Critical Vulnerability Found in Sovrin, a Popular Decentralized Identity System
https://ift.tt/ksLtEl3
Submitted December 16, 2022 at 11:44AM by jat0369
via reddit https://ift.tt/40yMx3N
https://ift.tt/ksLtEl3
Submitted December 16, 2022 at 11:44AM by jat0369
via reddit https://ift.tt/40yMx3N
Cyberark
Decentralized Identity Attack Surface – Part 2
Introduction This is the second part of our Decentralized Identity (DID) blog series. In case you’re not familiar with DID concepts, we highly encourage you to start with the first part. This time...
Foxit PDF Reader - Use after Free - Remote Code Execution Exploit
https://ift.tt/Y8vnzJR
Submitted December 16, 2022 at 11:42AM by hacksysteam
via reddit https://ift.tt/QtnxiXz
https://ift.tt/Y8vnzJR
Submitted December 16, 2022 at 11:42AM by hacksysteam
via reddit https://ift.tt/QtnxiXz
HackSys Inc
Build: an open source IDE for authoring, testing, and verifying production-ready security tests.
https://ift.tt/p3LWMwf
Submitted December 16, 2022 at 07:45PM by DH_Prelude
via reddit https://ift.tt/WF7Lik1
https://ift.tt/p3LWMwf
Submitted December 16, 2022 at 07:45PM by DH_Prelude
via reddit https://ift.tt/WF7Lik1
GitHub
GitHub - preludeorg/build: Author, test and deploy security tests
Author, test and deploy security tests. Contribute to preludeorg/build development by creating an account on GitHub.
OSCP guide 2022
https://ift.tt/LC9DUwM
Submitted December 17, 2022 at 08:47AM by sgtdede
via reddit https://ift.tt/dXbUaFq
https://ift.tt/LC9DUwM
Submitted December 17, 2022 at 08:47AM by sgtdede
via reddit https://ift.tt/dXbUaFq
sgtdede.gitbook.io
Guide (EN)
OSCP 2022
Exploiting API Framework Flexibility
https://ift.tt/3mLyXzR
Submitted December 17, 2022 at 04:03PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/SDm46ea
https://ift.tt/3mLyXzR
Submitted December 17, 2022 at 04:03PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/SDm46ea
attack ships on fire
Exploiting API Framework Flexibility
TL;DR The modern frameworks are often very flexible with what they accept, and will happily treat a POST with a JSON body as interchangeable with a URL encoded body, or even with query parameters. Due to this, an unexploitable JSON XSS vector can sometimes…
Gepetto - An IDA plugin which queries OpenAI's davinci-003 language model to speed up reverse-engineering
https://ift.tt/gAMNSHK
Submitted December 18, 2022 at 08:08AM by galaris
via reddit https://ift.tt/IpPxGal
https://ift.tt/gAMNSHK
Submitted December 18, 2022 at 08:08AM by galaris
via reddit https://ift.tt/IpPxGal
GitHub
GitHub - JusticeRage/Gepetto: IDA plugin which queries OpenAI's gpt-3.5-turbo language model to speed up reverse-engineering
IDA plugin which queries OpenAI's gpt-3.5-turbo language model to speed up reverse-engineering - GitHub - JusticeRage/Gepetto: IDA plugin which queries OpenAI's gpt-3.5-turbo langua...
Your Car is Trackable by Law TPMS tracking for 30$
https://ift.tt/0G4vqrl
Submitted December 18, 2022 at 10:20AM by Exact-Practice-8658
via reddit https://ift.tt/MBgF1lG
https://ift.tt/0G4vqrl
Submitted December 18, 2022 at 10:20AM by Exact-Practice-8658
via reddit https://ift.tt/MBgF1lG
Medium
Your Car is Trackable by Law
TPMS Tracking
Venom is a library that meant to perform evasive communication using stolen browser socket.
https://ift.tt/ZY5VjJF
Submitted December 18, 2022 at 06:03PM by Idov31
via reddit https://ift.tt/ZBf5aSU
https://ift.tt/ZY5VjJF
Submitted December 18, 2022 at 06:03PM by Idov31
via reddit https://ift.tt/ZBf5aSU
GitHub
GitHub - Idov31/Venom: Venom is a library that meant to perform evasive communication using stolen browser socket
Venom is a library that meant to perform evasive communication using stolen browser socket - Idov31/Venom
Day 3 — Next Level Font Obfuscation
https://ift.tt/8IfRzdB
Submitted December 19, 2022 at 03:52AM by Exact-Practice-8658
via reddit https://ift.tt/D57z2jW
https://ift.tt/8IfRzdB
Submitted December 19, 2022 at 03:52AM by Exact-Practice-8658
via reddit https://ift.tt/D57z2jW
Medium
Day 3 — Next Level Font Obfuscation
Featuring Fontuscator
Port knocking from the scratch
https://ift.tt/UkWnHSo
Submitted December 19, 2022 at 05:37AM by CoolerVoid
via reddit https://ift.tt/D1UG0ha
https://ift.tt/UkWnHSo
Submitted December 19, 2022 at 05:37AM by CoolerVoid
via reddit https://ift.tt/D1UG0ha
antonio-cooler.gitbook.io
Port knocking from the scratch | CoolerVoid tavern
Raw sockets hacking - Date: 18/12/2022
MeshyJSON: A TP-Link tdpServer JSON Stack Overflow
https://ift.tt/UowW4V3
Submitted December 19, 2022 at 06:22PM by ArbitraryWrite
via reddit https://ift.tt/FBiNEjM
https://ift.tt/UowW4V3
Submitted December 19, 2022 at 06:22PM by ArbitraryWrite
via reddit https://ift.tt/FBiNEjM
NCC Group Research
MeshyJSON: A TP-Link tdpServer JSON Stack Overflow
This blog post describes a vulnerability found and exploited in November 2022 by NCC Group. The target was the TP-Link AX1800 WiFi 6 Router (Archer AX21).
Why build an HTTP client into a database? So you can ingest web data directly!
https://ift.tt/zDf58WC
Submitted December 19, 2022 at 09:10PM by stevecio
via reddit https://ift.tt/5CY2PRt
https://ift.tt/zDf58WC
Submitted December 19, 2022 at 09:10PM by stevecio
via reddit https://ift.tt/5CY2PRt
Steampipe
Why build an HTTP client into a database? So you can ingest web data directly! | Steampipe Blog
When there isn't a Steampipe plugin to meet your need, the Net plugin's net_http_request table can save the day.
clif - is a command-line application fuzzer in Rust
https://ift.tt/sPnKZYm
Submitted December 19, 2022 at 10:41PM by andy-codes
via reddit https://ift.tt/cUI8CHJ
https://ift.tt/sPnKZYm
Submitted December 19, 2022 at 10:41PM by andy-codes
via reddit https://ift.tt/cUI8CHJ
andy.codes
Andy's Terminal - clif: simple command-line application fuzze
EDR evasion with hardware breakpoints
https://ift.tt/OufPCEv
Submitted December 20, 2022 at 02:39AM by Fun_Preference1113
via reddit https://ift.tt/PazyvXh
https://ift.tt/OufPCEv
Submitted December 20, 2022 at 02:39AM by Fun_Preference1113
via reddit https://ift.tt/PazyvXh
Cymulate
EDR Evasion with Hardware Breakpoints: The Blindside Technique
Cymulate researchers have discovered a new vulnerability and created a proof of concept. The technique based on it allows attackers to circumvent many EDR vendors.
Beware of this CI/CD vulnerability: GitHub Environment Injection (Google & Apache found vulnerable)
https://ift.tt/Va83JSG
Submitted December 20, 2022 at 03:52AM by roy_6472
via reddit https://ift.tt/IW1rJzo
https://ift.tt/Va83JSG
Submitted December 20, 2022 at 03:52AM by roy_6472
via reddit https://ift.tt/IW1rJzo
Legitsecurity
Google & Apache Found Vulnerable to GitHub Environment Injection
Learn how Legit Security discovered a vulnerable GitHub actions workflow that affected Google, Apache and potentially many more. Get details on the vulnerability and what you can do to mitigate it.
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg
https://ift.tt/IqrKgzL
Submitted December 20, 2022 at 04:11AM by Void_Sec
via reddit https://ift.tt/LtjqCTz
https://ift.tt/IqrKgzL
Submitted December 20, 2022 at 04:11AM by Void_Sec
via reddit https://ift.tt/LtjqCTz
Exodus Intelligence
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg - Exodus Intelligence
By Sergi Martinez Overview It’s been a while since our last technical blogpost, so here’s one right on time for the Christmas holidays. We describe a method to exploit a use-after-free in the Linux kernel when objects are allocated in a specific slab cache…
Intro to Embedded RE: UART Discovery and Firmware Extraction via UBoot
https://ift.tt/6pjZFxH
Submitted December 20, 2022 at 08:28AM by wrongbaud
via reddit https://ift.tt/tScD0Zd
https://ift.tt/6pjZFxH
Submitted December 20, 2022 at 08:28AM by wrongbaud
via reddit https://ift.tt/tScD0Zd
Voidstar Security Research Blog
Intro to Embedded RE: UART Discovery and Firmware Extraction via UBoot
Extracting firmware via UART and UBoot
Writeup about an authentication bypass and privilege escalation in the Passwordstate password manager
https://ift.tt/7fPEZsM
Submitted December 20, 2022 at 01:17PM by parzel
via reddit https://ift.tt/OG3BWVU
https://ift.tt/7fPEZsM
Submitted December 20, 2022 at 01:17PM by parzel
via reddit https://ift.tt/OG3BWVU
Modzero
Better Make Sure Your Password Manager Is Secure | mod%log
We examined the password management solution Passwordstate of Click Studios and identified multiple high severity vulnerabilities (CVE-2022-3875, CVE-2022-3876, CVE-2022-3877).
OSV-Scanner: A vulnerability scanner written in Go which uses the data provided by OSV.dev
https://ift.tt/ly82KCe
Submitted December 20, 2022 at 02:21PM by Titokhan
via reddit https://ift.tt/l8HBtYU
https://ift.tt/ly82KCe
Submitted December 20, 2022 at 02:21PM by Titokhan
via reddit https://ift.tt/l8HBtYU
GitHub
GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Vulnerability scanner written in Go which uses the data provided by https://osv.dev - GitHub - google/osv-scanner: Vulnerability scanner written in Go which uses the data provided by https://osv.dev
Bypass iOS backup's TCC protection
https://ift.tt/Fn31eqd
Submitted December 20, 2022 at 11:28PM by surrealisticpillow12
via reddit https://ift.tt/bP5iuhU
https://ift.tt/Fn31eqd
Submitted December 20, 2022 at 11:28PM by surrealisticpillow12
via reddit https://ift.tt/bP5iuhU
theevilbit.github.io
CVE-2022-32929 - Bypass iOS backup's TCC protection
Intro Normally, when a users backup their iOS device, the backup is saved into ~/Library/Application Support/MobileSync/Backup directory. The MobileSync directory is properly protected by TCC, as the backup can contain photos, contact information, everything…
Using Leaking Sentinel Value to Bypass the Latest Chrome v8 HardenProtect
https://ift.tt/c7vTymG
Submitted December 20, 2022 at 11:24PM by surrealisticpillow12
via reddit https://ift.tt/JsM0GKv
https://ift.tt/c7vTymG
Submitted December 20, 2022 at 11:24PM by surrealisticpillow12
via reddit https://ift.tt/JsM0GKv
Medium
Using Leaking Sentinel Value to Bypass the Latest Chrome v8 HardenProtect
A technical analysis where we use sentinel value to bypass the Latest Chrome v8 HardenProtect