Since Microsoft patched PPLDump's exploit I'm open sourcing RIPPL, a a tool based off PPLDump which enabled more offensive capabilities against PPL processes like EDRs - @last0x00
https://ift.tt/8JpLvkg
Submitted July 25, 2022 at 01:46PM by last0x00
via reddit https://ift.tt/PfnVgwY
https://ift.tt/8JpLvkg
Submitted July 25, 2022 at 01:46PM by last0x00
via reddit https://ift.tt/PfnVgwY
GitHub
GitHub - last-byte/RIPPL: RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows
RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processes on Windows - GitHub - last-byte/RIPPL: RIPPL is a tool that abuses a usermode only exploit to manipulate PPL processe...
PART 2: How I Met Your Beacon - Cobalt Strike
https://ift.tt/2vQ1EWS
Submitted July 25, 2022 at 05:31PM by Gallus
via reddit https://ift.tt/nNtBuHC
https://ift.tt/2vQ1EWS
Submitted July 25, 2022 at 05:31PM by Gallus
via reddit https://ift.tt/nNtBuHC
MDSec
PART 2: How I Met Your Beacon - Cobalt Strike - MDSec
Cobalt Strike is one of the most popular command-and-control frameworks, favoured by red teams and threat actors alike. In this blog post we will discuss strategies that can be used...
Multiple vulnerabilities in Nuki smart locks
https://ift.tt/yBcNZGU
Submitted July 25, 2022 at 05:26PM by Gallus
via reddit https://ift.tt/PhiyEla
https://ift.tt/yBcNZGU
Submitted July 25, 2022 at 05:26PM by Gallus
via reddit https://ift.tt/PhiyEla
NCC Group Research
Technical Advisory – Multiple vulnerabilities in Nuki smart locks (CVE-2022-32509, CVE-2022-32504, CVE-2022-32502, CVE-2022-32507…
The following vulnerabilities were found as part of a research project looking at the state of security of the different Nuki (smart lock) products. The main goal was to look for vulnerabilities which could affect to the availability, integrity or confidentiality…
Pulsar — an open-source runtime security framework powered by Rust & eBPF for IoT
https://pulsar.sh/
Submitted July 25, 2022 at 06:36PM by JDBHub
via reddit https://ift.tt/l9IuLw5
https://pulsar.sh/
Submitted July 25, 2022 at 06:36PM by JDBHub
via reddit https://ift.tt/l9IuLw5
pulsar.sh
Exein - Pulsar | Pulsar
Next-gen open source framework for the security of everything
Attack Chain Déjà-vu: The infection vector used by SVCReady, Gozi and IcedID
https://ift.tt/iGm9Z8r
Submitted July 25, 2022 at 07:15PM by OwnPreparation3424
via reddit https://ift.tt/0zS6vEH
https://ift.tt/iGm9Z8r
Submitted July 25, 2022 at 07:15PM by OwnPreparation3424
via reddit https://ift.tt/0zS6vEH
Medium
Attack Chain Déjà-vu: The infection vector used by SVCReady, Gozi and IcedID
Technical analysis of the SVCReady, Gozi and IcedID attack chain
Finding Flaws in FileWave MDM
https://ift.tt/u7ix4mr
Submitted July 26, 2022 at 12:35AM by derp6996
via reddit https://ift.tt/QDqoYaO
https://ift.tt/u7ix4mr
Submitted July 26, 2022 at 12:35AM by derp6996
via reddit https://ift.tt/QDqoYaO
Claroty
Filewave MDM Security Vulnerabilities Uncovered by Claroty
Claroty Team82 has disclosed security vulnerabilities in Filewave MDM that enable remote code execution on managed devices.
When Hypervisor Met Snapshot Fuzzing
https://ift.tt/9AQRWaw
Submitted July 26, 2022 at 06:57AM by Gallus
via reddit https://ift.tt/EOUBmYM
https://ift.tt/9AQRWaw
Submitted July 26, 2022 at 06:57AM by Gallus
via reddit https://ift.tt/EOUBmYM
NULL@ROOT
When Hypervisor Met Snapshot Fuzzing
1. Introduction Hypervisor was known as hard target to fuzz over several years. Even though, lots of prior pioneers( Peter Hlavaty, Chaitin Tech, StarLabs, Peleg Hadar and Ophir Harpaz and many others ) doing amazing work to overcome this limit and found…
GitHub - InitRoot/wodat: Windows Oracle Database Attack Toolkit
https://ift.tt/TNlzAQs
Submitted July 26, 2022 at 10:36AM by InitRoot
via reddit https://ift.tt/MhHTQZ8
https://ift.tt/TNlzAQs
Submitted July 26, 2022 at 10:36AM by InitRoot
via reddit https://ift.tt/MhHTQZ8
GitHub
GitHub - InitRoot/wodat: Windows Oracle Database Attack Toolkit
Windows Oracle Database Attack Toolkit. Contribute to InitRoot/wodat development by creating an account on GitHub.
Bypass AMSI in local process hooking NtCreateSection
https://ift.tt/dN9oC5D
Submitted July 26, 2022 at 02:12PM by gid0rah
via reddit https://ift.tt/sBwJD6Q
https://ift.tt/dN9oC5D
Submitted July 26, 2022 at 02:12PM by gid0rah
via reddit https://ift.tt/sBwJD6Q
Waawaa Blog
[Malware] Bypass AMSI in local process hooking NtCreateSection
Hi everyone! Here suffering (again) the high temperatures and hoping winter to come back again.
Zyxel authentication bypass patch analysis (CVE-2022-0342)
https://ift.tt/pPaBC1U
Submitted July 26, 2022 at 03:09PM by 0xdea
via reddit https://ift.tt/CSARX6O
https://ift.tt/pPaBC1U
Submitted July 26, 2022 at 03:09PM by 0xdea
via reddit https://ift.tt/CSARX6O
hn security
Zyxel authentication bypass patch analysis (CVE-2022-0342) - hn security
A few months ago, new firmware […]
How to analyze Linux malware – A case study of Symbiote
https://ift.tt/VptHKx8
Submitted July 26, 2022 at 07:32PM by CyberMasterV
via reddit https://ift.tt/taBSd2r
https://ift.tt/VptHKx8
Submitted July 26, 2022 at 07:32PM by CyberMasterV
via reddit https://ift.tt/taBSd2r
CVE-2022-31813: Forwarding addresses is hard
https://ift.tt/gunKZom
Submitted July 26, 2022 at 08:14PM by 0xdea
via reddit https://ift.tt/DSY3zIx
https://ift.tt/gunKZom
Submitted July 26, 2022 at 08:14PM by 0xdea
via reddit https://ift.tt/DSY3zIx
Synacktiv
CVE-2022-31813: Forwarding addresses is hard
A few weeks ago, version 2.
Awesome Open-Source Adversary Simulation Tools
https://ift.tt/8Vn1lJ4
Submitted July 26, 2022 at 09:35PM by sciencestudent99
via reddit https://ift.tt/lcZM4gK
https://ift.tt/8Vn1lJ4
Submitted July 26, 2022 at 09:35PM by sciencestudent99
via reddit https://ift.tt/lcZM4gK
FourCore
Top 10 Awesome Open-Source Adversary Simulation Tools - FourCore
Breach and Attack Simulation (BAS) also known as Adversary Simulation is an emerging IT security technology equipping the proactive approach to the way we look at organizational security. Open-source BAS tools like Caldera and Atomic Red Team are utilised…
Malicious IIS extensions quietly open persistent backdoors into servers
https://ift.tt/BrOI684
Submitted July 26, 2022 at 10:37PM by SCI_Rusher
via reddit https://ift.tt/AM9Wc31
https://ift.tt/BrOI684
Submitted July 26, 2022 at 10:37PM by SCI_Rusher
via reddit https://ift.tt/AM9Wc31
Microsoft Security Blog
Malicious IIS extensions quietly open persistent backdoors into servers - Microsoft Security Blog
Attackers are increasingly leveraging managed IIS extensions as covert backdoors into servers, providing a durable persistence mechanism for attacks.
Hunting For Mass Assignment Vulnerabilities Using GitHub CodeSearch and grep.app
https://ift.tt/4S85Ief
Submitted July 26, 2022 at 11:36PM by l_tennant
via reddit https://ift.tt/nvtjbP2
https://ift.tt/4S85Ief
Submitted July 26, 2022 at 11:36PM by l_tennant
via reddit https://ift.tt/nvtjbP2
Include Security Research Blog
Hunting For Mass Assignment Vulnerabilities Using GitHub CodeSearch and grep.app - Include Security Research Blog
This post discusses the process of searching top GitHub projects for mass assignment vulnerabilities. This led to a fun finding in the #1 most starred GitHub project, freeCodeCamp, where I was able to acquire every coding certification – supposedly representing…
Inside Matanbuchus: A Quirky Loader
https://ift.tt/xLZt4De
Submitted July 27, 2022 at 07:50PM by jat0369
via reddit https://ift.tt/uLQPlTC
https://ift.tt/xLZt4De
Submitted July 27, 2022 at 07:50PM by jat0369
via reddit https://ift.tt/uLQPlTC
Cyberark
Inside Matanbuchus: A Quirky Loader
An in-depth analysis of Matanbuchus loader’s tricks and loading techniques Matanbuchus is a Malware-as-a-Service loader that has been sold on underground markets for more than one year....
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
https://ift.tt/6A8tjDb
Submitted July 27, 2022 at 10:04PM by surrealisticpillow12
via reddit https://ift.tt/5k3MLZu
https://ift.tt/6A8tjDb
Submitted July 27, 2022 at 10:04PM by surrealisticpillow12
via reddit https://ift.tt/5k3MLZu
Microsoft Security Blog
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits - Microsoft Security Blog
MSTIC and MSRC disclose technical details of a private-sector offensive actor (PSOA) tracked as KNOTWEED using multiple Windows and Adobe 0-day exploits, including one for the recently patched CVE-2022-22047, in limited and targeted attacks against European…
Sternum Announces Free Security and Observability Platforms for OpenWrt IoT Devices
https://ift.tt/H13UFJx
Submitted July 27, 2022 at 09:54PM by mesok8
via reddit https://ift.tt/ZpHWB7X
https://ift.tt/H13UFJx
Submitted July 27, 2022 at 09:54PM by mesok8
via reddit https://ift.tt/ZpHWB7X
Sternum IoT
Announcing Sternum’s Free Security License for OpenWrt Devices | Sternum IoT
Strenum is a game changer, but don't take our word for it - try it out!
Corrupting memory without memory corruption
https://ift.tt/CAg41az
Submitted July 27, 2022 at 11:45PM by surrealisticpillow12
via reddit https://ift.tt/gu09qhm
https://ift.tt/CAg41az
Submitted July 27, 2022 at 11:45PM by surrealisticpillow12
via reddit https://ift.tt/gu09qhm
The GitHub Blog
Corrupting memory without memory corruption
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights…
How the WordPress Gets Hacked in 2022 - Initial Reconnaissance
https://ift.tt/F3Tgy65
Submitted July 28, 2022 at 03:26AM by perezbox
via reddit https://ift.tt/5T1g6Ge
https://ift.tt/F3Tgy65
Submitted July 28, 2022 at 03:26AM by perezbox
via reddit https://ift.tt/5T1g6Ge
NOC CDN and WAF
How the WordPress Gets Hacked in 2022 - Initial Reconnaissance
This articles explains how the WordPress JSON API and XMLRPC can be used to attack WordPress website using Brute Force techniques.
US Government Review of the December 2021 Log4j Event
https://ift.tt/iHj2gmr
Submitted July 26, 2022 at 07:27AM by ScottContini
via reddit https://ift.tt/cv23M6K
https://ift.tt/iHj2gmr
Submitted July 26, 2022 at 07:27AM by ScottContini
via reddit https://ift.tt/cv23M6K