BSidesLV 2022 Conference Recordings
View the talk schedule here, and then jump into the corresponding playlist:Breaking GroundCommon GroundGround FloorGround TruthHire GroundI Am The CavalryPasswords ConProving Ground
Submitted September 07, 2022 at 11:36PM by sanitybit
via reddit https://ift.tt/TNbC7dj
View the talk schedule here, and then jump into the corresponding playlist:Breaking GroundCommon GroundGround FloorGround TruthHire GroundI Am The CavalryPasswords ConProving Ground
Submitted September 07, 2022 at 11:36PM by sanitybit
via reddit https://ift.tt/TNbC7dj
bsideslv.org
- BSides Las Vegas
BSides Las Vegas is a nonprofit organization formed to stimulate the Information Security industry and community.
SharkFest'21 Wireshark Conference Playlist - hours of free netsec and network analysis content
https://youtube.com/playlist?list=PLz_ZpPUgiXqPcQWL3uRIq81ONbO28Pbb3
Submitted September 07, 2022 at 11:10PM by haveitall
via reddit https://ift.tt/wEQ8F9a
https://youtube.com/playlist?list=PLz_ZpPUgiXqPcQWL3uRIq81ONbO28Pbb3
Submitted September 07, 2022 at 11:10PM by haveitall
via reddit https://ift.tt/wEQ8F9a
YouTube
SF21VUS - Sessions - YouTube
Constant-Time Data Processing At a Secret Offset, Privacy and QUIC
https://ift.tt/4KwxpWZ
Submitted September 07, 2022 at 11:10PM by sanitybit
via reddit https://ift.tt/moPXEtB
https://ift.tt/4KwxpWZ
Submitted September 07, 2022 at 11:10PM by sanitybit
via reddit https://ift.tt/moPXEtB
NCC Group Research
Constant-Time Data Processing At a Secret Offset, Privacy and QUIC
NCC Group Cryptography Services team assessed security aspects of several implementations of the QUIC NCC Group Cryptography Services team assessed security aspects of several implementations of the QUIC protocol. During the course of their reviews, the team…
How BSD Authentication Works
https://ift.tt/UReKD8i
Submitted September 07, 2022 at 10:56PM by sanitybit
via reddit https://ift.tt/59HbyrO
https://ift.tt/UReKD8i
Submitted September 07, 2022 at 10:56PM by sanitybit
via reddit https://ift.tt/59HbyrO
blog.lambda.cx
How BSD Authentication Works
A walkthrough of OpenBSD's BSD Authentication framework
Exploiting Flipper Zero NFC file loader
https://ift.tt/6TnaVIl
Submitted September 08, 2022 at 02:07AM by VVX7
via reddit https://ift.tt/wN7RjgP
https://ift.tt/6TnaVIl
Submitted September 08, 2022 at 02:07AM by VVX7
via reddit https://ift.tt/wN7RjgP
vvx7.io
Your Amiibo's Haunted
Exploiting Flipper Zero's NFC file loader
Attacks on Sysmon Revisited - SysmonEnte
https://ift.tt/Nn4AHu0
Submitted September 08, 2022 at 07:57AM by sanitybit
via reddit https://ift.tt/GxvIilZ
https://ift.tt/Nn4AHu0
Submitted September 08, 2022 at 07:57AM by sanitybit
via reddit https://ift.tt/GxvIilZ
Blogspot
code white | Blog: Attacks on Sysmon Revisited - SysmonEnte
In this blogpost we demonstrate an attack on the integrity of Sysmon which generates a minimal amount of observable events making this attac...
Monkey 365 is a plugin-based PowerShell module that can be used to review the security posture of your Microsoft cloud environment.
https://ift.tt/GEx5hF9
Submitted September 08, 2022 at 12:43PM by sanitybit
via reddit https://ift.tt/fU4TIm6
https://ift.tt/GEx5hF9
Submitted September 08, 2022 at 12:43PM by sanitybit
via reddit https://ift.tt/fU4TIm6
NCC Group Research
Tool Release – Monkey365
Monkey 365 is an Open Source security tool that can be used to easily conduct not only Microsoft 365, but also Azure subnoscriptions and Azure Active Directory security configuration reviews without the significant overhead of learning tool APIs or complex…
A dangerous way to fix Integer Overflow in Solidity
https://ift.tt/WywD9bB
Submitted September 08, 2022 at 01:35PM by boxiso6989
via reddit https://ift.tt/uMDJw1S
https://ift.tt/WywD9bB
Submitted September 08, 2022 at 01:35PM by boxiso6989
via reddit https://ift.tt/uMDJw1S
Discuss
A dangerous way to fix Integer Overflow in Solidity
Surprisingly, a sizable number of submissions for dApp Start Here level was by swapping int32 with uint. These submission fail for a good reason. The security vulnerability has not been fixed! Let’s find out why. uint is an alias for uint256. It has…
Exploiting Laravel based applications with leaked APP_KEYs and Queues
https://ift.tt/fCgDMJc
Submitted September 08, 2022 at 02:02PM by Gallus
via reddit https://ift.tt/7tYE6f0
https://ift.tt/fCgDMJc
Submitted September 08, 2022 at 02:02PM by Gallus
via reddit https://ift.tt/7tYE6f0
MOGWAI LABS GmbH web site
Exploiting Laravel based applications with leaked APP_KEYs and Queues
So you got access to a Laravel .env file, now what?
Fork Bomb for Flutter
https://ift.tt/MIld2sV
Submitted September 08, 2022 at 08:45PM by lmpact_
via reddit https://ift.tt/dgW6eFM
https://ift.tt/MIld2sV
Submitted September 08, 2022 at 08:45PM by lmpact_
via reddit https://ift.tt/dgW6eFM
PT SWARM
Fork Bomb for Flutter
Flutter applications can be found in security analysis projects or bugbounty programs. Most often, such assets are simply overlooked due to the lack of methodologies and ways to reverse engineer them. I decided not to skip this anymore and developed the reFlutter…
Bypass Credential Exfiltration Detection - Hacking The Cloud
https://ift.tt/xXuoDe6
Submitted September 08, 2022 at 08:01PM by RedTermSession
via reddit https://ift.tt/Ez8mPRb
https://ift.tt/xXuoDe6
Submitted September 08, 2022 at 08:01PM by RedTermSession
via reddit https://ift.tt/Ez8mPRb
hackingthe.cloud
Bypass Credential Exfiltration Detection - Hacking The Cloud
When stealing IAM credentials from an EC2 instance you can avoid a GuardDuty detection by using VPC Endpoints.
Attacking Firecracker: AWS' microVM Monitor Written in Rust
https://ift.tt/ebRLqnO
Submitted September 08, 2022 at 09:49PM by Gallus
via reddit https://ift.tt/JuY8Kz7
https://ift.tt/ebRLqnO
Submitted September 08, 2022 at 09:49PM by Gallus
via reddit https://ift.tt/JuY8Kz7
Graplsecurity
Attacking Firecracker: AWS' microVM Monitor Written in Rust - Blog | Grapl
Firecracker is a microVM manager in Rust that powers AWS services like Lambda and Fargate. It's also one of the key components of Grapl's multi-tenant isolation. A critical dependency deserves some red teaming - here's how we attacked AWS Firecracker.
Riding the InfoRail to Exploit Ivanti Avalanche – Part 2
https://ift.tt/dfRux37
Submitted September 08, 2022 at 09:41PM by 0xdea
via reddit https://ift.tt/j5lMAvn
https://ift.tt/dfRux37
Submitted September 08, 2022 at 09:41PM by 0xdea
via reddit https://ift.tt/j5lMAvn
Zero Day Initiative
Zero Day Initiative — Riding the InfoRail to Exploit Ivanti Avalanche – Part 2
In my first blog post covering bugs in Ivanti Avalanche, I covered how I reversed the Avalanche custom InfoRail protocol, which allowed me to communicate with multiple services deployed within this product. This allowed me to find multiple vulnerabilities…
Understanding Windows Containers Communication - And a new OSS tool! RPCMon
https://ift.tt/mPaE6qo
Submitted September 08, 2022 at 09:31PM by jat0369
via reddit https://ift.tt/TJSiQUn
https://ift.tt/mPaE6qo
Submitted September 08, 2022 at 09:31PM by jat0369
via reddit https://ift.tt/TJSiQUn
Cyberark
Understanding Windows Containers Communication
Several years ago, when I spoke with people about containers, most of them were not familiar with the term. Today, it is unquestionably one of the most popular technologies being used in DevOps...
cobaltstrike-headless: (mostly) functional headless cobalt strike client.
https://ift.tt/B2DCvAx
Submitted September 08, 2022 at 09:04PM by 0xdea
via reddit https://ift.tt/2kbWVjy
https://ift.tt/B2DCvAx
Submitted September 08, 2022 at 09:04PM by 0xdea
via reddit https://ift.tt/2kbWVjy
GitHub
GitHub - CodeXTF2/cobaltstrike-headless: Aggressornoscript that turns the headless aggressor client into a (mostly) functional cobalt…
Aggressornoscript that turns the headless aggressor client into a (mostly) functional cobalt strike client. - GitHub - CodeXTF2/cobaltstrike-headless: Aggressornoscript that turns the headless aggresso...
Shiba Inu Crypto cloud credentials leaked on a public repository!
https://ift.tt/ascJUG1
Submitted September 08, 2022 at 08:52PM by apprakash
via reddit https://ift.tt/0SQVeD4
https://ift.tt/ascJUG1
Submitted September 08, 2022 at 08:52PM by apprakash
via reddit https://ift.tt/0SQVeD4
Medium
Shiba Inu cloud credentials leaked in a major security breach
Shiba Inu developers leak AWS Access keys on a public code repository, resulting in a compromise of their infrastructure.
Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically
https://ift.tt/wVs5aD6
Submitted September 09, 2022 at 03:04PM by jeandrew
via reddit https://ift.tt/0q69Lju
https://ift.tt/wVs5aD6
Submitted September 09, 2022 at 03:04PM by jeandrew
via reddit https://ift.tt/0q69Lju
Google Online Security Blog
Fuzzing beyond memory corruption: Finding broader classes of vulnerabilities automatically
Posted by Jonathan Metzman, Dongge Liu and Oliver Chang, Google Open Source Security Team Recently, OSS-Fuzz —our community fuzzing servi...
Spotlight: Occlum open source software for Intel SGX
https://ift.tt/RnPJb0a
Submitted September 09, 2022 at 09:27PM by laramontoyalaske
via reddit https://ift.tt/ZkS9Mi0
https://ift.tt/RnPJb0a
Submitted September 09, 2022 at 09:27PM by laramontoyalaske
via reddit https://ift.tt/ZkS9Mi0
Medium
Spotlight: Occlum
A look at the open-source confidential computing landscape
SiliFuzz - Fuzzing CPUs by proxy
https://ift.tt/S4CI0Kv
Submitted September 10, 2022 at 01:34AM by sanitybit
via reddit https://ift.tt/Mpq3bLk
https://ift.tt/S4CI0Kv
Submitted September 10, 2022 at 01:34AM by sanitybit
via reddit https://ift.tt/Mpq3bLk
GitHub
GitHub - google/silifuzz
Contribute to google/silifuzz development by creating an account on GitHub.
“GIFShell” — Covert Attack Chain and C2 Utilizing Microsoft Teams GIFs
https://ift.tt/uMBqXv4
Submitted September 10, 2022 at 01:26AM by sanitybit
via reddit https://ift.tt/BsDme7g
https://ift.tt/uMBqXv4
Submitted September 10, 2022 at 01:26AM by sanitybit
via reddit https://ift.tt/BsDme7g
Medium
“GIFShell” — Covert Attack Chain and C2 Utilizing Microsoft Teams GIFs
Table of Contents
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
Submitted September 10, 2022 at 01:18AM by CyberMasterV
via reddit https://ift.tt/AuzFaOe
https://www.sentinelone.com/labs/crimeware-trends-ransomware-developers-turn-to-intermittent-encryption-to-evade-detection/
Submitted September 10, 2022 at 01:18AM by CyberMasterV
via reddit https://ift.tt/AuzFaOe
SentinelOne
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
Partially encrypting victims' files improves ransomware speed and aids evasion. First seen in LockFile, the technique is now being widely adopted.