New Rhino Blog Post: CVE-2022-25237: Bonitasoft Authorization Bypass and RCE
https://ift.tt/UjeycgJ
Submitted May 24, 2022 at 08:44PM by hackers_and_builders
via reddit https://ift.tt/41MldLb
https://ift.tt/UjeycgJ
Submitted May 24, 2022 at 08:44PM by hackers_and_builders
via reddit https://ift.tt/41MldLb
Rhino Security Labs
CVE-2022-25237: Bonitasoft Authorization Bypass and RCE - Rhino Security Labs
Bonita Web 2021.2 is affected by an authentication/authorization bypass vulnerability in the API authorization filters.
fire: Fast tool to filter resolved domains (good for Bug Bounty purposes in a pipeline of noscripts)
https://ift.tt/eLiYB7k
Submitted May 25, 2022 at 01:00AM by deleee
via reddit https://ift.tt/qAZwNQz
https://ift.tt/eLiYB7k
Submitted May 25, 2022 at 01:00AM by deleee
via reddit https://ift.tt/qAZwNQz
GitHub
GitHub - thelicato/fire: Take domains on stdin and output them on stdout if they get resolved
Take domains on stdin and output them on stdout if they get resolved - thelicato/fire
Finding Bugs in Windows Drivers, Part 1 – WDM
https://ift.tt/XiLa6uT
Submitted May 25, 2022 at 11:30AM by jat0369
via reddit https://ift.tt/t3DElSP
https://ift.tt/XiLa6uT
Submitted May 25, 2022 at 11:30AM by jat0369
via reddit https://ift.tt/t3DElSP
Cyberark
Finding Bugs in Windows Drivers, Part 1 – WDM
Finding vulnerabilities in Windows drivers was always a highly sought-after prize by sophisticated threat actors, game cheat writers and red teamers. As you probably know, every bug in a driver...
The printer goes brrrrr!!!
https://ift.tt/VX1ZvqH
Submitted May 25, 2022 at 05:36PM by 0xdea
via reddit https://ift.tt/7pzjxhS
https://ift.tt/VX1ZvqH
Submitted May 25, 2022 at 05:36PM by 0xdea
via reddit https://ift.tt/7pzjxhS
Synacktiv
The printer goes brrrrr!!!
Network printers have been featured for the first time at Pwn2Own competition in Austin 2021.
Tetragon: case study of security product's self-protection
https://ift.tt/pVQTaPz
Submitted May 25, 2022 at 07:23PM by hardenedvault
via reddit https://ift.tt/P1fUdWD
https://ift.tt/pVQTaPz
Submitted May 25, 2022 at 07:23PM by hardenedvault
via reddit https://ift.tt/P1fUdWD
hardenedvault.net
Tetragon: case study of security product's self-protection
Story background CTO of cloud-native security company Isovalent announced that their eBPF-based Security Observability and Runtime Enforcement solution Tetragon (WayBackMachine 20220516) become open source after years of development in May 16 2022.
seL4 Whitepaper released.
https://ift.tt/DnOjfwp
Submitted May 25, 2022 at 07:02PM by providerstatistics
via reddit https://ift.tt/vFqUs4r
https://ift.tt/DnOjfwp
Submitted May 25, 2022 at 07:02PM by providerstatistics
via reddit https://ift.tt/vFqUs4r
sel4.systems
About seL4 | seL4
JWT attacks (with online labs)
https://ift.tt/Ey18wQN
Submitted June 13, 2022 at 07:09PM by albinowax
via reddit https://ift.tt/1GZ7JOm
https://ift.tt/Ey18wQN
Submitted June 13, 2022 at 07:09PM by albinowax
via reddit https://ift.tt/1GZ7JOm
portswigger.net
JWT attacks | Web Security Academy
In this section, we'll look at how design issues and flawed handling of JSON web tokens (JWTs) can leave websites vulnerable to a variety of high-severity ...
Privilege Escalation in Microsoft Azure Synapse Analytics
https://ift.tt/qiojGhS
Submitted June 13, 2022 at 06:31PM by dinobyt3s
via reddit https://ift.tt/t4yjGpT
https://ift.tt/qiojGhS
Submitted June 13, 2022 at 06:31PM by dinobyt3s
via reddit https://ift.tt/t4yjGpT
Medium
Microsoft Azure Synapse Pwnalytics
Tenable has discovered a privilege escalation flaw that allows a user to escalate privileges to that of the root user in Azure Synapse.
The State of CSRF Vulnerability in 2022
https://ift.tt/rzDshfO
Submitted June 13, 2022 at 04:03PM by utku1337
via reddit https://ift.tt/RU0gtsl
https://ift.tt/rzDshfO
Submitted June 13, 2022 at 04:03PM by utku1337
via reddit https://ift.tt/RU0gtsl
Medium
The State of CSRF Vulnerability in 2022
CSRF (Cross-Side-Request-Forgery) vulnerabilities are with us since the beginning of the web. However, things are highly changed since…
I wrote a non technical post on my blog regarding security specialists, nihilistic behavior, and how to stay positive. Sometimes we need a reminder that, after all, things are not that bad.
https://ift.tt/6rMe9A3
Submitted June 12, 2022 at 09:37PM by last0x00
via reddit https://ift.tt/k7JcL2n
https://ift.tt/6rMe9A3
Submitted June 12, 2022 at 09:37PM by last0x00
via reddit https://ift.tt/k7JcL2n
not so pro
Avoiding B.A.D. behaviour
The difficult relationship between nihilism, cybersecurity professionals and Being-A-Dick behaviour
bevigil-cli : A handy tool to extract assets like subdomains, URL params, hosts, S3 buckets, URLs from android applications through BeVigil OSINT API with ease.
https://ift.tt/Wnsc6fh
Submitted June 12, 2022 at 03:03PM by xscorp7
via reddit https://ift.tt/HP4Cnkl
https://ift.tt/Wnsc6fh
Submitted June 12, 2022 at 03:03PM by xscorp7
via reddit https://ift.tt/HP4Cnkl
GitHub
GitHub - Bevigil/BeVigil-OSINT-CLI: bevigil-cli provides a unified command line interface and python library for using BeVigil…
bevigil-cli provides a unified command line interface and python library for using BeVigil OSINT API. - GitHub - Bevigil/BeVigil-OSINT-CLI: bevigil-cli provides a unified command line interface and...
NGINX security: Everything you may not need to know about NGINX error logs - complete guide
https://ift.tt/iRgUHAu
Submitted June 12, 2022 at 11:01AM by jwizq
via reddit https://ift.tt/0sv8Fuq
https://ift.tt/iRgUHAu
Submitted June 12, 2022 at 11:01AM by jwizq
via reddit https://ift.tt/0sv8Fuq
Trunc Logging
A Guide to: NGINX Error Logs
NGINX is the most popular web server in the planet and in this post, we will analyse their error logging in detail.
I made a browser extension that spoofs your location data to match your VPN. It can also spoof your user agent.
https://ift.tt/MC0Z5UY
Submitted June 12, 2022 at 07:46AM by z0ccc_z0ccc
via reddit https://ift.tt/qXSHMI8
https://ift.tt/MC0Z5UY
Submitted June 12, 2022 at 07:46AM by z0ccc_z0ccc
via reddit https://ift.tt/qXSHMI8
GitHub
GitHub - vytal-io/vytal-extension: Browser extension to spoof timezone, geolocation, locale and user agent.
Browser extension to spoof timezone, geolocation, locale and user agent. - GitHub - vytal-io/vytal-extension: Browser extension to spoof timezone, geolocation, locale and user agent.
The many lives of BlackCat ransomware
https://ift.tt/KYthdFB
Submitted June 13, 2022 at 10:14PM by SCI_Rusher
via reddit https://ift.tt/RtMCBlS
https://ift.tt/KYthdFB
Submitted June 13, 2022 at 10:14PM by SCI_Rusher
via reddit https://ift.tt/RtMCBlS
Microsoft News
The many lives of BlackCat ransomware
The use of an unconventional programming language, multiple target devices and possible entry points, and affiliation with prolific threat activity groups have made the BlackCat ransomware a prevalent threat and a prime example of the growing ransomware-as…
Exposed Travis CI API Leaves All Free-Tier Users Open to Attack
https://ift.tt/jk2G7g1
Submitted June 14, 2022 at 02:30AM by mkatch
via reddit https://ift.tt/a3mLnjq
https://ift.tt/jk2G7g1
Submitted June 14, 2022 at 02:30AM by mkatch
via reddit https://ift.tt/a3mLnjq
Aquasec
Public Travis CI Logs (Still) Expose Users to Cyber Attacks
Team Nautilus found that many tokens of Travis CI users are exposed via an issue in its API which allows attackers to launch massive attacks in the cloud
OSCP monkeys vs stack buffer overflow
https://ift.tt/ENK69tT
Submitted June 14, 2022 at 10:33AM by Dreg_fr33project
via reddit https://ift.tt/aUGRNym
https://ift.tt/ENK69tT
Submitted June 14, 2022 at 10:33AM by Dreg_fr33project
via reddit https://ift.tt/aUGRNym
Medium
OSCP monkeys vs stack buffer overflow
Warning: this post is just for fun x-)
Quick Malware Analysis: Emotet Epoch 5 infection with spambot traffic pcap from 2022-04-04
https://ift.tt/upEZAVM
Submitted June 14, 2022 at 07:15PM by dougburks
via reddit https://ift.tt/6Kcn1tT
https://ift.tt/upEZAVM
Submitted June 14, 2022 at 07:15PM by dougburks
via reddit https://ift.tt/6Kcn1tT
blog.securityonion.net
Quick Malware Analysis: Emotet Epoch 5 infection with spambot traffic pcap from 2022-04-04
Thanks to Brad Duncan for sharing this pcap! https://www.malware-traffic-analysis.net/2022/04/04/index.html We did a quick analysis of this ...
Chaining vulnerabilities to criticality in Progress WhatsUp Gold
https://ift.tt/5pVK4Xg
Submitted June 14, 2022 at 08:29PM by Mempodipper
via reddit https://ift.tt/f0tzYPy
https://ift.tt/5pVK4Xg
Submitted June 14, 2022 at 08:29PM by Mempodipper
via reddit https://ift.tt/f0tzYPy
Assetnote
Chaining vulnerabilities to criticality in Progress WhatsUp Gold
Application security issues found by Assetnote
Credential Protection in Chromium-based Browsers
https://ift.tt/3XftKVk
Submitted June 14, 2022 at 08:17PM by jat0369
via reddit https://ift.tt/ge8VYyi
https://ift.tt/3XftKVk
Submitted June 14, 2022 at 08:17PM by jat0369
via reddit https://ift.tt/ge8VYyi
Cyberark
Go BLUE! A Protection Plan for Credentials in Chromium-based Browsers
In my previous blog post (here), I described a technique to extract sensitive data (passwords, cookies) directly from the memory of a Chromium-based browser’s [CBB] process. Google’s response to...
If you want to play with Dogwalk windows vulnerability
https://ift.tt/Ip1S8bG
Submitted June 14, 2022 at 07:52PM by cryptaureau
via reddit https://ift.tt/H8r59Lp
https://ift.tt/Ip1S8bG
Submitted June 14, 2022 at 07:52PM by cryptaureau
via reddit https://ift.tt/H8r59Lp
GitHub
GitHub - ariary/DogWalk-rce-poc: 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)
🐾Dogwalk PoC (using diagcab file to obtain RCE on windows) - GitHub - ariary/DogWalk-rce-poc: 🐾Dogwalk PoC (using diagcab file to obtain RCE on windows)
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection
https://ift.tt/mXvlHfN
Submitted June 14, 2022 at 09:50PM by 0xdea
via reddit https://ift.tt/nbXemNT
https://ift.tt/mXvlHfN
Submitted June 14, 2022 at 09:50PM by 0xdea
via reddit https://ift.tt/nbXemNT
Sonarsource
Zimbra Email - Stealing Clear-Text Credentials via Memcache injection
We discovered flaws in Zimbra, an enterprise email solution, that allow attackers to steal credentials of users and gain access to their email accounts.