Hara-Kirin: Dissecting the Privileged Components of Huawei Mobile Devices (Hexacon 2022)
https://ift.tt/LPywWOe
Submitted October 19, 2022 at 04:54PM by M0t0k0Kus4n4g1
via reddit https://ift.tt/lMcUHjS
https://ift.tt/LPywWOe
Submitted October 19, 2022 at 04:54PM by M0t0k0Kus4n4g1
via reddit https://ift.tt/lMcUHjS
Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell
https://ift.tt/4fUISJG
Submitted October 19, 2022 at 06:48PM by MiguelHzBz
via reddit https://ift.tt/q43Vpfy
https://ift.tt/4fUISJG
Submitted October 19, 2022 at 06:48PM by MiguelHzBz
via reddit https://ift.tt/q43Vpfy
Sysdig
Detecting and mitigating CVE-2022-42889 a.k.a. Text4shell | Sysdig
A new critical vulnerability CVE-2022-42889 a.k.a Text4shell was reported on the popular Apache Commons Text library.
Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Single Misconfigured Data Bucket
https://ift.tt/WgYHceC
Submitted October 19, 2022 at 06:43PM by FinchAndrei
via reddit https://ift.tt/j3rwkeo
https://ift.tt/WgYHceC
Submitted October 19, 2022 at 06:43PM by FinchAndrei
via reddit https://ift.tt/j3rwkeo
SOCRadar® Cyber Intelligence Inc.
Sensitive Data of 65,000+ Entities in 111 Countries Leaked due to a Single Misconfigured Data Bucket
BlueBleed covers multiple misconfigured servers with sensitive data detected by SOCRadar's in-house cloud security module.
HTTP/3 connection contamination: an upcoming threat
https://ift.tt/KV5Td9L
Submitted October 19, 2022 at 07:01PM by albinowax
via reddit https://ift.tt/6KNLIZi
https://ift.tt/KV5Td9L
Submitted October 19, 2022 at 07:01PM by albinowax
via reddit https://ift.tt/6KNLIZi
PortSwigger Research
HTTP/3 connection contamination: an upcoming threat?
I recently documented a dangerous reverse-proxy behaviour called first-request routing, which enables host-header attacks on back-end systems. In this post, I'll show how first-request routing also en
Wireless Penetration Testing complete Repo
https://ift.tt/H5JRYGw
Submitted October 19, 2022 at 06:58PM by lutzenfried
via reddit https://ift.tt/8sNEr3F
https://ift.tt/H5JRYGw
Submitted October 19, 2022 at 06:58PM by lutzenfried
via reddit https://ift.tt/8sNEr3F
Telerik Revist - New Exploit Tool
https://ift.tt/YgCijP1
Submitted October 19, 2022 at 11:52PM by aconite33
via reddit https://ift.tt/4O5VS8H
https://ift.tt/YgCijP1
Submitted October 19, 2022 at 11:52PM by aconite33
via reddit https://ift.tt/4O5VS8H
Black Lantern Security (BLSOPS)
Yet Another Telerik UI Revisit
Introduction Several vulnerabilities with the popular ASP.NET web application add-on Telerik UI for ASP.NET AJAX have become a frequent source of “easy-wins” for operators at BLS. Discovery and exploitation are usually straightforward, and they result in…
Fantastic Rootkits: And Where to Find Them (Part 1)
https://ift.tt/XxNo1VU
Submitted October 20, 2022 at 06:30AM by jat0369
via reddit https://ift.tt/sZaJDkG
https://ift.tt/XxNo1VU
Submitted October 20, 2022 at 06:30AM by jat0369
via reddit https://ift.tt/sZaJDkG
Cyberark
Fantastic Rootkits: And Where to Find Them (Part 1)
Introduction In this blog series, we will cover the topic of rootkits — how they are built and the basics of kernel driver analysis — specifically on the Windows platform. In this first part, we...
Expanding (even further) on UUIDv1 Security Issues
https://ift.tt/1xeoUhW
Submitted October 20, 2022 at 12:25PM by csanders_
via reddit https://ift.tt/sfAcEuJ
https://ift.tt/1xeoUhW
Submitted October 20, 2022 at 12:25PM by csanders_
via reddit https://ift.tt/sfAcEuJ
Medium
Expanding on UUIDv1 Security Issues
Every week, almost without fail, I come across one thing that confuses, entertains, or most commonly infuriates me. I’ve decided to keep a…
Untangling Azure Active Directory Principals & Access Permissions
https://ift.tt/VUKBAf7
Submitted October 20, 2022 at 12:10PM by 0xcsandker
via reddit https://ift.tt/WPyVu0g
https://ift.tt/VUKBAf7
Submitted October 20, 2022 at 12:10PM by 0xcsandker
via reddit https://ift.tt/WPyVu0g
csandker.io
Untangling Azure Active Directory Principals & Access Permissions
This blog post will untangle the question of 'who has access to what' in an Azure Active Directory environment. A PowerShell tool will also be released to automatically enumerate this.
Open Source drop - Evil OIDC Server for SSRF testing from Doyensec. Helpful for testers and bug bounty.
https://ift.tt/4UR7Iy2
Submitted October 20, 2022 at 08:48PM by ds_at
via reddit https://ift.tt/NBhRanS
https://ift.tt/4UR7Iy2
Submitted October 20, 2022 at 08:48PM by ds_at
via reddit https://ift.tt/NBhRanS
GitHub
GitHub - doyensec/oidc-ssrf: An Evil OIDC Server
An Evil OIDC Server. Contribute to doyensec/oidc-ssrf development by creating an account on GitHub.
Reverse Engineering the Apple MultiPeer Connectivity Framework
https://ift.tt/uNo6ITs
Submitted October 20, 2022 at 08:17PM by juken
via reddit https://ift.tt/PMiFsQS
https://ift.tt/uNo6ITs
Submitted October 20, 2022 at 08:17PM by juken
via reddit https://ift.tt/PMiFsQS
evilsocket
Reverse Engineering the Apple MultiPeer Connectivity Framework
Some time ago I was using Logic Pro to record some of my music and I needed a way to start and stop the recording from an iPhone, so I found about Logic Remote and was quite happy with it.After the se
Log4J-scan update: Detection for Apache Commons Text RCE (CVE-2022-42889)
https://ift.tt/MoLhrQD
Submitted October 20, 2022 at 09:19PM by mazen160
via reddit https://ift.tt/SUvPXdW
https://ift.tt/MoLhrQD
Submitted October 20, 2022 at 09:19PM by mazen160
via reddit https://ift.tt/SUvPXdW
FullHunt Blog
Log4J-scan update: Detection for Apache Commons Text RCE (CVE-2022-42889)
FullHunt released an update to Log4J-Scan to detect Apache Commons Text RCE (CVE-2022-42889).Detecting Apache Commons Text RCE (CVE-2022-42889)The Apache Com...
SHA-3 Buffer Overflow - CVE-2022-37454
https://ift.tt/NsUm1uq
Submitted October 21, 2022 at 01:46AM by Gallus
via reddit https://ift.tt/8CZuQgw
https://ift.tt/NsUm1uq
Submitted October 21, 2022 at 01:46AM by Gallus
via reddit https://ift.tt/8CZuQgw
A framework for OAuth 2.0 device code authentication grant flow phishing
https://ift.tt/d4lajoB
Submitted October 20, 2022 at 04:51AM by Acceptable-Doubt-878
via reddit https://ift.tt/VPz5CS4
https://ift.tt/d4lajoB
Submitted October 20, 2022 at 04:51AM by Acceptable-Doubt-878
via reddit https://ift.tt/VPz5CS4
Aura Research Division
Device Code Phishing: A Frontend UI
A framework for OAuth 2.0 device code authentication grant flow phishing.
Antignis - Configure Windows Hostbased firewall
https://ift.tt/WHnp6xL
Submitted October 21, 2022 at 03:39PM by One-Assistance-8552
via reddit https://ift.tt/MsCHpLX
https://ift.tt/WHnp6xL
Submitted October 21, 2022 at 03:39PM by One-Assistance-8552
via reddit https://ift.tt/MsCHpLX
GitHub
GitHub - huntandhackett/Antignis: Source code and examples for Antignis
Source code and examples for Antignis. Contribute to huntandhackett/Antignis development by creating an account on GitHub.
How an Attacker Can Achieve Persistence in Google Cloud Platform (GCP) with Cloud Shell
https://ift.tt/y19IR6A
Submitted October 22, 2022 at 04:47AM by 0x414141
via reddit https://ift.tt/fTJA1e9
https://ift.tt/y19IR6A
Submitted October 22, 2022 at 04:47AM by 0x414141
via reddit https://ift.tt/fTJA1e9
Security Intelligence
How an attacker can achieve persistence in Google Cloud Platform (GCP) with Cloud Shell
IBM Security X-Force Red analyzed the Google Cloud Platform (GCP) and found a potential method an attacker could use to persist in GCP via the Google Cloud Shell. Unpack the findings.
A Journey To The Dawn: Finding & exploiting a use-after-free privilege escalation vulnerability in Linux kernel’s io_uring subsystem (CVE-2022-1786)
https://ift.tt/fCRBd3G
Submitted October 22, 2022 at 04:44AM by 0x414141
via reddit https://ift.tt/KpNm0Qf
https://ift.tt/fCRBd3G
Submitted October 22, 2022 at 04:44AM by 0x414141
via reddit https://ift.tt/KpNm0Qf
kylebot's Blog
[CVE-2022-1786] A Journey To The Dawn
IntroductionBack in April, I found a 0-day vulnerability in the Linux kernel and exploited it on Google’s kCTF platform.I reported the bug to Linux kernel security team and helped them fix the vulnera
OpenSSL: How to Configure Supported TLS Groups to Be Resistant to the DHEat attack
https://ift.tt/wGOEJIU
Submitted October 21, 2022 at 09:55PM by c0r0n3r
via reddit https://ift.tt/Q1FhqdO
https://ift.tt/wGOEJIU
Submitted October 21, 2022 at 09:55PM by c0r0n3r
via reddit https://ift.tt/Q1FhqdO
www.openssl.org
Configuring Supported TLS Groups in OpenSSL - OpenSSL Blog
The configuration of supported groups in TLS servers is important to limit
the resource consumption of the TLS handshakes performed by the server. …
the resource consumption of the TLS handshakes performed by the server. …
SCuBA: M365 Security Baseline Assessment Tool by CISA
https://ift.tt/gUymXxJ
Submitted October 22, 2022 at 08:55AM by sanitybit
via reddit https://ift.tt/Y2EDROo
https://ift.tt/gUymXxJ
Submitted October 22, 2022 at 08:55AM by sanitybit
via reddit https://ift.tt/Y2EDROo
GitHub
GitHub - cisagov/ScubaGear: Automation to assess the state of your M365 tenant against CISA's baselines
Automation to assess the state of your M365 tenant against CISA's baselines - GitHub - cisagov/ScubaGear: Automation to assess the state of your M365 tenant against CISA's baselines
Collect information of internet-connected sandboxes
https://ift.tt/E3XPOHh
Submitted October 22, 2022 at 06:47PM by Snoo_27235
via reddit https://ift.tt/Odu614L
https://ift.tt/E3XPOHh
Submitted October 22, 2022 at 06:47PM by Snoo_27235
via reddit https://ift.tt/Odu614L
GitLab
prisma / SandboxProfiler · GitLab
Collect information of internet-connected sandboxes, no backend needed.
Analysis of thousands of active API tokens leaked via public package repositories
https://ift.tt/8XfvegS
Submitted October 23, 2022 at 01:08AM by SRMish3
via reddit https://ift.tt/27PGShX
https://ift.tt/8XfvegS
Submitted October 23, 2022 at 01:08AM by SRMish3
via reddit https://ift.tt/27PGShX
JFrog
Thousands of publicly exposed API tokens discovered by Xray
JFrog's new Xray Secrets Detection uncovered active access tokens in some of the most common open-source software registries, like Docker and PyPl. Get the findings.