POC for CVE-2022-1388
https://ift.tt/ptedTUB
Submitted May 09, 2022 at 05:36PM by scopedsecurity
via reddit https://ift.tt/eskP4jM
https://ift.tt/ptedTUB
Submitted May 09, 2022 at 05:36PM by scopedsecurity
via reddit https://ift.tt/eskP4jM
GitHub
GitHub - horizon3ai/CVE-2022-1388: POC for CVE-2022-1388
POC for CVE-2022-1388. Contribute to horizon3ai/CVE-2022-1388 development by creating an account on GitHub.
Vulnerability Analysis - CVE-2022-1388 - Randori
https://ift.tt/5bYVxnO
Submitted May 09, 2022 at 09:24PM by zxcvqwerpl
via reddit https://ift.tt/juoWeTC
https://ift.tt/5bYVxnO
Submitted May 09, 2022 at 09:24PM by zxcvqwerpl
via reddit https://ift.tt/juoWeTC
Randori
Vulnerability Analysis - CVE-2022-1388 - Randori
CVE-2022-1388 is a critical vulnerability (CVSS 9.8) in the management interface of F5 Networks’ BIG-IP solution.
Ransomware-as-a-service: Understanding the cybercrime gig economy and how to protect yourself
https://ift.tt/qJzh2wt
Submitted May 09, 2022 at 09:51PM by SCI_Rusher
via reddit https://ift.tt/nVMpHIm
https://ift.tt/qJzh2wt
Submitted May 09, 2022 at 09:51PM by SCI_Rusher
via reddit https://ift.tt/nVMpHIm
Microsoft News
Ransomware as a service: Understanding the cybercrime gig economy and how to protect yourself
Microsoft coined the term “human-operated ransomware” to clearly define a class of attack driven by expert human intelligence at every step of the attack chain and culminate in intentional business disruption and extortion. In this blog, we explain the ransomware…
Diving into Pre-Created computer accounts in Active Directory
https://ift.tt/R51IZdm
Submitted May 10, 2022 at 06:42PM by oddvarmoe
via reddit https://ift.tt/Zl02wfI
https://ift.tt/R51IZdm
Submitted May 10, 2022 at 06:42PM by oddvarmoe
via reddit https://ift.tt/Zl02wfI
TrustedSec
Diving into Pre-Created Computer Accounts - TrustedSec
Go on a journey with Oddvar Moe as he uses his legacy knowledge to abuse pre-created computer accounts that could potentially let you escalate privileges.
Learning Linux kernel exploitation - Part 2 - CVE-2022-0847 (DirtyPipe)
https://ift.tt/tyYKXHR
Submitted May 10, 2022 at 07:54PM by 0x00rick
via reddit https://ift.tt/Nk8s9Ld
https://ift.tt/tyYKXHR
Submitted May 10, 2022 at 07:54PM by 0x00rick
via reddit https://ift.tt/Nk8s9Ld
Low-level adventures
Learning Linux kernel exploitation - Part 2 - CVE-2022-0847
Continuing to walk down Linux Kernel exploitation lane. This time around with an unanticipated topic: DirtyPipe as it actually nicely fits the series as an example.
Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923)
https://ift.tt/eBnU4X2
Submitted May 11, 2022 at 02:16AM by ly4k_
via reddit https://ift.tt/TAFGSWH
https://ift.tt/eBnU4X2
Submitted May 11, 2022 at 02:16AM by ly4k_
via reddit https://ift.tt/TAFGSWH
Medium
Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923)
In this blog post, we’ll dive into a recently patched Active Directory Domain Privilege Escalation vulnerability that I reported through…
The new PaaS "Frappo" was detected on the dark web by researchers Resecurity Hunter. It is technically a browser extension on Chrome's Store and provides creating high-quality phishing pages.
https://ift.tt/jlwbSXC
Submitted May 11, 2022 at 07:28PM by mstfknn
via reddit https://ift.tt/AOYI7fa
https://ift.tt/jlwbSXC
Submitted May 11, 2022 at 07:28PM by mstfknn
via reddit https://ift.tt/AOYI7fa
BRANDEFENSE
Frappo: A New "Phishing-as-a-Service" On The Dark Web - BRANDEFENSE
A new underground phishing-as-a-service (PaaS) called "Frappo" has been detected on the dark web by security researchers at Resecurity Hunter.
URL spoofing in Box, Google, and Zoom
https://ift.tt/iQOEBgF
Submitted May 12, 2022 at 01:55AM by rsobers
via reddit https://ift.tt/O9v7lN5
https://ift.tt/iQOEBgF
Submitted May 12, 2022 at 01:55AM by rsobers
via reddit https://ift.tt/O9v7lN5
Varonis
Spoofing SaaS Vanity URLs for Social Engineering Attacks
SaaS vanity URLs can be spoofed and used for phishing campaigns and other attacks. In this article, we’ll showcase two Box link types, two Zoom link types, and two Google Docs link type that we were able to spoof.
Ddosify – Simple Load Testing Tool
https://ift.tt/WZei8QA
Submitted May 12, 2022 at 04:21AM by binaryfor
via reddit https://ift.tt/NI54rHk
https://ift.tt/WZei8QA
Submitted May 12, 2022 at 04:21AM by binaryfor
via reddit https://ift.tt/NI54rHk
GitHub
GitHub - ddosify/ddosify: Comprehensive Performance Testing Platform. Available on CLI, Self-Hosted, and Cloud - https://ddosify.com…
Comprehensive Performance Testing Platform. Available on CLI, Self-Hosted, and Cloud - https://ddosify.com 🚀 - GitHub - ddosify/ddosify: Comprehensive Performance Testing Platform. Available on CLI...
Hacking Electron Applications - 0x101
https://ift.tt/h9CPJrp
Submitted May 12, 2022 at 09:19AM by r0075h3ll
via reddit https://ift.tt/ke3pE48
https://ift.tt/h9CPJrp
Submitted May 12, 2022 at 09:19AM by r0075h3ll
via reddit https://ift.tt/ke3pE48
r0075h3ll.github.io
Hacking Electron Applications - 0x101 | Hardik Nanda
Content Security Policy for Dummies
https://ift.tt/kmzO4aw
Submitted May 12, 2022 at 09:18AM by r0075h3ll
via reddit https://ift.tt/gC1msHL
https://ift.tt/kmzO4aw
Submitted May 12, 2022 at 09:18AM by r0075h3ll
via reddit https://ift.tt/gC1msHL
r0075h3ll.github.io
Content Security Policy for Dummies | Hardik Nanda
Zyxel Firewall Unauthenticated Command Inject (CVE-2022-30525)
https://ift.tt/U9B1hdT
Submitted May 12, 2022 at 09:32PM by chicksdigthelongrun
via reddit https://ift.tt/k8S2bW1
https://ift.tt/U9B1hdT
Submitted May 12, 2022 at 09:32PM by chicksdigthelongrun
via reddit https://ift.tt/k8S2bW1
Rapid7
CVE-2022-30525 (FIXED): Zyxel Firewall Unauthenticated Remote Command Injection | Rapid7 Blog
Rapid7 discovered and reported a vulnerability that affects Zyxel firewalls supporting Zero Touch Provisioning (ZTP), identified as CVE-2022-30525.
Hunting evasive vulnerabilities
https://ift.tt/zY7Hak2
Submitted May 13, 2022 at 09:08PM by 0xdea
via reddit https://ift.tt/U8XkyzR
https://ift.tt/zY7Hak2
Submitted May 13, 2022 at 09:08PM by 0xdea
via reddit https://ift.tt/U8XkyzR
PortSwigger Research
Hunting evasive vulnerabilities
Do you ever wonder about the vulnerabilities you've missed? Why didn't they show themselves - and will they be discovered by somebody else later? Certain vulnerabilities have a knack for evading audit
Trends at Blackhat Asia 2022 - Kubernetes, Cloud Security and more
https://ift.tt/jLZYeWr
Submitted May 13, 2022 at 09:06PM by MiguelHzBz
via reddit https://ift.tt/C35P8sq
https://ift.tt/jLZYeWr
Submitted May 13, 2022 at 09:06PM by MiguelHzBz
via reddit https://ift.tt/C35P8sq
Sysdig
Trends at Blackhat Asia 2022 - Kubernetes, Cloud Security and more – Sysdig
Three major trends, Kubernetes security, cloud security, and supply chain attacks, keep on the rise and on everyone's radar at Blackhat.
PowerShell Scripts used to run malicious shellcode. Reverse Shell vs Bind Shell
https://ift.tt/ZBkrQRP
Submitted May 13, 2022 at 11:27PM by CyberMasterV
via reddit https://ift.tt/ozWPibR
https://ift.tt/ZBkrQRP
Submitted May 13, 2022 at 11:27PM by CyberMasterV
via reddit https://ift.tt/ozWPibR
reddit
PowerShell Scripts used to run malicious shellcode. Reverse Shell...
Posted in r/netsec by u/CyberMasterV • 59 points and 0 comments
Reverse engineering Flutter apps
https://ift.tt/JhQYo0R
Submitted May 14, 2022 at 11:29PM by lmpact_
via reddit https://ift.tt/IY36KtM
https://ift.tt/JhQYo0R
Submitted May 14, 2022 at 11:29PM by lmpact_
via reddit https://ift.tt/IY36KtM
GitHub
GitHub - Impact-I/reFlutter: Flutter Reverse Engineering Framework
Flutter Reverse Engineering Framework. Contribute to Impact-I/reFlutter development by creating an account on GitHub.
Exploiting a Use-After-Free for code execution in every version of Python 3
https://ift.tt/MAJLRDj
Submitted May 15, 2022 at 12:10AM by DOTheLOGA
via reddit https://ift.tt/pha4HZM
https://ift.tt/MAJLRDj
Submitted May 15, 2022 at 12:10AM by DOTheLOGA
via reddit https://ift.tt/pha4HZM
pwn.win
Exploiting a Use-After-Free for code execution in every version of Python 3
A while ago I was browsing the Python bug tracker, and I stumbled upon this bug - “memoryview to freed memory can cause segfault”. It was created in 2012, originally present in Python 2.7, but remains open to this day, 10 years later. This piqued my interest…
"Zero-Days" Without Incident - Compromising Angular via Expired npm Publisher Email Domains
https://ift.tt/9qF8dmJ
Submitted May 15, 2022 at 05:13AM by mandatoryprogrammer
via reddit https://ift.tt/G90qvnN
https://ift.tt/9qF8dmJ
Submitted May 15, 2022 at 05:13AM by mandatoryprogrammer
via reddit https://ift.tt/G90qvnN
The Hacker Blog
"Zero-Days" Without Incident - Compromising Angular via Expired npm Publisher Email Domains – The Hacker Blog
A Hacker's Blog of Unintended Use and Insomnia.
MITM_Intercept: A little less hackish way to intercept and modify non-HTTP protocols through Burp & others.
https://ift.tt/SrGklXy
Submitted May 15, 2022 at 10:44PM by jat0369
via reddit https://ift.tt/nyEqijI
https://ift.tt/SrGklXy
Submitted May 15, 2022 at 10:44PM by jat0369
via reddit https://ift.tt/nyEqijI
GitHub
GitHub - cyberark/MITM_Intercept: A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others.
A little bit less hackish way to intercept and modify non-HTTP protocols through Burp & others. - GitHub - cyberark/MITM_Intercept: A little bit less hackish way to intercept and modify non...
Using Stolen IAM Credentials - Hacking The Cloud
https://ift.tt/PfvRYgQ
Submitted May 16, 2022 at 03:18AM by RedTermSession
via reddit https://ift.tt/FRjzcY6
https://ift.tt/PfvRYgQ
Submitted May 16, 2022 at 03:18AM by RedTermSession
via reddit https://ift.tt/FRjzcY6
hackingthe.cloud
Using Stolen IAM Credentials - Hacking The Cloud
How to work with stolen IAM credentials and things to consider.
Technical Advisory – Blueooth Low Energy Proximity Authentication Vulnerable to Relay Attacks
https://ift.tt/UJAStsR
Submitted May 16, 2022 at 11:06AM by digicat
via reddit https://ift.tt/IX5OFyG
https://ift.tt/UJAStsR
Submitted May 16, 2022 at 11:06AM by digicat
via reddit https://ift.tt/IX5OFyG
NCC Group Research
Technical Advisory – BLE Proximity Authentication Vulnerable to Relay Attacks
NCC Group has developed a tool for conducting a new type of BLE relay attack operating at the link layer, for which added latency is within the range of normal GATT response timing variation, and which is capable of relaying encrypted link layer communications.…