WPHash - Fingerprinting WordPress Plugins, now in public beta and open to feedback and collaboration
https://wpha.sh/
Submitted September 05, 2022 at 12:14AM by _cydave
via reddit https://ift.tt/WRndo4L
https://wpha.sh/
Submitted September 05, 2022 at 12:14AM by _cydave
via reddit https://ift.tt/WRndo4L
wpha.sh
WPHash: WordPress Plugin Fingerprinting
WPHash indexes over 75 million SHA256 hashes for fingerprinting the exact version of WordPress plugins.
CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files
https://ift.tt/4QtJU8f
Submitted September 05, 2022 at 01:43PM by anyore909
via reddit https://ift.tt/bG5jCPx
https://ift.tt/4QtJU8f
Submitted September 05, 2022 at 01:43PM by anyore909
via reddit https://ift.tt/bG5jCPx
Cymulate
CVE-2022-30190, AKA Follina, Uses Macro-less Word Docs to Drop RCE Files
Rated a 7.8 high CVSS 3.x severity base score, CVE-2022-30190 takes advantage of the MSDT, an official tool built-in all versions of Windows.
PoC: resolving dynamically System Service Numbers (SSN) for syscalling in VBA (x64) using FreshyCalls technique
https://ift.tt/qJcR7U3
Submitted September 05, 2022 at 01:30PM by gid0rah
via reddit https://ift.tt/4C3HnQ9
https://ift.tt/qJcR7U3
Submitted September 05, 2022 at 01:30PM by gid0rah
via reddit https://ift.tt/4C3HnQ9
Gist
Retrieving SSN for syscalling in VBA following FreshyCalls technique
Retrieving SSN for syscalling in VBA following FreshyCalls technique - FreshyCalls-VBA.vba
Walkthrough of an unauthenticated RCE affecting pfBlockerNG <= 2.1.4_26 (CVE-2022-31814)
https://ift.tt/U6W5MV1
Submitted September 05, 2022 at 02:10PM by IHTeam
via reddit https://ift.tt/BAfDcke
https://ift.tt/U6W5MV1
Submitted September 05, 2022 at 02:10PM by IHTeam
via reddit https://ift.tt/BAfDcke
IHTeam Security Blog
pfBlockerNG Unauth RCE Vulnerability - IHTeam Security Blog
TL;DR IHTeam undertook an independent security assessment of pfsense’s pfBlockerNG plugin version 2.1.4_26 and identified the following vulnerability: Unauthenticated Remote Command Execution as root (CVE-2022-31814) What’s pfBlockerNG pfBlockerNG (https…
Hacking my Helium Crypto Miner
https://ift.tt/tSzYriG
Submitted September 05, 2022 at 04:23PM by wez32
via reddit https://ift.tt/ULVMrKm
https://ift.tt/tSzYriG
Submitted September 05, 2022 at 04:23PM by wez32
via reddit https://ift.tt/ULVMrKm
Zolder B.V.
Hacking my Helium Crypto Miner
Recently I came across an interesting cryptocurrency project called Helium. Its a wireless network built by people all around the world. The people that help expanding the network by adding a hotsp…
Simple IBM i (AS/400) hacking
https://ift.tt/etArhDc
Submitted September 05, 2022 at 05:36PM by buherator
via reddit https://ift.tt/0hQGDlb
https://ift.tt/etArhDc
Submitted September 05, 2022 at 05:36PM by buherator
via reddit https://ift.tt/0hQGDlb
Shielder - How to Decrypt Manage Engine PMP Passwords for Fun and Domain Admin - a Red Teaming Tale
https://ift.tt/PZHsAzi
Submitted September 05, 2022 at 08:17PM by smaury
via reddit https://ift.tt/5fghyk3
https://ift.tt/PZHsAzi
Submitted September 05, 2022 at 08:17PM by smaury
via reddit https://ift.tt/5fghyk3
Shielder
Shielder - How to Decrypt Manage Engine PMP Passwords for Fun and Domain Admin - a Red Teaming Tale
Reverse engineering and analysis of a fiscal printer device for fun and (real) profit.
Anatomy of an exploit in Windows win32k - CVE-2022-21882 - Avira Blog
https://ift.tt/SDntOkU
Submitted September 06, 2022 at 12:09AM by jeandrew
via reddit https://ift.tt/CVJqul6
https://ift.tt/SDntOkU
Submitted September 06, 2022 at 12:09AM by jeandrew
via reddit https://ift.tt/CVJqul6
Avira Blog
Anatomy of an exploit in Windows win32k - CVE-2022-21882 - Avira Blog
CVE-2022-21882: A new manipulation technique of window objects in kernel memory that leads to privilege escalation
SAT/SMT Solvers by Example
https://ift.tt/koBdGHx
Submitted September 06, 2022 at 07:36AM by ambray_
via reddit https://ift.tt/iBqfujR
https://ift.tt/koBdGHx
Submitted September 06, 2022 at 07:36AM by ambray_
via reddit https://ift.tt/iBqfujR
TA505 Group's TeslaGun In-Depth Analysis
https://ift.tt/UzDlwxr
Submitted September 06, 2022 at 03:43PM by wtfse
via reddit https://ift.tt/dNQsiM3
https://ift.tt/UzDlwxr
Submitted September 06, 2022 at 03:43PM by wtfse
via reddit https://ift.tt/dNQsiM3
Prodaft
[TA505] TA505 Group's TeslaGun In-Depth Analysis - PRODAFT
Prodaft is a cyber threat intelligence company helping organizations to mitigate cyber threats. Our expert engineers put forth proactive defense mechanisms to safeguard your business from cyber attacks.
I patched my Slack client to keep "Oops" messages others delete
https://ift.tt/5V9v1Hl
Submitted September 06, 2022 at 05:06AM by sh0n1z
via reddit https://ift.tt/BUZ0mXI
https://ift.tt/5V9v1Hl
Submitted September 06, 2022 at 05:06AM by sh0n1z
via reddit https://ift.tt/BUZ0mXI
GitHub
GitHub - SharonBrizinov/slack-anti-delete: I patched my Slack client to keep messages that others delete
I patched my Slack client to keep messages that others delete - GitHub - SharonBrizinov/slack-anti-delete: I patched my Slack client to keep messages that others delete
Hardware debug probes for JTAG debugging for Intel and AMD - Necrosys/x86-JTAG-Information
https://ift.tt/Z7XMGYp
Submitted September 06, 2022 at 06:39PM by Gallus
via reddit https://ift.tt/mxsW2MA
https://ift.tt/Z7XMGYp
Submitted September 06, 2022 at 06:39PM by Gallus
via reddit https://ift.tt/mxsW2MA
GitHub
GitHub - Necrosys/x86-JTAG-Information
Contribute to Necrosys/x86-JTAG-Information development by creating an account on GitHub.
How to turn security research into profit: a CL.0 case study
https://ift.tt/C8tdL4W
Submitted September 06, 2022 at 06:58PM by albinowax
via reddit https://ift.tt/crsKgAl
https://ift.tt/C8tdL4W
Submitted September 06, 2022 at 06:58PM by albinowax
via reddit https://ift.tt/crsKgAl
PortSwigger Research
How to turn security research into profit: a CL.0 case study
Have you ever seen a promising hacking technique, only to try it out and struggle to find any vulnerable systems or non-duplicate findings? In this post, I'll take a concise look at the most effective
Vulnerability Analysis of CVE-2018-12613 – phpMyAdmin 4.8.1 Remote Code Execution
https://ift.tt/40V6iDl
Submitted September 06, 2022 at 09:31PM by sandeep1337
via reddit https://ift.tt/QgjHoe8
https://ift.tt/40V6iDl
Submitted September 06, 2022 at 09:31PM by sandeep1337
via reddit https://ift.tt/QgjHoe8
Penetration Testing and CyberSecurity Solution - SecureLayer7
Vulnerability Analysis of CVE-2018-12613 – phpMyAdmin 4.8.1 Remote Code Execution
Vulnerability Analysis of CVE-2018-12613 is explained in the below blog post. PhpMyAdmin is a free and open-source administration tool for MySQL and MariaDB, providing us with a user-friendly...
23 year old Denial of Service bug in Curl
https://ift.tt/iFuT9f0
Submitted September 06, 2022 at 09:26PM by sanitybit
via reddit https://ift.tt/QP47sRd
https://ift.tt/iFuT9f0
Submitted September 06, 2022 at 09:26PM by sanitybit
via reddit https://ift.tt/QP47sRd
Unpatched Unauthenticated Blind SSRF in WordPress Core
https://ift.tt/0ODsqtW
Submitted September 06, 2022 at 09:12PM by monoimpact
via reddit https://ift.tt/tQiSM2H
https://ift.tt/0ODsqtW
Submitted September 06, 2022 at 09:12PM by monoimpact
via reddit https://ift.tt/tQiSM2H
Sonarsource
WordPress Core - Unauthenticated Blind SSRF
Our security researchers were surprised to discover a low-hanging code vulnerability in WordPress Core that we will discuss in this blog post.
Ryuk Ransomware: History, Timeline, and Adversary Simulation
https://ift.tt/K0B3GxY
Submitted September 06, 2022 at 10:43PM by achilles4828
via reddit https://ift.tt/uTqtp1x
https://ift.tt/K0B3GxY
Submitted September 06, 2022 at 10:43PM by achilles4828
via reddit https://ift.tt/uTqtp1x
FourCore
Ryuk Ransomware: History, Timeline, and Adversary Simulation - FourCore
Ryuk is ransomware attributed to the hacker group WIZARD SPIDER that has targeted governments, healthcare, manufacturing, and technology organizations. This article covers the Ryuk Attack, Threat Intel on Ryuk Ransomware, Attack Vectors involved, attack flow…
Sensitive Command Token - So much offense in my defense
https://ift.tt/wkc3Y2I
Submitted September 07, 2022 at 12:43AM by 0xdea
via reddit https://ift.tt/72bMuxU
https://ift.tt/wkc3Y2I
Submitted September 07, 2022 at 12:43AM by 0xdea
via reddit https://ift.tt/72bMuxU
Thinkst Thoughts
Sensitive Command Token – So much offense in my defense
Introduction: Many people have pointed out that there are a handful of commands that are overwhelmingly run by attackers on compromised hosts (and seldom ever by regular users/usage). Reliably aler…
SharkFest'21 Wireshark Conference Playlist - hours of free netsec and network analysis content
https://youtube.com/playlist?list=PLz_ZpPUgiXqPcQWL3uRIq81ONbO28Pbb3bO28Pbb3
Submitted September 07, 2022 at 12:41AM by haveitall
via reddit https://ift.tt/3hR8LFa
https://youtube.com/playlist?list=PLz_ZpPUgiXqPcQWL3uRIq81ONbO28Pbb3bO28Pbb3
Submitted September 07, 2022 at 12:41AM by haveitall
via reddit https://ift.tt/3hR8LFa
Reddit
SharkFest'21 Wireshark Conference Playlist - hours of free netsec and network analysis content : r/netsec
466K subscribers in the netsec community. /r/netsec is a community-curated aggregator of technical information security content. Our mission is to…
Vulnerability Management for Go
https://ift.tt/AJBMSzL
Submitted September 07, 2022 at 11:29AM by sanitybit
via reddit https://ift.tt/85N9sSg
https://ift.tt/AJBMSzL
Submitted September 07, 2022 at 11:29AM by sanitybit
via reddit https://ift.tt/85N9sSg
go.dev
Vulnerability Management for Go - The Go Programming Language
Announcing vulnerability management for Go, to help developers learn about known vulnerabilities in their dependencies.
Linux CONFIG_WATCH_QUEUE LPE
https://ift.tt/j5YEhdx
Submitted September 07, 2022 at 12:09PM by Gallus
via reddit https://ift.tt/szdB8iU
https://ift.tt/j5YEhdx
Submitted September 07, 2022 at 12:09PM by Gallus
via reddit https://ift.tt/szdB8iU
SSD Secure Disclosure
SSD Advisory – Linux CONFIG_WATCH_QUEUE LPE - SSD Secure Disclosure
Bad handling by Apple Safari allows attackers to use certain look-alike characters instead of the real ones allow attackers to confuse victims into thinking they are reach a certain site, while they are accessing another one.