A Journey Into Hacking Google Search Appliance | DEVCORE
https://ift.tt/lqunFmI
Submitted July 07, 2023 at 10:14PM by poltess0
via reddit https://ift.tt/Mf76t8Y
https://ift.tt/lqunFmI
Submitted July 07, 2023 at 10:14PM by poltess0
via reddit https://ift.tt/Mf76t8Y
DEVCORE 戴夫寇爾
[REL] A Journey Into Hacking Google Search Appliance | DEVCORE 戴夫寇爾
The Google Search Appliance (hereinafter referred to as GSA) is an enterprise search device launched by Google in 2002, used for indexing and retrieving internal or public network information
Pentest Mapper Burp Suite extension 1.7 is released.
https://ift.tt/xjlsmMC
Submitted July 08, 2023 at 08:09PM by Ano_F
via reddit https://ift.tt/KJhjEFp
https://ift.tt/xjlsmMC
Submitted July 08, 2023 at 08:09PM by Ano_F
via reddit https://ift.tt/KJhjEFp
GitHub
GitHub - Anof-cyber/Pentest-Mapper: A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows…
A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabilities - GitHub - Anof-cyber/Pentest-Mapper: A Burp Suite Exten...
EasyScan: A Lightweight Web Vulnerability Scanner to Secure Your Website
https://ift.tt/u9cnlx3
Submitted July 09, 2023 at 02:56AM by lazykid07
via reddit https://ift.tt/ZbMfgUj
https://ift.tt/u9cnlx3
Submitted July 09, 2023 at 02:56AM by lazykid07
via reddit https://ift.tt/ZbMfgUj
GitHub
GitHub - introvertmac/EasyScan: Light-weight web security scanner
Light-weight web security scanner. Contribute to introvertmac/EasyScan development by creating an account on GitHub.
Evilgophish Evilginx 3.0.0 Update
https://ift.tt/Mt6IAcl
Submitted July 09, 2023 at 09:24AM by edreatingmonkey
via reddit https://ift.tt/AoKCrNw
https://ift.tt/Mt6IAcl
Submitted July 09, 2023 at 09:24AM by edreatingmonkey
via reddit https://ift.tt/AoKCrNw
GitHub
evilginx3 update · fin3ss3g0d/evilgophish@9d5af2f
evilginx3 + gophish. Contribute to fin3ss3g0d/evilgophish development by creating an account on GitHub.
EdgeRouters's & AirCube's vulnerability allows LAN attackers to cause the service to overflow an internal heap and potentially execute arbitrary code
https://ift.tt/QeJkgZ4
Submitted July 09, 2023 at 01:50PM by SSDisclosure
via reddit https://ift.tt/rEBFXWH
https://ift.tt/QeJkgZ4
Submitted July 09, 2023 at 01:50PM by SSDisclosure
via reddit https://ift.tt/rEBFXWH
SSD Secure Disclosure
SSD Advisory - EdgeRouters and AirCube miniupnpd Heap Overflow - SSD Secure Disclosure
Summary A vulnerability in EdgeRouters’s and AirCube’s miniupnpd allows LAN attackers to cause the service to overflow an internal heap and potentially execute arbitrary code. Credit An independent security researcher working with SSD Secure Disclosure. CVE…
+Protecting Linux at Kernel Level Why and How
https://ift.tt/8zoVN4F
Submitted July 10, 2023 at 09:03AM by hardenedvault
via reddit https://ift.tt/FSavVDu
https://ift.tt/8zoVN4F
Submitted July 10, 2023 at 09:03AM by hardenedvault
via reddit https://ift.tt/FSavVDu
hardenedvault.net
+PROTECTING LINUX AT KERNEL LEVEL WHY AND HOW
Introduction We designed Vault Exploits Defense (VED) as a foundation security layer for various flavors of Linux operating system.
CloudPrivs - Brute force tool to determine AWS permissions from credentials
https://ift.tt/KjFHlLY
Submitted July 10, 2023 at 10:37AM by ROFLicious
via reddit https://ift.tt/v3Sa1BK
https://ift.tt/KjFHlLY
Submitted July 10, 2023 at 10:37AM by ROFLicious
via reddit https://ift.tt/v3Sa1BK
GitHub
GitHub - AbstractClass/CloudPrivs: Determine privileges from cloud credentials via brute-force testing.
Determine privileges from cloud credentials via brute-force testing. - AbstractClass/CloudPrivs
Delegate call bug in the ink! programming language
https://ift.tt/vioHd34
Submitted July 10, 2023 at 04:48PM by kruksym
via reddit https://ift.tt/GFigDQl
https://ift.tt/vioHd34
Submitted July 10, 2023 at 04:48PM by kruksym
via reddit https://ift.tt/GFigDQl
CoinFabrik
Delegate call bug in ink!
ink! is a programming language for smart contracts. It can be used in parachains built on Substrate. There was a bug in the CallBuilder::delegate() method and ink_env::invoke_contract_delegate() function which returns unexpected values.
AWS CodeBuild + S3 == Privilege Escalation - Shielder
https://ift.tt/W3RkbvP
Submitted July 10, 2023 at 05:41PM by smaury
via reddit https://ift.tt/2MNQXaO
https://ift.tt/W3RkbvP
Submitted July 10, 2023 at 05:41PM by smaury
via reddit https://ift.tt/2MNQXaO
Shielder
Shielder - AWS CodeBuild + S3 == Privilege Escalation
How to escalate your privileges in AWS by abusing CodeBuild and S3 permissions.
2048 Bit RSA and the Year 2030
https://ift.tt/38y9I1E
Submitted July 11, 2023 at 01:30AM by upofadown
via reddit https://ift.tt/oSXBThp
https://ift.tt/38y9I1E
Submitted July 11, 2023 at 01:30AM by upofadown
via reddit https://ift.tt/oSXBThp
Encrypted Doesn't Mean Authenticated: ShareFile RCE (CVE-2023-24489)
https://ift.tt/lp1w0Wv
Submitted July 11, 2023 at 07:11AM by Mempodipper
via reddit https://ift.tt/a4tSODB
https://ift.tt/lp1w0Wv
Submitted July 11, 2023 at 07:11AM by Mempodipper
via reddit https://ift.tt/a4tSODB
Exploring the fundamentals of RISC-V: Assembly and Shellcode Series - Part 1
https://ift.tt/vXRLVB1
Submitted July 11, 2023 at 01:49PM by 0xd3xt3r
via reddit https://ift.tt/4q7NTBv
https://ift.tt/vXRLVB1
Submitted July 11, 2023 at 01:49PM by 0xd3xt3r
via reddit https://ift.tt/4q7NTBv
Tainted Bits
Exploring the fundamentals of RISC-V: Assembly and Shellcode Series - Part 1
In the ever-evolving landscape of computer architecture, RISC-V has emerged as a promising and disruptive force. With its open-source nature and elegant design philosophy, RISC-V has garnered signific
Critical Foswiki Vulnerabilities: A Logic Error turned Remote Code Execution. Feel free to dive deeper into this topic and join us on the journey to more security.
https://ift.tt/C58G2jk
Submitted July 11, 2023 at 03:32PM by usdAG
via reddit https://ift.tt/DnCLpS7
https://ift.tt/C58G2jk
Submitted July 11, 2023 at 03:32PM by usdAG
via reddit https://ift.tt/DnCLpS7
Scarleteel operation ups their cloud game with new targets and tools
https://ift.tt/PsfUNLo
Submitted July 11, 2023 at 06:34PM by weseven
via reddit https://ift.tt/EJRnQUl
https://ift.tt/PsfUNLo
Submitted July 11, 2023 at 06:34PM by weseven
via reddit https://ift.tt/EJRnQUl
Sysdig
SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto | Sysdig
SCARLETEEL, an operation reported on by the Sysdig Threat Research Team last February, continues to thrive, improve tactics, and steal proprietary data.
Exploiting XSS in hidden inputs and meta tags using popovertarget
https://ift.tt/ptAyvmC
Submitted July 11, 2023 at 07:45PM by albinowax
via reddit https://ift.tt/cDLU0jd
https://ift.tt/ptAyvmC
Submitted July 11, 2023 at 07:45PM by albinowax
via reddit https://ift.tt/cDLU0jd
PortSwigger Research
Exploiting XSS in hidden inputs and meta tags
In this post we are going to show how you can (ab)use the new HTML popup functionality in Chrome to exploit XSS in meta tags and hidden inputs. It all started when I noticed the new popover behaviour
Weaknesses and Vulnerabilities explained - Everything you need to know in simple words.
https://ift.tt/cxSb0p8
Submitted July 12, 2023 at 12:55AM by D4b0zz
via reddit https://ift.tt/aRFocSg
https://ift.tt/cxSb0p8
Submitted July 12, 2023 at 12:55AM by D4b0zz
via reddit https://ift.tt/aRFocSg
Medium
Weaknesses and Vulnerabilities explained - Everything you need to know in simple words.
Everything you need or want to know around weaknesses and vulnerabilities in simple words for anyone and everyone!
/r/netsec's Q3 2023 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 12, 2023 at 03:10AM by netsec_burn
via reddit https://ift.tt/K1aZsxD
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 12, 2023 at 03:10AM by netsec_burn
via reddit https://ift.tt/K1aZsxD
Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803
https://ift.tt/EmdHXZN
Submitted July 12, 2023 at 05:32AM by Acceptable-Doubt-878
via reddit https://ift.tt/uyTURjE
https://ift.tt/EmdHXZN
Submitted July 12, 2023 at 05:32AM by Acceptable-Doubt-878
via reddit https://ift.tt/uyTURjE
Aura Research Division
Bee-yond Capacity: Unauthenticated RCE in Extreme Networks/Aerohive Wireless APs - CVE-2023-35803
CVE-2023-35803 - An adventure in finding and exploiting a buffer overflow in Extreme Networks/Aerohive Wireless Access Points
CVE-2023-36884 MS Office Zero-Day Vulnerability Exploited For Espionage - Detection and Mitigation
https://ift.tt/kDKaMBh
Submitted July 12, 2023 at 09:07AM by achilles4828
via reddit https://ift.tt/MSEtrmw
https://ift.tt/kDKaMBh
Submitted July 12, 2023 at 09:07AM by achilles4828
via reddit https://ift.tt/MSEtrmw
FourCore
CVE-2023-36884 MS Office Zero-Day Vulnerability Exploited For Espionage - Detection and Mitigation
Microsoft has warned of six unpatched zero-day vulnerabilities including CVE-2023-36884 being exploited by attackers for financial and espionage motives. No patches are available for CVE-2023-36884, find the mitigations and detections to prevent CVE-2023…
Mailgun: Public Security Disclosure
https://ift.tt/Way7tLK
Submitted July 12, 2023 at 02:51PM by Aggressive-Art5250
via reddit https://ift.tt/JxhlnPW
https://ift.tt/Way7tLK
Submitted July 12, 2023 at 02:51PM by Aggressive-Art5250
via reddit https://ift.tt/JxhlnPW
Reddit
From the sysadmin community on Reddit
Explore this post and more from the sysadmin community
Bringing our HTTP Fuzzer Monsoon to the Next Level
https://ift.tt/OHt0gIS
Submitted July 12, 2023 at 07:50PM by RedTeamPentesting
via reddit https://ift.tt/vgszwSX
https://ift.tt/OHt0gIS
Submitted July 12, 2023 at 07:50PM by RedTeamPentesting
via reddit https://ift.tt/vgszwSX
RedTeam Pentesting - Blog
Bringing Monsoon to the Next Level
We’ve just a released a major update for our HTTP fuzzer monsoon with many new features and improvements. In this blog post we will cover these changes in detail. If you haven’t heard about monsoon, you should start with our announcement blog post …