Linux Process Hunter
http://ift.tt/2ma4bNV
Submitted November 10, 2017 at 08:27PM by _spartak
via reddit http://ift.tt/2zsP0oA
http://ift.tt/2ma4bNV
Submitted November 10, 2017 at 08:27PM by _spartak
via reddit http://ift.tt/2zsP0oA
GitLab
nowayout / prochunter
Linux Process Hunter
How to solve the Malwarebytes CrackMe: a step-by-step tutorial
http://ift.tt/2hZK8NZ
Submitted November 10, 2017 at 08:39PM by EvanConover
via reddit http://ift.tt/2zKVek9
http://ift.tt/2hZK8NZ
Submitted November 10, 2017 at 08:39PM by EvanConover
via reddit http://ift.tt/2zKVek9
Malwarebytes Labs
How to solve the Malwarebytes CrackMe: a step-by-step tutorial
One of our analysts created a Malwarebytes CrackMe—an exercise in malware analysis—that was released to Twitter and triggered a positive response.
Reverse Engineering and Exploiting a Smart Massager
http://ift.tt/2hkrakq
Submitted November 10, 2017 at 09:41PM by rwestergren
via reddit http://ift.tt/2zvuzHM
http://ift.tt/2hkrakq
Submitted November 10, 2017 at 09:41PM by rwestergren
via reddit http://ift.tt/2zvuzHM
Medium
How I Reverse Engineered and Exploited a Smart Massager
Hello people, I am writing a blog post after a long time.
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby's native resolver.
http://ift.tt/2hhlk3c
Submitted November 10, 2017 at 11:41PM by teknogeek1
via reddit http://ift.tt/2zyYJHN
http://ift.tt/2hhlk3c
Submitted November 10, 2017 at 11:41PM by teknogeek1
via reddit http://ift.tt/2zyYJHN
EdOverflow
Bypassing Server-Side Request Forgery filters by abusing a bug in Ruby's native resolver.
I discovered a bug in Resolv::getaddresses that has direct security implications on any Ruby-based application or gem that relies on it for anything security related.
Using Roles for Access Control is not Role-Based Access Control
http://ift.tt/2mdpMoX
Submitted November 11, 2017 at 01:09AM by shawnmckinney
via reddit http://ift.tt/2yP1dEv
http://ift.tt/2mdpMoX
Submitted November 11, 2017 at 01:09AM by shawnmckinney
via reddit http://ift.tt/2yP1dEv
iamfortress
Using Roles for Access Control is not RBAC
I hear this kind of statement all the time: ‘We use Roles/Groups for access control in our systems and applications so we’re RBAC’. My response is an emphatic: ‘No –…
20 Percent of Mobile Cryptocurrency Malware Attacks Are In the US
http://ift.tt/2Az2oFB
Submitted November 11, 2017 at 12:16AM by SecurityTrust
via reddit http://ift.tt/2ypogBB
http://ift.tt/2Az2oFB
Submitted November 11, 2017 at 12:16AM by SecurityTrust
via reddit http://ift.tt/2ypogBB
Motherboard
20 Percent of Mobile Cryptocurrency Malware Attacks Are In the US
And infection rates could rise.
RunPE: How to hide code behind a legit process
http://ift.tt/2zAetKC
Submitted November 11, 2017 at 01:59AM by maxxori
via reddit http://ift.tt/2yPapbZ
http://ift.tt/2zAetKC
Submitted November 11, 2017 at 01:59AM by maxxori
via reddit http://ift.tt/2yPapbZ
Adlice Software
RunPE: How to hide code behind a legit process - Adlice Software
RunPE: How to hide code behind a legit process - RunPE is a trick used by some malware to hide code into a legit process. Learn how to detect.
How to represent nested and modified hash algorithms, used on Hashes.org
http://ift.tt/2ABF2iE
Submitted November 11, 2017 at 03:48AM by s3inlc
via reddit http://ift.tt/2zu9uNO
http://ift.tt/2ABF2iE
Submitted November 11, 2017 at 03:48AM by s3inlc
via reddit http://ift.tt/2zu9uNO
Wordpress
Algorithms on Hashes.org
With all the abilities Hashes.org provides to generate hash algorithms, there are unlimited ways of making things go smoothly or horribly wrong. For this reason, I will list some general examples …
200+ sessions over the last year reffered from a mysterious site
Over the last year, i've gotten 240+ sessions originating from http://ift.tt/2AAiGxK. Most of them are from Russia. Is it just crawlers, or should i actually look further into this?... and why in the world does the site say "Happy New Year" with fancy christmas animations and an odd painting of Santa Claus?
Submitted November 11, 2017 at 06:09AM by Dellitsni
via reddit http://ift.tt/2yr89U8
Over the last year, i've gotten 240+ sessions originating from http://ift.tt/2AAiGxK. Most of them are from Russia. Is it just crawlers, or should i actually look further into this?... and why in the world does the site say "Happy New Year" with fancy christmas animations and an odd painting of Santa Claus?
Submitted November 11, 2017 at 06:09AM by Dellitsni
via reddit http://ift.tt/2yr89U8
reddit
200+ sessions over the last year reffered from a... • r/security
Over the last year, i've gotten 240+ sessions originating from...
WP-SpamShield Removed from WordPress.org Directory Without Cause
http://ift.tt/2AASlzy
Submitted November 11, 2017 at 02:54AM by campuscodi
via reddit http://ift.tt/2yr8aYc
http://ift.tt/2AASlzy
Submitted November 11, 2017 at 02:54AM by campuscodi
via reddit http://ift.tt/2yr8aYc
RED SAND // BLOG
WP-SpamShield Removed from WordPress.org Directory Without Cause
A message from Scott: Hi everyone, Even though we abide by all of the published guidelines for developers, and the plugin has no security issues, the WP-SpamShield plugin was removed from the WordPress.org directory today. We were blindsided by the WordPress.org…
A penetration tester’s guide to sub-domain enumeration
http://ift.tt/2z55SOe
Submitted November 11, 2017 at 12:19PM by diaanasxsw
via reddit http://ift.tt/2hlCzQM
http://ift.tt/2z55SOe
Submitted November 11, 2017 at 12:19PM by diaanasxsw
via reddit http://ift.tt/2hlCzQM
Appsecco
A penetration tester’s guide to sub-domain enumeration
As a penetration tester or a bug bounty hunter, most of the times you are given a single domain or a set of domains when you start a…
Convert Hex to Assembly code using simple python noscript
http://ift.tt/2me6Gz1
Submitted November 11, 2017 at 04:04PM by InformationSecurity
via reddit http://ift.tt/2zueD8v
http://ift.tt/2me6Gz1
Submitted November 11, 2017 at 04:04PM by InformationSecurity
via reddit http://ift.tt/2zueD8v
Haider Mahmood Infosec Blog
Convert Hex To Assembly Using Simple Python Script
Convert hex Shellcode to Assembly instructions using Python noscript. The Example shown is a Hex msfvenom shellcode converted to assembly instructions.
Using Gathering Information Tools Through TOR Network
http://ift.tt/2yRctQX
Submitted November 11, 2017 at 07:54PM by sectronex
via reddit http://ift.tt/2zu1s7z
http://ift.tt/2yRctQX
Submitted November 11, 2017 at 07:54PM by sectronex
via reddit http://ift.tt/2zu1s7z
vallejo.cc
Using Gathering Information Tools Through TOR Network
Previous days I have been playing with nmap and other tools to gather information, through tor network. I wanted to share my experience with it, and the configuration that I am currently using. I h…
Using Gathering Information Tools Through TOR Network
http://ift.tt/2yRctQX
Submitted November 11, 2017 at 07:55PM by sectronex
via reddit http://ift.tt/2ysDntY
http://ift.tt/2yRctQX
Submitted November 11, 2017 at 07:55PM by sectronex
via reddit http://ift.tt/2ysDntY
vallejo.cc
Using Gathering Information Tools Through TOR Network
Previous days I have been playing with nmap and other tools to gather information, through tor network. I wanted to share my experience with it, and the configuration that I am currently using. I h…
Inside a low budget consumer hardware espionage implant
http://ift.tt/2ysAmKk
Submitted November 11, 2017 at 09:01PM by julian88888888
via reddit http://ift.tt/2iNsn42
http://ift.tt/2ysAmKk
Submitted November 11, 2017 at 09:01PM by julian88888888
via reddit http://ift.tt/2iNsn42
reddit
Inside a low budget consumer hardware espionage implant • r/security
4 points and 0 comments so far on reddit
‘’The white hat hackers guide to hacking & pentesting for the common good’’ - EBOOK coming soon.
http://ift.tt/2zwELQ0
Submitted November 11, 2017 at 10:02PM by cyberfeminist
via reddit http://ift.tt/2zPZKOE
http://ift.tt/2zwELQ0
Submitted November 11, 2017 at 10:02PM by cyberfeminist
via reddit http://ift.tt/2zPZKOE
LinkedIn
Magda CHELLY, Ph.D, CISSP® on LinkedIn: “I am very proud to…
I am very proud to co-author my first #EBOOK, a crowdsourced effort from the members of the Peerlyst online community of information #security profes…
My Review of MaaS360, IBM's UEM Solution by Magda CHELLY
http://ift.tt/2m1Ptsn
Submitted November 11, 2017 at 09:57PM by cyberfeminist
via reddit http://ift.tt/2zPZNtO
http://ift.tt/2m1Ptsn
Submitted November 11, 2017 at 09:57PM by cyberfeminist
via reddit http://ift.tt/2zPZNtO
Woman In Cyber
My Review of MaaS360, IBM's UEM Solution
It has been a while since I have been actively looking into the Mobile Device Management Solutions starting from AirWatch, Citirix, Intune to IBM MaasS360. I was a user, and I was an administrator. I have experienced both sides of the tunnel.
I would like…
I would like…
Woman In Cyber Security: Encouraging More Women in the Field
http://ift.tt/2t42twF
Submitted November 11, 2017 at 09:52PM by cyberfeminist
via reddit http://ift.tt/2zOshnD
http://ift.tt/2t42twF
Submitted November 11, 2017 at 09:52PM by cyberfeminist
via reddit http://ift.tt/2zOshnD
CISSP FREE Webinar Part 1 & 2
https://youtu.be/0TDxHpO8DHs
Submitted November 11, 2017 at 10:12PM by cyberfeminist
via reddit http://ift.tt/2zAqCPr
https://youtu.be/0TDxHpO8DHs
Submitted November 11, 2017 at 10:12PM by cyberfeminist
via reddit http://ift.tt/2zAqCPr
YouTube
CISSP Course Part 1
CISSP® - Certified Information Systems Security Professional is a vendor-neutral certification issued by (ISC)2. (ISC)² is a globally recognized, non-profit ...
Conventional Access Control Death and the Birth of Attribute Based Access Control
http://ift.tt/2iNSlUY
Submitted November 11, 2017 at 10:11PM by cyberfeminist
via reddit http://ift.tt/2zAqDTv
http://ift.tt/2iNSlUY
Submitted November 11, 2017 at 10:11PM by cyberfeminist
via reddit http://ift.tt/2zAqDTv
CPO Magazine
Conventional Access Control Death and the Birth of Attribute Based Access Control - CPO Magazine
Attribute based access control provides a dynamic level of access control, based on the environment and conditions, needed for privacy and data protection.
Internet of Things: Is There a Way from Failure to Success?
http://ift.tt/2iNkueO
Submitted November 11, 2017 at 10:09PM by cyberfeminist
via reddit http://ift.tt/2zAOLWj
http://ift.tt/2iNkueO
Submitted November 11, 2017 at 10:09PM by cyberfeminist
via reddit http://ift.tt/2zAOLWj
CPO Magazine
Internet of Things: Is There a Way from Failure to Success? - CPO Magazine
The Internet of Things is the future and it is time to start thinking privacy and security, first, and market share second.