USENIX Security '22 Technical Sessions Talk Recordings
https://ift.tt/ADQYrJq
Submitted November 12, 2022 at 02:42PM by sanitybit
via reddit https://ift.tt/5omClti
https://ift.tt/ADQYrJq
Submitted November 12, 2022 at 02:42PM by sanitybit
via reddit https://ift.tt/5omClti
USENIX
USENIX Security '22 Technical Sessions
USENIX Security brings together researchers, practitioners, system administrators, system programmers, and others to share and explore the latest advances in the security and privacy of computer systems and networks.
Reverse engineering an EV charger
https://ift.tt/HyIfYEo
Submitted November 12, 2022 at 09:42PM by FrankTr3nd
via reddit https://ift.tt/vCEmnYW
https://ift.tt/HyIfYEo
Submitted November 12, 2022 at 09:42PM by FrankTr3nd
via reddit https://ift.tt/vCEmnYW
Mnemonic
Reverse engineering an EV charger
We decided to look into one of the most prevalent chargers on Norwegian roads
Introducing Shufflecake: plausible deniability for multiple hidden filesystems on Linux
https://ift.tt/vixokAX
Submitted November 13, 2022 at 04:36AM by 0xdea
via reddit https://ift.tt/XlCDjAw
https://ift.tt/vixokAX
Submitted November 13, 2022 at 04:36AM by 0xdea
via reddit https://ift.tt/XlCDjAw
Kudelski Security Research
Introducing Shufflecake: plausible deniability for multiple hidden filesystems on Linux
Today we are excited to release Shufflecake, a tool aimed at helping people whose freedom of expression is threatened by repressive authorities or dangerous criminal organizations, in particular: w…
Tunneling Internet through WhatsApp to avoid network restrictions
https://ift.tt/6mStIco
Submitted November 12, 2022 at 07:11AM by aleixrodriala
via reddit https://ift.tt/S5lbqcF
https://ift.tt/6mStIco
Submitted November 12, 2022 at 07:11AM by aleixrodriala
via reddit https://ift.tt/S5lbqcF
GitHub
GitHub - aleixrodriala/wa-tunnel: Tunneling Internet traffic over Whatsapp
Tunneling Internet traffic over Whatsapp. Contribute to aleixrodriala/wa-tunnel development by creating an account on GitHub.
The exploit recon 'msg_msg' and its mitigation in VED
https://ift.tt/9j7ifVt
Submitted November 13, 2022 at 04:32PM by hardenedvault
via reddit https://ift.tt/MFapBKu
https://ift.tt/9j7ifVt
Submitted November 13, 2022 at 04:32PM by hardenedvault
via reddit https://ift.tt/MFapBKu
hardenedvault.net
The exploit recon 'msg_msg' and its mitigation in VED
Why msg_msg? The size of structure is control by userspace Firstly, the length of the msg_msg struct can be indirectly controlled from userspace, which means that msg can overlap the cache of the specified types.
Phishing with Google Calendar and Evilginx2 to Deliver a Malicious Zoom Link
https://ift.tt/vgYUQj9
Submitted November 13, 2022 at 07:59PM by Dr_Mantis_Tobbogon
via reddit https://ift.tt/hkwiWzO
https://ift.tt/vgYUQj9
Submitted November 13, 2022 at 07:59PM by Dr_Mantis_Tobbogon
via reddit https://ift.tt/hkwiWzO
Starlink User Terminal Modchip
https://ift.tt/K8ce7hj
Submitted November 14, 2022 at 08:45AM by Gallus
via reddit https://ift.tt/IxGuqtJ
https://ift.tt/K8ce7hj
Submitted November 14, 2022 at 08:45AM by Gallus
via reddit https://ift.tt/IxGuqtJ
GitHub
GitHub - KULeuven-COSIC/Starlink-FI
Contribute to KULeuven-COSIC/Starlink-FI development by creating an account on GitHub.
Threat and Vulnerability Hunting with Application Server Error Logs
https://ift.tt/uPO57DT
Submitted November 14, 2022 at 02:42PM by SnooDucks7926
via reddit https://ift.tt/35MCbuE
https://ift.tt/uPO57DT
Submitted November 14, 2022 at 02:42PM by SnooDucks7926
via reddit https://ift.tt/35MCbuE
Wix Engineering
Threat and Vulnerability Hunting with Application Server Error Logs
Introduction When doing application security at scale, you have to make peace with the fact that some issues may as well find their way into production. While we work hard to make sure this almost never happens, we understand that it’s just a fact of life…
A Technical Analysis of Royal Ransomware [PDF]
https://ift.tt/37DTGs8
Submitted November 14, 2022 at 08:34PM by CyberMasterV
via reddit https://ift.tt/GnVET7m
https://ift.tt/37DTGs8
Submitted November 14, 2022 at 08:34PM by CyberMasterV
via reddit https://ift.tt/GnVET7m
Security Scorecard
A Technical Analysis Of The Royal Ransomware
This malware encrypts files with the AES algorithm, either fully or partially. The extension of the affected files changes to “.royal”. Find out more in this technical analysis of the Royal Ransomware from SecurityScorecard’s Senior Malware Analyst, Vlad…
WonderCMS 3.1.3 Vulnerable to Authenticated Server-Side Request Forgery – CVE-2020-35313
https://ift.tt/hKxUEF0
Submitted November 15, 2022 at 12:14PM by SL7reach
via reddit https://ift.tt/zYKlSW7
https://ift.tt/hKxUEF0
Submitted November 15, 2022 at 12:14PM by SL7reach
via reddit https://ift.tt/zYKlSW7
Penetration Testing and CyberSecurity Solution - SecureLayer7
WonderCMS 3.1.3 Vulnerable to Authenticated Server-Side Request Forgery – CVE-2020-35313
Introduction: Robert wants to develop a basic content management system (CMS) because he became sick of all the bloated systems that had too many features and needed initial configurations. In...
DivestOS CVE Patcher - A tool for downloading, checking, and applying (CVE) patches to a (kernel) repository
https://ift.tt/3lOZ5ke
Submitted November 15, 2022 at 12:57PM by Gallus
via reddit https://ift.tt/Xwej8f6
https://ift.tt/3lOZ5ke
Submitted November 15, 2022 at 12:57PM by Gallus
via reddit https://ift.tt/Xwej8f6
GitLab
DivestOS Mobile / CVE Checker · GitLab
A tool for downloading, checking, and applying (CVE) patches to a repository.
Intro to AJP, AJPFuzzer and re-discovering Ghostcat
https://ift.tt/TlcWipU
Submitted November 15, 2022 at 04:18PM by nibblesec
via reddit https://ift.tt/9f1SA3Y
https://ift.tt/TlcWipU
Submitted November 15, 2022 at 04:18PM by nibblesec
via reddit https://ift.tt/9f1SA3Y
Doyensec
Let's speak AJP · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.
Hacking Salesforce-backed WebApps
https://ift.tt/OYLN3p5
Submitted November 15, 2022 at 04:59PM by albinowax
via reddit https://ift.tt/vLkem1o
https://ift.tt/OYLN3p5
Submitted November 15, 2022 at 04:59PM by albinowax
via reddit https://ift.tt/vLkem1o
www.hypn.za.net
Hacking Salesforce-backed WebApps - Hypn.za.net
A look at hacking insecure webapps that interact with Salesforce's API, and SQL-Injection like attacks in SoQL
ABI compatibility in Python: how hard could it be?
https://ift.tt/CQFXYT4
Submitted November 15, 2022 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/EBJVqgK
https://ift.tt/CQFXYT4
Submitted November 15, 2022 at 07:26PM by yossarian_flew_away
via reddit https://ift.tt/EBJVqgK
The Trail of Bits Blog
ABI compatibility in Python: How hard could it be?
TL;DR: Trail of Bits has developed abi3audit, a new Python tool for checking Python packages for CPython application binary interface (ABI) violations. We’ve used it to discover hundreds of inconsistently and incorrectly tagged package distributions, each…
Stealing passwords from infosec Mastodon - without bypassing CSP
https://ift.tt/hRDE0m7
Submitted November 15, 2022 at 08:17PM by albinowax
via reddit https://ift.tt/voIhqLH
https://ift.tt/hRDE0m7
Submitted November 15, 2022 at 08:17PM by albinowax
via reddit https://ift.tt/voIhqLH
PortSwigger Research
Stealing passwords from infosec Mastodon - without bypassing CSP
The story of how I could steal credentials on Infosec Mastodon with a HTML injection vulnerability, without needing to bypass CSP. Everybody on our Twitter feed seemed to be jumping ship to the infose
GuardDog: Identifying malicious PyPI packages using static code analysis and package metadata analysis
https://ift.tt/Q03Lm4y
Submitted November 15, 2022 at 09:39PM by thorn42
via reddit https://ift.tt/NAUMGXt
https://ift.tt/Q03Lm4y
Submitted November 15, 2022 at 09:39PM by thorn42
via reddit https://ift.tt/NAUMGXt
Datadoghq
Finding malicious PyPI packages through static code analysis: Meet GuardDog
GuardDog is an open-source tool to identify malicious PyPI packages through source code and metadata analysis
Checkmk: Remote Code Execution by Chaining Multiple Bugs (3/3)
https://ift.tt/clpmazJ
Submitted November 15, 2022 at 09:53PM by monoimpact
via reddit https://ift.tt/X152PJM
https://ift.tt/clpmazJ
Submitted November 15, 2022 at 09:53PM by monoimpact
via reddit https://ift.tt/X152PJM
Pixel 6 Bootloader: Exploitation (part 3)
https://ift.tt/nMPO92S
Submitted November 15, 2022 at 11:31PM by jeandrew
via reddit https://ift.tt/h4B5ipe
https://ift.tt/nMPO92S
Submitted November 15, 2022 at 11:31PM by jeandrew
via reddit https://ift.tt/h4B5ipe
Overview of SQLi and Access Flaws in Zendesk
https://ift.tt/dZ6LtTG
Submitted November 15, 2022 at 11:27PM by TotallyNotTeaPot
via reddit https://ift.tt/eFLduab
https://ift.tt/dZ6LtTG
Submitted November 15, 2022 at 11:27PM by TotallyNotTeaPot
via reddit https://ift.tt/eFLduab
Varonis
Varonis Threat Labs Discovers SQLi and Access Flaws in Zendesk
Varonis Threat Labs found a SQL injection vulnerability and a logical access flaw in Zendesk Explore, the reporting and analytics service in the popular customer service solution, Zendesk.
Hyperpom: An Apple Silicon Fuzzer for 64-bit ARM Binaries
https://ift.tt/8rF5hgE
Submitted November 15, 2022 at 11:14PM by jeandrew
via reddit https://ift.tt/mq9NwKy
https://ift.tt/8rF5hgE
Submitted November 15, 2022 at 11:14PM by jeandrew
via reddit https://ift.tt/mq9NwKy
Impalabs
Hyperpom: An Apple Silicon Fuzzer for 64-bit ARM Binaries
Impalabs is releasing Hyperpom, a 64-bit ARM binary fuzzer written in Rust and based on the Apple Silicon's hypervisor. It is mutation-based and coverage-guided. This article gives an overview of its internals, presents the different components it consists…
Distributed Identity aka Identity on the Blockchain - What it is and its vulnerable attack surfaces. (Part 1)
https://ift.tt/4vGArsP
Submitted November 16, 2022 at 12:47AM by CyberArkLabs
via reddit https://ift.tt/rKoIRBy
https://ift.tt/4vGArsP
Submitted November 16, 2022 at 12:47AM by CyberArkLabs
via reddit https://ift.tt/rKoIRBy
Cyberark
Decentralized Identity Attack Surface – Part 1
Introduction Who are you? That’s a hard question to answer. Many philosophers have been fascinated with this question for years. Who are you in cyberspace? Your digital identity is comprised of...