Automating parts of Active Directory pentests with BloodHound CE
https://ift.tt/hZ17bO2
Submitted August 21, 2023 at 08:40PM by k8pf
via reddit https://ift.tt/DReHrlu
https://ift.tt/hZ17bO2
Submitted August 21, 2023 at 08:40PM by k8pf
via reddit https://ift.tt/DReHrlu
www.8com.de
BloodHound Active Directory Automation Pentest
This blog post explores functionality of BloodHound CE and automates important tasks
Hunchly Team Releases 6 Years of Tor Crawls
https://ift.tt/dBI5Wnc
Submitted August 21, 2023 at 09:55PM by jms_dot_py
via reddit https://ift.tt/uPaGjQb
https://ift.tt/dBI5Wnc
Submitted August 21, 2023 at 09:55PM by jms_dot_py
via reddit https://ift.tt/uPaGjQb
Some rough impressions of Worldcoin
https://ift.tt/Foz9eVH
Submitted August 22, 2023 at 04:01AM by feross
via reddit https://ift.tt/AJlHMIy
https://ift.tt/Foz9eVH
Submitted August 22, 2023 at 04:01AM by feross
via reddit https://ift.tt/AJlHMIy
A Few Thoughts on Cryptographic Engineering
Some rough impressions of Worldcoin
Recently a reader wrote in and asked if I would look at Sam Altman’s Worldcoin, presumably to give thoughts on it from a privacy perspective. This was honestly the last thing I wanted to do, …
Technical Details of CVE-2023-30988 - IBM Facsimile Support Privilege Escalation
https://ift.tt/akpyZWY
Submitted August 22, 2023 at 03:06PM by buherator
via reddit https://ift.tt/L6lW7Yt
https://ift.tt/akpyZWY
Submitted August 22, 2023 at 03:06PM by buherator
via reddit https://ift.tt/L6lW7Yt
Silent Signal Techblog
Technical Details of CVE-2023-30988 - IBM Facsimile Support Privilege Escalation
Because we can!
Exploitation of Openfire CVE-2023-32315
https://ift.tt/bFUL8Vt
Submitted August 22, 2023 at 06:30PM by chicksdigthelongrun
via reddit https://ift.tt/5YDPflr
https://ift.tt/bFUL8Vt
Submitted August 22, 2023 at 06:30PM by chicksdigthelongrun
via reddit https://ift.tt/5YDPflr
VulnCheck
Exploitation of Openfire CVE-2023-32315 - Blog - VulnCheck
CVE-2023-32315 was first exploited in the wild in June 2023. However, VulnCheck has discovered an new approach to exploiting this vulnerability, streamlining the attack process and adeptly bypassing the generation of log entries. In addition, VulnCheck analyzes…
Lateral movement: A conceptual overview
https://ift.tt/gXxM8NC
Submitted August 23, 2023 at 02:43AM by DiabloHorn
via reddit https://ift.tt/Q3JkjLz
https://ift.tt/gXxM8NC
Submitted August 23, 2023 at 02:43AM by DiabloHorn
via reddit https://ift.tt/Q3JkjLz
DiabloHorn
Lateral movement: A conceptual overview
I’ve often been in the situation of explaining lateral movement to people who do not work in the offensive security field on a daily basis or have a different level of technical understanding…
A Secure Design Pattern to Verify Content Size Without Relying on Untrusted File or Protocol Headers
https://ift.tt/g63Sdz2
Submitted August 23, 2023 at 04:42AM by pi3ch
via reddit https://ift.tt/oavVTRj
https://ift.tt/g63Sdz2
Submitted August 23, 2023 at 04:42AM by pi3ch
via reddit https://ift.tt/oavVTRj
Discuss
Stream Buffer Read: A Defensive Design Pattern for Content Size Validation
Tl;dr: Apps rely on untrusted parameter to perform size check. This can result into DoS attack. Stream Buffer Read is a defensive design pattern that prevents this. (This is another post in my series of articles on defensive design patterns: Avoid validation…
The Importance of Key Rotation for Data Security
https://ift.tt/hqb06ul
Submitted August 23, 2023 at 01:04PM by padout395
via reddit https://ift.tt/UcmswoV
https://ift.tt/hqb06ul
Submitted August 23, 2023 at 01:04PM by padout395
via reddit https://ift.tt/UcmswoV
Piiano
Key Rotation Strategies for Securing Sensitive Data
Learn why cryptographic key rotation is important for data security, explore key rotation strategies, and learn how to implement them. Read more!
Understanding Hackers' Work: An Empirical Study of Offensive Security Practitioners
https://ift.tt/XEHBQLY
Submitted August 23, 2023 at 05:13PM by andreashappe
via reddit https://ift.tt/nfv1QFN
https://ift.tt/XEHBQLY
Submitted August 23, 2023 at 05:13PM by andreashappe
via reddit https://ift.tt/nfv1QFN
Traders' Dollars in Danger: CVE-2023-38831 zero-Day vulnerability in WinRAR exploited by cybercriminals to target traders
https://ift.tt/gsUr1bJ
Submitted August 23, 2023 at 10:27PM by sunher444
via reddit https://ift.tt/COYgLbT
https://ift.tt/gsUr1bJ
Submitted August 23, 2023 at 10:27PM by sunher444
via reddit https://ift.tt/COYgLbT
Group-IB
Traders' dollars in danger: CVE-2023-38831 zero-day vulnerability in WinRAR exploited by cybercriminals to target traders
Spoof extensions help cybercriminals target users on trading forums as 130 devices still infected at time of writing.
Deep dive into the recent bugs in the NVMe protocol and the impact on cloud providers and on-premises servers.
https://ift.tt/MIfRxkV
Submitted August 24, 2023 at 01:16AM by jat0369
via reddit https://ift.tt/vUXdR1S
https://ift.tt/MIfRxkV
Submitted August 24, 2023 at 01:16AM by jat0369
via reddit https://ift.tt/vUXdR1S
Cyberark
NVMe: New Vulnerabilities Made Easy
As vulnerability researchers, our primary mission is to find as many vulnerabilities as possible with the highest severity as possible. Finding vulnerabilities is usually challenging. But could...
Using LLMs to reverse JavaScript variable name minification
https://ift.tt/XamrHDc
Submitted August 24, 2023 at 01:09AM by jehna1
via reddit https://ift.tt/RspK3Tl
https://ift.tt/XamrHDc
Submitted August 24, 2023 at 01:09AM by jehna1
via reddit https://ift.tt/RspK3Tl
Thejunkland
Using LLMs to reverse JavaScript variable name minification
A novel way to reverse Javanoscript minification using LLMs.
Penetrating the Apple: A Deep Dive into macOS Pentesting (Part Deaux)
https://ift.tt/ijG3upn
Submitted August 24, 2023 at 01:07AM by jat0369
via reddit https://ift.tt/3ZyFR7z
https://ift.tt/ijG3upn
Submitted August 24, 2023 at 01:07AM by jat0369
via reddit https://ift.tt/3ZyFR7z
Cyberark
A Deep Dive into Penetration Testing of macOS Applications (Part 2)
Introduction This is the second part of the “A Deep Dive into Penetration Testing of macOS Application” blog series. In the first part, we learned about macOS applications and their structure and...
Uncovering the Mysteries of ARM64 Rootkits + New discovery tool!
https://ift.tt/Nhzdi7J
Submitted August 24, 2023 at 01:02AM by jat0369
via reddit https://ift.tt/zfVP5Ea
https://ift.tt/Nhzdi7J
Submitted August 24, 2023 at 01:02AM by jat0369
via reddit https://ift.tt/zfVP5Ea
Cyberark
Fantastic Rootkits: And Where To Find Them (Part 3) – ARM Edition
Introduction In this blog, we will discuss innovative rootkit techniques on a non-traditional architecture, Windows 11 on ARM64. In the prior posts, we covered rootkit techniques applied to a...
Ivanti Sentry Authentication Bypass CVE-2023-38035 Deep-Dive, IOCs, and Exploit POC
https://ift.tt/wuPXIG2
Submitted August 24, 2023 at 05:44PM by scopedsecurity
via reddit https://ift.tt/EJImjzS
https://ift.tt/wuPXIG2
Submitted August 24, 2023 at 05:44PM by scopedsecurity
via reddit https://ift.tt/EJImjzS
Horizon3.ai
Ivanti Sentry Authentication Bypass CVE-2023-38035 Deep Dive – Horizon3.ai
Ivanti has recently published an advisory for CVE-2023-38035. The vulnerability has been added to CISA KEV and is described as an authentication bypass in the Ivanti Sentry administrator interface.
Learn how to protect your data and systems from upstream and Side Channel attacks with the Clean Source principle and Azure solutions. Discover the power of PAW and Confidential Compute
https://ift.tt/datTEAq
Submitted August 24, 2023 at 07:48PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/mBwHuvt
https://ift.tt/datTEAq
Submitted August 24, 2023 at 07:48PM by HotCakeXXXXXXXXXXXXX
via reddit https://ift.tt/mBwHuvt
GitHub
Clean Source principle, Azure and Privileged Access Workstations
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
Bypassing Bitlocker using a cheap logic analyzer on a Lenovo laptop
https://ift.tt/K8OaHsw
Submitted August 24, 2023 at 08:08PM by gquere
via reddit https://ift.tt/BTAWh7X
https://ift.tt/K8OaHsw
Submitted August 24, 2023 at 08:08PM by gquere
via reddit https://ift.tt/BTAWh7X
Frosty Trails: Threat-Hunting For Identity Threats In Snowflake Snowflake
https://ift.tt/rOn5oux
Submitted August 24, 2023 at 10:04PM by Or1rez
via reddit https://ift.tt/5LdVlFT
https://ift.tt/rOn5oux
Submitted August 24, 2023 at 10:04PM by Or1rez
via reddit https://ift.tt/5LdVlFT
Rezonate - Protect Identities, Everywhere
Threat-Hunting for Identity Threats in Snowflake - Rezonate
Learn how to effectively hunt for identity-based risks and threats in your Snowflake deployment to enhance security and protect your data with Rezonate.
CVE-2023-30943 - Playing Dominos with Moodle's Security (1/2)
https://ift.tt/DnhWyLi
Submitted August 24, 2023 at 11:31PM by monoimpact
via reddit https://ift.tt/SyaZsN6
https://ift.tt/DnhWyLi
Submitted August 24, 2023 at 11:31PM by monoimpact
via reddit https://ift.tt/SyaZsN6
Sonarsource
Playing Dominos with Moodle's Security (1/2)
Our security researchers recently discovered two critical vulnerabilities in Moodle that leverage the use of not impactful bugs.
GitHub - dwisiswant0/ipfuscator: A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go.
https://ift.tt/y4R1XJQ
Submitted August 25, 2023 at 03:02PM by dwisiswant0
via reddit https://ift.tt/EVmCO1w
https://ift.tt/y4R1XJQ
Submitted August 25, 2023 at 03:02PM by dwisiswant0
via reddit https://ift.tt/EVmCO1w
GitHub
GitHub - dwisiswant0/ipfuscator: A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate…
A blazing-fast, thread-safe, straightforward and zero memory allocations tool to swiftly generate alternative IP(v4) address representations in Go. - dwisiswant0/ipfuscator
Protect the Watcher: Hardened SIEM/XDR server with VED
https://ift.tt/8cNPgtC
Submitted August 25, 2023 at 09:38PM by hardenedvault
via reddit https://ift.tt/Pmgr6td
https://ift.tt/8cNPgtC
Submitted August 25, 2023 at 09:38PM by hardenedvault
via reddit https://ift.tt/Pmgr6td
hardenedvault.net
Protect the Watcher: Hardened SIEM/XDR server with VED
Background Modern cybersecurity operation centers significantly depend on two key elements: agent-based security solutions operating on desktops, laptops, and server operating systems, and a threat analysis system, often referred to as a Security Information…