I'm Building a Self-Destructing USB Drive Part 2
https://ift.tt/fLlVSHn
Submitted September 19, 2022 at 10:18PM by Machinehum
via reddit https://ift.tt/d0ujpGF
https://ift.tt/fLlVSHn
Submitted September 19, 2022 at 10:18PM by Machinehum
via reddit https://ift.tt/d0ujpGF
Interrupt Labs Blog
I'm Building a Self-Destructing USB Drive Part 2
I’m building an open-source USB drive with a hidden self-destruct feature. Say goodbye to your data if you don’t lick your fingers before plugging it
When Athletic Abilities Just Aren't Enough - Scoreboard Hacking Part 1
https://ift.tt/AgCkis2
Submitted September 19, 2022 at 05:42PM by mdulin2
via reddit https://ift.tt/DA1et37
https://ift.tt/AgCkis2
Submitted September 19, 2022 at 05:42PM by mdulin2
via reddit https://ift.tt/DA1et37
Cool Attack -- Bypassing NAT and Firewalls to Shut Down PDUs
https://ift.tt/lBTpUu5
Submitted September 21, 2022 at 01:13AM by derp6996
via reddit https://ift.tt/PkeI2Qb
https://ift.tt/lBTpUu5
Submitted September 21, 2022 at 01:13AM by derp6996
via reddit https://ift.tt/PkeI2Qb
Claroty
Bypassing NAT to Attack Dataprobe iBoot-PDUs
Team82 discloses details on vulnerabilities in Dataprobe iBoot-PDUs that expose power distribution units to remote code execution.
Oracle Cloud vulnerability allows unauthorized access to customer cloud storage volumes
https://ift.tt/T4wVL2x
Submitted September 21, 2022 at 04:03AM by sagitz_
via reddit https://ift.tt/eHNC9Ep
https://ift.tt/T4wVL2x
Submitted September 21, 2022 at 04:03AM by sagitz_
via reddit https://ift.tt/eHNC9Ep
wiz.io
AttachMe: critical OCI vulnerability allows unauthorized access to customer cloud storage volumes | Wiz Blog
Before it was patched, #AttachMe could have allowed attackers to access and modify any other users' OCI storage volumes without authorization, thereby violating cloud isolation. Upon disclosure, the vulnerability was fixed within hours by Oracle. No customer…
BGGP3 has completed! 34 entries, 23 writeups, and 3 CVE's.
https://ift.tt/RYVoek4
Submitted September 21, 2022 at 07:24AM by netsecfriends
via reddit https://ift.tt/xE9rbD2
https://ift.tt/RYVoek4
Submitted September 21, 2022 at 07:24AM by netsecfriends
via reddit https://ift.tt/xE9rbD2
GitHub
BGGP/2022 at main · netspooky/BGGP
Binary Golf Grand Prix. Contribute to netspooky/BGGP development by creating an account on GitHub.
Exploiting a Seagate service to create a SYSTEM shell (CVE-2022-40286)
https://ift.tt/DJF6NQ5
Submitted September 21, 2022 at 12:29PM by sanitybit
via reddit https://ift.tt/DXqUmcn
https://ift.tt/DJF6NQ5
Submitted September 21, 2022 at 12:29PM by sanitybit
via reddit https://ift.tt/DXqUmcn
Practical Attacks against NTLMv1
https://ift.tt/fxK6Mgb
Submitted September 21, 2022 at 12:19PM by 0xdea
via reddit https://ift.tt/2Pn37Co
https://ift.tt/fxK6Mgb
Submitted September 21, 2022 at 12:19PM by 0xdea
via reddit https://ift.tt/2Pn37Co
TrustedSec
Practical Attacks against NTLMv1 - TrustedSec
TrustedSec's blog is an expert source of information on information security trends and best practices for strategic risk management.
Intent Summit 2022 - The Security Research Summit. For researchers. By researchers. CFP now open!
https://ift.tt/s5aQmdI
Submitted September 21, 2022 at 02:45PM by jat0369
via reddit https://ift.tt/RGHw8xL
https://ift.tt/s5aQmdI
Submitted September 21, 2022 at 02:45PM by jat0369
via reddit https://ift.tt/RGHw8xL
Intent Summit
Intent Summit 2022 - The Security Research Summit. For researchers. By researchers.
Follow Us Down The Rabbit Hole The security summit for researchers / by researchers It’s time to declare your intent. December 18 • Tel Aviv Zappa MidTown, Derech Menachem Begin 144 REGISTER We have full house. Registration is closed. Researchers are coming…
User claim he hacked a Lockbit Server and release builder & more
https://ift.tt/04aW5Uj
Submitted September 21, 2022 at 04:24PM by Zapgui
via reddit https://ift.tt/Q2kTfgq
https://ift.tt/04aW5Uj
Submitted September 21, 2022 at 04:24PM by Zapgui
via reddit https://ift.tt/Q2kTfgq
GitHub
3xp0rt/LockBit-Black-Builder
Contribute to 3xp0rt/LockBit-Black-Builder development by creating an account on GitHub.
How we Abused Repository Webhooks to Access Internal CI Systems at Scale
https://ift.tt/MAceb7g
Submitted September 21, 2022 at 08:46PM by Hefty_Knowledge_7449
via reddit https://ift.tt/zrCpnsS
https://ift.tt/MAceb7g
Submitted September 21, 2022 at 08:46PM by Hefty_Knowledge_7449
via reddit https://ift.tt/zrCpnsS
Cider Security Site
How we Abused Repository Webhooks to Access Internal CI Systems at Scale - Cider Security Site
Huge thanks to Yaron Avital, Tyler Welton and Daniel Krivelevich for their contribution to this research. Intro As adoption of CI systems and processes becomes more prevalent, organizations opt for a CI/CD architecture which combines SaaS-based source control…
Finding a RCE and a Docker escape in OneDev
https://ift.tt/5hlXweG
Submitted September 21, 2022 at 08:31PM by monoimpact
via reddit https://ift.tt/95hUV6R
https://ift.tt/5hlXweG
Submitted September 21, 2022 at 08:31PM by monoimpact
via reddit https://ift.tt/95hUV6R
Sonarsource
Securing Developer Tools: OneDev Remote Code Execution
We recently discovered several vulnerabilities in OneDev 7.2.9 that allowed attackers to fully compromise a server and even break out of a Docker environment.
Giving JuicyPotato a second chance: JuicyPotatoNG
https://ift.tt/NGjOAfp
Submitted September 21, 2022 at 11:17PM by splinter_code
via reddit https://ift.tt/N0IJZH5
https://ift.tt/NGjOAfp
Submitted September 21, 2022 at 11:17PM by splinter_code
via reddit https://ift.tt/N0IJZH5
Decoder's Blog
Giving JuicyPotato a second chance: JuicyPotatoNG
Well, it’s been a long time ago since our beloved JuicyPotato has been published. Meantime things changed and got fixed (backported also to Win10 1803/Server2016) leading to the glorious end …
FilelessRemotePE: Loading fileless remote PE from URI to memory
https://ift.tt/vO2DLAM
Submitted September 22, 2022 at 05:11AM by sanitybit
via reddit https://ift.tt/8QwBlcV
https://ift.tt/vO2DLAM
Submitted September 22, 2022 at 05:11AM by sanitybit
via reddit https://ift.tt/8QwBlcV
GitHub
GitHub - D1rkMtr/FilelessRemotePE: Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL…
Loading Fileless Remote PE from URI to memory with argument passing and ETW patching and NTDLL unhooking and No New Thread technique - GitHub - D1rkMtr/FilelessRemotePE: Loading Fileless Remote PE...
AWS IAM Identity Center Access Tokens are Stored in Clear Text and No, That’s Not a Critical…
https://ift.tt/sCaOjud
Submitted September 22, 2022 at 06:18AM by csanders_
via reddit https://ift.tt/Vi8AHtE
https://ift.tt/sCaOjud
Submitted September 22, 2022 at 06:18AM by csanders_
via reddit https://ift.tt/Vi8AHtE
Medium
AWS IAM Identity Center Access Tokens are Stored in Clear Text and No, That’s Not a Critical Vulnerability
Every week, almost without fail, I come across one thing that confuses, entertains, or most commonly infuriates me. I’ve decided to keep a…
Dissecting and MITMing Duo Device Health App
https://ift.tt/E4gxpHA
Submitted September 22, 2022 at 06:59AM by sanitybit
via reddit https://ift.tt/lixZFR3
https://ift.tt/E4gxpHA
Submitted September 22, 2022 at 06:59AM by sanitybit
via reddit https://ift.tt/lixZFR3
Medium
Dissecting and MITMing Duo Device Health App
Every week, almost without fail, I come across one thing that confuses, entertains, or most commonly infuriates me. I’ve decided to keep a…
Breaking Bitbucket: Pre Auth Remote Command Execution (CVE-2022-36804)
https://ift.tt/qeX8P3F
Submitted September 22, 2022 at 09:55AM by Mempodipper
via reddit https://ift.tt/5To8pUn
https://ift.tt/qeX8P3F
Submitted September 22, 2022 at 09:55AM by Mempodipper
via reddit https://ift.tt/5To8pUn
Assetnote
Breaking Bitbucket: Pre Auth Remote Command Execution (CVE-2022-36804)
Application security issues found by Assetnote
Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library
https://ift.tt/uI0zXVU
Submitted September 22, 2022 at 09:56AM by Mempodipper
via reddit https://ift.tt/dhRGjgA
https://ift.tt/uI0zXVU
Submitted September 22, 2022 at 09:56AM by Mempodipper
via reddit https://ift.tt/dhRGjgA
Sam Curry | Web Application Security Researcher
Exploiting Web3’s Hidden Attack Surface: Universal XSS on Netlify’s Next.js Library
On August 24th, 2022, we reported a vulnerability to Netlify affecting their Next.js "netlify-ipx" repository which would allow an attacker to achieve persistent cross-site noscripting...
Bypassing FileBlockExecutable in Sysmon 14.0: A Lesson In Analyzing Assumptions
https://ift.tt/B3DYtPf
Submitted September 22, 2022 at 02:22PM by darronofsky
via reddit https://ift.tt/lFnThEW
https://ift.tt/B3DYtPf
Submitted September 22, 2022 at 02:22PM by darronofsky
via reddit https://ift.tt/lFnThEW
Huntandhackett
Bypassing FileBlockExecutable in Sysmon 14.0: A Lesson In Analyzing Assumptions
Understanding the operation and limitations of Sysmon's first preventive mechanism: the FileBlockExecutable event.
Raspberry Robin’s Roshtyak: A Little Lesson in Trickery
https://ift.tt/s9DT7ZN
Submitted September 22, 2022 at 04:23PM by stashing_the_smack
via reddit https://ift.tt/sFPz61V
https://ift.tt/s9DT7ZN
Submitted September 22, 2022 at 04:23PM by stashing_the_smack
via reddit https://ift.tt/sFPz61V
Avast Threat Labs
Raspberry Robin’s Roshtyak: A Little Lesson in Trickery - Avast Threat Labs
We take a deep dive into Roshtyak, the DLL backdoor payload associated with Raspberry Robin. Roshtyak is full of anti-analysis tricks. Some are well-known, and some we have never seen before. From a technical perspective, the lengths Roshtyak takes to protect…
Making HTTP header injection critical via response queue poisoning
https://ift.tt/aAEehti
Submitted September 22, 2022 at 07:35PM by albinowax
via reddit https://ift.tt/wmjf9AU
https://ift.tt/aAEehti
Submitted September 22, 2022 at 07:35PM by albinowax
via reddit https://ift.tt/wmjf9AU
PortSwigger Research
Making HTTP header injection critical via response queue poisoning
HTTP header injection is often under-estimated and misclassified as a moderate severity flaw equivalent to XSS or worse, Open Redirection. In this post, I'll share a simple technique I used to take a
Using Your Device for Unbreakable Okta MFA
https://ift.tt/5pTwDAr
Submitted September 22, 2022 at 07:35PM by sullivanmatt
via reddit https://ift.tt/ZniytcV
https://ift.tt/5pTwDAr
Submitted September 22, 2022 at 07:35PM by sullivanmatt
via reddit https://ift.tt/ZniytcV
Matt's Life Bytes
Using Your Existing Devices for Phish-Proof MFA in Okta
A string of recent attacks has made it clear that ‘classic’ ways of doing MFA are not sufficient. This guide provides instructions for setting up a MacBook Pro’s Touch ID fingerpr…