BlueHound combines information about user permissions, network access and unpatched vulnerabilities to reveal the paths attackers would take if they were inside your network.
https://ift.tt/d2XaJBf
Submitted August 10, 2022 at 01:46PM by sanitybit
via reddit https://ift.tt/OS1eB9M
https://ift.tt/d2XaJBf
Submitted August 10, 2022 at 01:46PM by sanitybit
via reddit https://ift.tt/OS1eB9M
GitHub
GitHub - zeronetworks/BlueHound: BlueHound - pinpoint the security issues that actually matter
BlueHound - pinpoint the security issues that actually matter - GitHub - zeronetworks/BlueHound: BlueHound - pinpoint the security issues that actually matter
PowerHuntShares is designed to automatically inventory, analyze, and report excessive privilege assigned to SMB shares on Active Directory domain joined computers
https://ift.tt/DWpTnqC
Submitted August 10, 2022 at 01:34PM by sanitybit
via reddit https://ift.tt/qdCvLMz
https://ift.tt/DWpTnqC
Submitted August 10, 2022 at 01:34PM by sanitybit
via reddit https://ift.tt/qdCvLMz
NetSPI
How to Attack and Remediate Excessive Network Share Permissions in Active Directory Environments
Learn how to quickly inventory, attack, and remediate network shares configured with excessive permissions assigned to SMB shares in Active Directory environments.
New Blog-Post on Reconnaissance - Looking for feedback/recommendations to improve
https://ift.tt/wdei84L
Submitted August 10, 2022 at 04:19PM by thebishslap
via reddit https://ift.tt/Zr8aJzf
https://ift.tt/wdei84L
Submitted August 10, 2022 at 04:19PM by thebishslap
via reddit https://ift.tt/Zr8aJzf
Sam’s Bish-Bytes
Passive v. Active Reconnaissance
What is Reconnaissance in 'Hacking Terms'?
Cryptominer detection: a Machine Learning approach
https://ift.tt/n9Dw4UF
Submitted August 10, 2022 at 08:37PM by MiguelHzBz
via reddit https://ift.tt/mfA67IB
https://ift.tt/n9Dw4UF
Submitted August 10, 2022 at 08:37PM by MiguelHzBz
via reddit https://ift.tt/mfA67IB
Sysdig
Cryptominer detection: a Machine Learning approach – Sysdig
Cryptominers are one of the main cloud threats today. Detecting crypto miners is a complex task, but machine learning could help to develop a robust detection algorithm.
AWSGoat is a vulnerable by design infrastructure on AWS featuring the latest released OWASP Top 10 web application security risks (2021) and other misconfigured AWS services.
https://ift.tt/oKSt714
Submitted August 11, 2022 at 12:30AM by sanitybit
via reddit https://ift.tt/xNqXSZ1
https://ift.tt/oKSt714
Submitted August 11, 2022 at 12:30AM by sanitybit
via reddit https://ift.tt/xNqXSZ1
GitHub
GitHub - ine-labs/AWSGoat: AWSGoat : A Damn Vulnerable AWS Infrastructure
AWSGoat : A Damn Vulnerable AWS Infrastructure. Contribute to ine-labs/AWSGoat development by creating an account on GitHub.
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
https://ift.tt/Tz6j3OD
Submitted August 10, 2022 at 11:52PM by Fugitif
via reddit https://ift.tt/n8FVMRC
https://ift.tt/Tz6j3OD
Submitted August 10, 2022 at 11:52PM by Fugitif
via reddit https://ift.tt/n8FVMRC
PortSwigger Research
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
The recent rise of HTTP Request Smuggling has seen a flood of critical findings enabling near-complete compromise of numerous major websites. However, the threat has been confined to attacker-accessib
A deep dive into an in-the-wild Android exploit: the quantum state of Linux kernel garbage collection - CVE-2021-0920 (Part 1)
https://ift.tt/WQDOhgP
Submitted August 11, 2022 at 05:37AM by sanitybit
via reddit https://ift.tt/2R0TxuJ
https://ift.tt/WQDOhgP
Submitted August 11, 2022 at 05:37AM by sanitybit
via reddit https://ift.tt/2R0TxuJ
Blogspot
The quantum state of Linux kernel garbage collection CVE-2021-0920 (Part I)
A deep dive into an in-the-wild Android exploit Guest Post by Xingyu Jin, Android Security Research This is part one of a two-part guest...
How Cisco got hacked - insights on what the attackers did
https://ift.tt/FlTNtVq
Submitted August 11, 2022 at 05:14AM by jwizq
via reddit https://ift.tt/42vqpCy
https://ift.tt/FlTNtVq
Submitted August 11, 2022 at 05:14AM by jwizq
via reddit https://ift.tt/42vqpCy
Cisco Talos Blog
Cisco Talos shares insights related to recent cyber attack on Cisco
Update History
Aug. 10, 2022
Adding clarifying details on activity involving active directory.
Aug. 10, 2022
Update made to the Cisco Response and Recommendations section related to MFA.
Aug. 10, 2022
Adding clarifying details on activity involving active directory.
Aug. 10, 2022
Update made to the Cisco Response and Recommendations section related to MFA.
Enhancing Subdomain Enumeration - ENTs and NOERROR
https://ift.tt/MCsdG3V
Submitted August 11, 2022 at 01:40PM by doitsukara
via reddit https://ift.tt/pFgie2R
https://ift.tt/MCsdG3V
Submitted August 11, 2022 at 01:40PM by doitsukara
via reddit https://ift.tt/pFgie2R
www.securesystems.de
Enhancing Subdomain Enumeration - ENTs and NOERROR
One of the most relevant techniques during the reconnaissance phase of an engagement is subdomain enumeration. This post aims to enhance this phase by including a special DNS node (ENT) and the NOERROR response code that is often ignored.
Concealed code execution: Techniques and detection
https://ift.tt/4PtHayw
Submitted August 11, 2022 at 06:25PM by darronofsky
via reddit https://ift.tt/9mCK8fL
https://ift.tt/4PtHayw
Submitted August 11, 2022 at 06:25PM by darronofsky
via reddit https://ift.tt/9mCK8fL
Huntandhackett
Concealed code execution: Techniques and detection
After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them.
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study – NCC Group Research
https://ift.tt/jMH1CBs
Submitted August 11, 2022 at 10:50PM by digicat
via reddit https://ift.tt/JAR9cIb
https://ift.tt/jMH1CBs
Submitted August 11, 2022 at 10:50PM by digicat
via reddit https://ift.tt/JAR9cIb
NCC Group Research
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study
A recently uncovered malware sample dubbed ‘Saitama’ was uncovered by security firm Malwarebytes in a weaponized document, possibly targeted towards the Jordan government. This Saitama implant uses DNS as its sole Command and Control channel and utilizes…
Hunting for Low and Slow Password Sprays Using Machine Learning (ML Deep Dive)
https://ift.tt/rmUkf1I
Submitted August 11, 2022 at 10:12PM by SCI_Rusher
via reddit https://ift.tt/kR8xtSF
https://ift.tt/rmUkf1I
Submitted August 11, 2022 at 10:12PM by SCI_Rusher
via reddit https://ift.tt/kR8xtSF
TECHCOMMUNITY.MICROSOFT.COM
Hunting for Low and Slow Password Sprays Using Machine Learning
& (Microsoft Threat Intelligence Center) With special thanks to . Microsoft’s threat intelligence teams are observing increasing use of password sprays as an attack vector. As sign-in protections have improved, the “low and slow” variant, has become more…
Fully dockerized Linux kernel debugging environment
https://ift.tt/xTnMuG4
Submitted August 12, 2022 at 12:49AM by 0x00rick
via reddit https://ift.tt/rEB8JVH
https://ift.tt/xTnMuG4
Submitted August 12, 2022 at 12:49AM by 0x00rick
via reddit https://ift.tt/rEB8JVH
GitHub
GitHub - 0xricksanchez/like-dbg: Fully dockerized Linux kernel debugging environment
Fully dockerized Linux kernel debugging environment - GitHub - 0xricksanchez/like-dbg: Fully dockerized Linux kernel debugging environment
What Happened to Lapsus$
https://ift.tt/AOL3lc2
Submitted August 12, 2022 at 06:09AM by TravenDev
via reddit https://ift.tt/Jc9ed7U
https://ift.tt/AOL3lc2
Submitted August 12, 2022 at 06:09AM by TravenDev
via reddit https://ift.tt/Jc9ed7U
CoderOasis
What Happened to Lapsus$
Claire Tills, senior research engineer at Tenable, describes the methods of the hacking group Lapsus$ as bold, illogical and poorly thought out. The criminals attacked renowned companies such as Microsoft, Samsung, Nvidia, Vodafone, Ubisoft and Okta. They…
The cloud has an isolation problem: PostgreSQL vulnerabilities affect multiple cloud vendors | Wiz Blog
https://ift.tt/qzoCQA8
Submitted August 12, 2022 at 08:47AM by juken
via reddit https://ift.tt/KqHrfuv
https://ift.tt/qzoCQA8
Submitted August 12, 2022 at 08:47AM by juken
via reddit https://ift.tt/KqHrfuv
wiz.io
The cloud has an isolation problem: PostgreSQL vulnerabilities affect multiple cloud vendors | Wiz Blog
How Wiz Research uncovered multiple related vulnerabilities in PostgreSQL-as-a-Service offerings from GCP, Azure, and others.
DNSMonitor leverages Apple's Network Extension Framework to monitor DNS requests and responses
https://ift.tt/kByJGIq
Submitted August 12, 2022 at 12:42PM by sanitybit
via reddit https://ift.tt/6FryhUz
https://ift.tt/kByJGIq
Submitted August 12, 2022 at 12:42PM by sanitybit
via reddit https://ift.tt/6FryhUz
objective-see.org
Commandline Utilities
CLI utilities to facilate system monitoring and malware analysis.
DeathStalker’s continuous strike at foreign and cryptocurrency exchanges
https://ift.tt/Tsq4Ixt
Submitted August 10, 2022 at 05:51PM by EspoJ
via reddit https://ift.tt/h9QTy8A
https://ift.tt/Tsq4Ixt
Submitted August 10, 2022 at 05:51PM by EspoJ
via reddit https://ift.tt/h9QTy8A
Securelist
VileRAT: DeathStalker’s continuous strike at foreign and cryptocurrency exchanges
VileRAT is a Python implant, part of an evasive and highly intricate attack campaign against foreign exchange and cryptocurrency trading companies.
Blackhat 2022 recap - cloud, eBPF, global conflicts, supply chain, and more
https://ift.tt/KTXrNPg
Submitted August 12, 2022 at 01:05PM by MiguelHzBz
via reddit https://ift.tt/0T9B6dk
https://ift.tt/KTXrNPg
Submitted August 12, 2022 at 01:05PM by MiguelHzBz
via reddit https://ift.tt/0T9B6dk
Sysdig
Blackhat 2022 recap - Trends and highlights – Sysdig
Blackhat 2022, on its 25th anniversary, took place this week in Las Vegas, and also in its virtual format.
capa v4: casting a wider .NET
https://ift.tt/7M4GP6x
Submitted August 12, 2022 at 04:05PM by sanitybit
via reddit https://ift.tt/W803aRL
https://ift.tt/7M4GP6x
Submitted August 12, 2022 at 04:05PM by sanitybit
via reddit https://ift.tt/W803aRL
Mandiant
capa v4: casting a wider .NET | Mandiant
Researching TEE payment system built into Xiaomi smartphones powered by MediaTek
https://ift.tt/MyVavuG
Submitted August 12, 2022 at 04:02PM by sanitybit
via reddit https://ift.tt/Zr9zf2u
https://ift.tt/MyVavuG
Submitted August 12, 2022 at 04:02PM by sanitybit
via reddit https://ift.tt/Zr9zf2u
Check Point Research
Researching Xiaomi’s TEE to get to Chinese money - Check Point Research
Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the latest statistics, the Far East and China accounted for two-thirds…
Security Implications of URL Parsing Differentials
https://ift.tt/2qkZLtm
Submitted August 12, 2022 at 06:29PM by monoimpact
via reddit https://ift.tt/jeHt9T3
https://ift.tt/2qkZLtm
Submitted August 12, 2022 at 06:29PM by monoimpact
via reddit https://ift.tt/jeHt9T3
Sonarsource
Security Implications of URL Parsing Differentials
Our security research led to the discovery of a flaw in a popular Apache2 authentication module. We come back on this case of parsing differential and how various languages behave when working with URLs.