called Windows Delivery Optimization which allows “you to get Windows updates and Microsoft Store apps from sources in addition to Microsoft, like other PCs on your local network, or PCs on the internet that are downloading the same files.
Hacking a Bank by Finding a 0day in dotCMS
https://ift.tt/vTHxd7V
Submitted May 03, 2022 at 01:47PM by Mempodipper
via reddit https://ift.tt/a25vMEA
https://ift.tt/vTHxd7V
Submitted May 03, 2022 at 01:47PM by Mempodipper
via reddit https://ift.tt/a25vMEA
Zyxel firmware extraction and password analysis
https://ift.tt/oClFWGK
Submitted May 03, 2022 at 04:13PM by 0xdea
via reddit https://ift.tt/plKUb9X
https://ift.tt/oClFWGK
Submitted May 03, 2022 at 04:13PM by 0xdea
via reddit https://ift.tt/plKUb9X
hn security
Zyxel firmware extraction and password analysis - hn security
Backstory During a red teaming exercise […]
AvosLocker Ransomware Variant Abuses Avast Anti-Rootkit Driver File to Disable Anti-Virus
https://ift.tt/EyNlA4d
Submitted May 03, 2022 at 06:29PM by campuscodi
via reddit https://ift.tt/ASL735W
https://ift.tt/EyNlA4d
Submitted May 03, 2022 at 06:29PM by campuscodi
via reddit https://ift.tt/ASL735W
Trend Micro
AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell
We found an AvosLocker ransomware variant using a legitimate antivirus component to disable detection and blocking solutions.
Compromising Read-Only Containers with Fileless Malware
https://ift.tt/79XAFwS
Submitted May 03, 2022 at 09:41PM by MiguelHzBz
via reddit https://ift.tt/zYbXxoe
https://ift.tt/79XAFwS
Submitted May 03, 2022 at 09:41PM by MiguelHzBz
via reddit https://ift.tt/zYbXxoe
Sysdig
Compromising read-only containers with fileless malware – Sysdig
A read-only file system will not provide adequate protection to mitigate all vulnerabilities exploited via fileless malware techniques.
New update from Google's Threat Analysis Group finds numerous APTs running campaigns in Ukraine and Est. Europe, including Fancy Bear (Russia), Ghostwriter (Belarus) and Curious Gorge (China).
https://ift.tt/KlnHqX3
Submitted May 03, 2022 at 09:57PM by Ramsey_Power
via reddit https://ift.tt/7iLh8eW
https://ift.tt/KlnHqX3
Submitted May 03, 2022 at 09:57PM by Ramsey_Power
via reddit https://ift.tt/7iLh8eW
Google
Update on cyber activity in Eastern Europe
An update on cyber activity in eastern Europe.
Privilege escalation vulnerabilities discovered in Linux known as Nimbuspwn
https://ift.tt/lIgqtYU
Submitted May 03, 2022 at 11:51PM by sciencestudent99
via reddit https://ift.tt/EGkZF5f
https://ift.tt/lIgqtYU
Submitted May 03, 2022 at 11:51PM by sciencestudent99
via reddit https://ift.tt/EGkZF5f
FourCore
Privilege escalation vulnerabilities discovered in Linux known as Nimbuspwn - FourCore
Microsoft has disclosed a group of vulnerabilities in Linux known as Nimbuspwn that allows attackers to gain root privileges on a vulnerable system. Find out if you are vulnerable.
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk
https://ift.tt/ygLvsbc
Submitted May 04, 2022 at 01:34AM by 39816561
via reddit https://ift.tt/xQLgRsc
https://ift.tt/ygLvsbc
Submitted May 04, 2022 at 01:34AM by 39816561
via reddit https://ift.tt/xQLgRsc
Nozominetworks
Nozomi Networks Discovers Unpatched DNS Bug in Popular C Standard Library Putting IoT at Risk
Nozomi Networks Labs has disclosed an unpatched vulnerability affecting the DNS of popular C standard libraries potentially in use by millions of IoT devices: uClibc and uClibc-ng.
Responsible Disclosure: 6000 Vulnerability Submissions Later
https://ift.tt/GZTv5cm
Submitted May 04, 2022 at 01:55AM by ibuydan
via reddit https://ift.tt/lc0kKQw
https://ift.tt/GZTv5cm
Submitted May 04, 2022 at 01:55AM by ibuydan
via reddit https://ift.tt/lc0kKQw
Useful Security Tools and Resources for Digital Forensics
https://ift.tt/DPZWlJp
Submitted May 04, 2022 at 04:41AM by Khaotic_Kernel
via reddit https://ift.tt/ZeVP1UG
https://ift.tt/DPZWlJp
Submitted May 04, 2022 at 04:41AM by Khaotic_Kernel
via reddit https://ift.tt/ZeVP1UG
GitHub
GitHub - mikeroyal/Digital-Forensics-Guide: Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile…
Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database Forensics. - GitHub - mikeroyal/Digital-Forensics-Guide: Dig...
Exploiting Dynamic Linking Procedure In x64 ELF Binaries
https://ift.tt/xZprTdb
Submitted May 04, 2022 at 10:23AM by paran0ide
via reddit https://ift.tt/0YSONCr
https://ift.tt/xZprTdb
Submitted May 04, 2022 at 10:23AM by paran0ide
via reddit https://ift.tt/0YSONCr
Syst3m Failure
Ret2dl_resolve x64: Exploiting Dynamic Linking Procedure In x64 ELF Binaries
In this article, we will start analyzing the lazy binding process, we will proceed dissecting dl-runtime, understanding when is possible to use this technique without a leak, and finally we will build our exploit.