Agile Approach to Mass Cloud Credential Harvesting and Crypto Mining Sprints Ahead
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
https://ift.tt/Dj2Gnrm
Submitted July 13, 2023 at 11:09PM by permis0
via reddit https://ift.tt/qwJsGjZ
permiso.io
Agile Approach to mass cloud credential harvesting and crypto mining sprints ahead
Permiso p0 Labs and SentinelLabs team up to tackle the latest mass cloud credential harvesting and crypto mining campaign "SilentBob".
We compared modern free or open source SAST tools, and this is what we found
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
https://ift.tt/jgTW35k
Submitted July 13, 2023 at 11:02PM by rukhrunnin
via reddit https://ift.tt/eMkNLcK
Bearer
Bearer | We benchmarked top SAST products, and this is what we learned
We benchmarked top SAST products to see how Bearer CLI stands up. Here are the results!
Brute-forcing a macOS user’s real name from a browser using mDNS
https://ift.tt/Eb6oUVj
Submitted July 14, 2023 at 12:55AM by DrinkMoreCodeMore
via reddit https://ift.tt/RiOzJHM
https://ift.tt/Eb6oUVj
Submitted July 14, 2023 at 12:55AM by DrinkMoreCodeMore
via reddit https://ift.tt/RiOzJHM
Fingerprint
Demo: Brute-forcing a macOS user’s real name from a browser using mDNS
Exploring potential privacy vulnerabilities in Apple devices. This article discusses revealing a user's first name without permissions using the mDNS protocol.
Penetrating the Apple: A Deep Dive into macOS Pentesting
https://ift.tt/B91Iv8Y
Submitted July 14, 2023 at 03:12AM by jat0369
via reddit https://ift.tt/5W1psby
https://ift.tt/B91Iv8Y
Submitted July 14, 2023 at 03:12AM by jat0369
via reddit https://ift.tt/5W1psby
Cyberark
A Deep Dive into Penetration Testing of macOS Applications (Part 1)
Introduction As many of us know, there are a lot of guides and information on penetration testing applications on Windows and Linux. Unfortunately, a step-by-step guide doesn’t exist in the macOS...
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
https://ift.tt/UeLwFcj
Submitted July 14, 2023 at 12:35PM by 0xdea
via reddit https://ift.tt/S5PexGk
https://ift.tt/UeLwFcj
Submitted July 14, 2023 at 12:35PM by 0xdea
via reddit https://ift.tt/S5PexGk
Cisco Talos Blog
Uncovering weaknesses in Apple macOS and VMWare vCenter: 12 vulnerabilities in RPC implementation
Uncovered issues fall into use-after-free, buffer-overflow, information leak and denial of service vulnerability classes. Some of these could be combined to achieve remote code execution or privilege escalation.
Unveiling the Secrets: LSASS Memory Dump Parsing
https://ift.tt/pdDvPiI
Submitted July 14, 2023 at 04:08PM by Crountsec
via reddit https://ift.tt/1kjCNil
https://ift.tt/pdDvPiI
Submitted July 14, 2023 at 04:08PM by Crountsec
via reddit https://ift.tt/1kjCNil
Cyvisory Group
Unveiling the Secrets: LSASS Memory Dump Parsing
Unlock LSASS memory dump secrets with a powerful PowerShell tool. Extract credentials and delve into hacker techniques.
Introducing jswzl: In-depth JavaScript analysis for web security testers
https://ift.tt/VqUil9o
Submitted July 14, 2023 at 05:50PM by DebugDucky
via reddit https://ift.tt/rlUnkpI
https://ift.tt/VqUil9o
Submitted July 14, 2023 at 05:50PM by DebugDucky
via reddit https://ift.tt/rlUnkpI
www.jswzl.io
Introducing jswzl: In-depth JavaScript analysis for web security testers · jswzl
For the last year, I’ve been working hard on creating what I believe to be the next stage in the evolution of tooling for penetration testers, web application security testers, security analysts, and security engineers—in short, anyone who spends time testing…
Update: We released version 1.3.0 of the CSTC a few weeks ago. After the review by Portswigger the update is now also available in the BAppStore.
https://ift.tt/sgaSULJ
Submitted July 14, 2023 at 05:49PM by usdAG
via reddit https://ift.tt/O2cC7Ps
https://ift.tt/sgaSULJ
Submitted July 14, 2023 at 05:49PM by usdAG
via reddit https://ift.tt/O2cC7Ps
portswigger.net
CSTC, Modular HTTP Manipulator
Allows request/response modification using a GUI analogous to CyberChef
Pass The Salt 2023 Wrap-Up - /dev/random
https://ift.tt/yZ9vO6Q
Submitted July 14, 2023 at 09:01PM by mikevvei
via reddit https://ift.tt/34IPJ9S
https://ift.tt/yZ9vO6Q
Submitted July 14, 2023 at 09:01PM by mikevvei
via reddit https://ift.tt/34IPJ9S
/dev/random
Pass The Salt 2023 Wrap-Up - /dev/random
I’m back from Lille, France, where I attended the sixth edition of the conference called “Pass The Salt“. This event focuses on security but around free software. Vendors are not welcome to promote their solutions! Christophe from the crew introduced the…
IAMActionHunter: Identify complex IAM PrivEsc in AWS
https://ift.tt/WSD7Vow
Submitted July 14, 2023 at 09:50PM by rhino_security_labs_
via reddit https://ift.tt/rTBC6cl
https://ift.tt/WSD7Vow
Submitted July 14, 2023 at 09:50PM by rhino_security_labs_
via reddit https://ift.tt/rTBC6cl
Rhino Security Labs
IAMActionHunter: Query AWS IAM permission policies with ease | Rhino Security Labs
SonicWall GMS Critical Vulnerabilities Announced | Patches Released
https://ift.tt/l3PJYZn
Submitted July 15, 2023 at 01:57AM by Netsurion
via reddit https://ift.tt/73GeiOX
https://ift.tt/l3PJYZn
Submitted July 15, 2023 at 01:57AM by Netsurion
via reddit https://ift.tt/73GeiOX
Netsurion
Security Advisory: SonicWall Vulnerabilities | Netsurion
SonicWall has recently disclosed several vulnerabilities in their Global Management System (GMS) and Analytics products. Learn impact, mitigation, and risks.
GitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows System
https://ift.tt/FCNWS3t
Submitted July 15, 2023 at 08:46PM by achilles4828
via reddit https://ift.tt/fne974p
https://ift.tt/FCNWS3t
Submitted July 15, 2023 at 08:46PM by achilles4828
via reddit https://ift.tt/fne974p
GitHub
GitHub - FourCoreLabs/LolDriverScan: Scan vulnerable drivers on Windows with loldrivers.io
Scan vulnerable drivers on Windows with loldrivers.io - FourCoreLabs/LolDriverScan
Satellites lack standard security mechanisms found in mobile phones and laptops - Help Net Security
https://ift.tt/bJrXWVG
Submitted July 16, 2023 at 10:34AM by i-_-am-_-batman
via reddit https://ift.tt/mNqU6eD
https://ift.tt/bJrXWVG
Submitted July 16, 2023 at 10:34AM by i-_-am-_-batman
via reddit https://ift.tt/mNqU6eD
Help Net Security
Satellites lack standard security mechanisms found in mobile phones and laptops
Researchers assessed satellite security mechanisms from an IT perspective and found a lack of modern security implementation.
GitHub - ZephrFish/PotFileUtils
https://ift.tt/0Nwto8v
Submitted July 16, 2023 at 05:38PM by ZephrX112
via reddit https://ift.tt/2RiwAnN
https://ift.tt/0Nwto8v
Submitted July 16, 2023 at 05:38PM by ZephrX112
via reddit https://ift.tt/2RiwAnN
GitHub
GitHub - ZephrFish/PotUtils
Contribute to ZephrFish/PotUtils development by creating an account on GitHub.
Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux
https://ift.tt/3EZ8tGL
Submitted July 16, 2023 at 06:55PM by hardenedvault
via reddit https://ift.tt/1dASBvD
https://ift.tt/3EZ8tGL
Submitted July 16, 2023 at 06:55PM by hardenedvault
via reddit https://ift.tt/1dASBvD
hardenedvault.net
Vault Range - The Measure and Resilience of Weaponized Exploit Methods for Linux
Disclaimer VED (Vault Exploit Defense) test image contains only the VED kernel module, and does not contain any security baselines, access control policies and situational hardening solution.
PSC Automation: Using Python to Interact With PortShellCrypter.
https://ift.tt/4ZOUhRt
Submitted July 16, 2023 at 08:20PM by fullspectrumdev
via reddit https://ift.tt/6OTH4dk
https://ift.tt/4ZOUhRt
Submitted July 16, 2023 at 08:20PM by fullspectrumdev
via reddit https://ift.tt/6OTH4dk
Full Spectrum Things
PSC Automation: Using Python to Interact With PortShellCrypter.
PortShellCrypter offers up a noscripting socket, and a simple utility (pscsh) that allows executing shell noscripts on the remote end.
pscsh basically enables you to write a shell noscript, and have it be executed remotely, by sending it line by line to the remote…
pscsh basically enables you to write a shell noscript, and have it be executed remotely, by sending it line by line to the remote…
Beyond the Marketing: Assessing Anti-Bot Platforms through a Hacker's Lens
https://ift.tt/xhf6dHB
Submitted July 16, 2023 at 08:11PM by R380073D
via reddit https://ift.tt/yhNLkBf
https://ift.tt/xhf6dHB
Submitted July 16, 2023 at 08:11PM by R380073D
via reddit https://ift.tt/yhNLkBf
How We Found Another GitHub Actions Environment Injection Vulnerability in a Google Project
https://ift.tt/Jx9ZDwE
Submitted July 17, 2023 at 01:45AM by roy_6472
via reddit https://ift.tt/20gPXdy
https://ift.tt/Jx9ZDwE
Submitted July 17, 2023 at 01:45AM by roy_6472
via reddit https://ift.tt/20gPXdy
Legitsecurity
How We Found Another GitHub Actions Environment Injection Vulnerability in a Google Project
Legit Security | This blog shows another case of GitHub Actions environment injection vulnerability in a Google repository.
Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer
https://ift.tt/kNuKhcM
Submitted July 17, 2023 at 04:21PM by Malwarebeasts
via reddit https://ift.tt/knHuvRj
https://ift.tt/kNuKhcM
Submitted July 17, 2023 at 04:21PM by Malwarebeasts
via reddit https://ift.tt/knHuvRj
Hudsonrock
Prominent Threat Actor Accidentally Infects Own Computer with Info-Stealer
Threat actor “La_Citrix” is known for hacking companies — he accidentally infected his own computer and likely ended up selling it without noticing.
promptmap - automatically tests prompt injection attacks on ChatGPT instances
https://ift.tt/0qRkmis
Submitted July 16, 2023 at 05:23PM by utku1337
via reddit https://ift.tt/g0WVwQr
https://ift.tt/0qRkmis
Submitted July 16, 2023 at 05:23PM by utku1337
via reddit https://ift.tt/g0WVwQr
GitHub
GitHub - utkusen/promptmap: automatically tests prompt injection attacks on ChatGPT instances
automatically tests prompt injection attacks on ChatGPT instances - utkusen/promptmap
A technical analysis of the Quasar-forked RAT called VoidRAT
https://ift.tt/3BlH0TE
Submitted July 17, 2023 at 07:25PM by CyberMasterV
via reddit https://ift.tt/KTGiIBc
https://ift.tt/3BlH0TE
Submitted July 17, 2023 at 07:25PM by CyberMasterV
via reddit https://ift.tt/KTGiIBc
Security Scorecard
A Technical Analysis of Void Rat | SecurityScorecard
VoidRAT is based on the open-source RAT called Quasar. The malware steals information from web browsers and applications such as FileZilla and WinSCP. It also implements a keylogger functionality that saves and exfiltrates the pressed keys.