CrushFTP - CVE-2023-43177 - Unauthenticated Root-Level RCE Chain
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
https://ift.tt/9rSfbh2
Submitted November 16, 2023 at 08:14PM by After_Performer7638
via reddit https://ift.tt/Jcwdfkg
Converge Technology Solutions
CrushFTP Critical Vulnerability CVE-2023-43177 Unauthenticated Remote Code Execution
Zero-day vulnerabilities chain in CrushFTP (CVE-20-23-43177) uncovered by Converge Red Team requires immediate attention with these remediation steps.
Analyzing the security posture of thousands of AWS, Azure and Google Cloud environments
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
https://ift.tt/GPS9gI3
Submitted November 17, 2023 at 12:58AM by thorn42
via reddit https://ift.tt/KqFrl6c
Datadog
State of Cloud Security | Datadog
We analyzed data from thousands of organizations to understand the latest trends in cloud security posture.
HavocC2 Exploit
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
https://ift.tt/0GAWCSl
Submitted November 17, 2023 at 07:05AM by syncwithali
via reddit https://ift.tt/4HczSsR
GitHub
GitHub - syncwithali/HavocExploit: A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc.
A remote unauthenticated DOS POC exploit that targets the authentication implementation of Havoc. - syncwithali/HavocExploit
DIALStranger: my research about DIAL protocol vulnerabilities is public after 4 years
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
https://ift.tt/pEvxC15
Submitted November 17, 2023 at 11:51PM by ynscdrc
via reddit https://ift.tt/f25mW6Z
GitHub
GitHub - yunuscadirci/DIALStranger: details about DIAL protocol vulnerabilities
details about DIAL protocol vulnerabilities . Contribute to yunuscadirci/DIALStranger development by creating an account on GitHub.
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
https://ift.tt/Qzmfgcy
Submitted November 18, 2023 at 08:10PM by monoimpact
via reddit https://ift.tt/IaKziVt
Sonarsource
Visual Studio Code Security: Markdown Vulnerabilities in Third-Party Extensions (2/3)
We took a look at the security of the most popular code editor, Visual Studio Code! This blog post covers vulnerabilities our researchers discovered in third-party extensions.
Building a Free Burp Collaborator with Cloudflare Workers
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
https://ift.tt/MAnHr1g
Submitted November 19, 2023 at 09:58AM by gabriel_schneider
via reddit https://ift.tt/uJd73lK
blog.gbrls.space
gbrls's blog
gbrls's hacking blog
Mockingjay revisisted - Process stomping on an executable's RWX section and loading beacon with sRDI
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
https://ift.tt/MWxIHQO
Submitted November 19, 2023 at 06:49PM by naksyn_
via reddit https://ift.tt/b0ImNoL
Naksyn’s blog
Mockingjay revisisted - Process stomping and loading beacon with sRDI
Executables with RWX sections can be abused using a variation of a Process Overwriting technique dubbed Process Stomping. Using (a modified) sRDI and leveraging the new features of Cobalt Strike 4.9 has been possible to load beacon in the RWX section itself…
CVE-2023-45878: Vulnerability in Gibbon Edu Leads to Unauthenticated RCE
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
https://ift.tt/oyGn9F5
Submitted November 20, 2023 at 01:53PM by usdAG
via reddit https://ift.tt/YNVfhWU
usd HeroLab
usd-2023-0025 - usd HeroLab
Advisory ID: usd-2023-0025 (CVE-2023-45878) | Product: Gibbon Edu | Vulnerability Type: Arbitrary File Write (CWE-434)
Persistence - Scheduled Task Tampering
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
https://ift.tt/4x6mnci
Submitted November 20, 2023 at 03:04PM by netbiosX
via reddit https://ift.tt/0jmXyF9
Penetration Testing Lab
Persistence – Scheduled Task Tampering
Windows Task Scheduler enables windows users and administrators to perform automated tasks at specific time intervals. Scheduled tasks has been commonly abused as a method of persistence by threat …
WithSecure Elements vulnerability to isolate a complete company
https://ift.tt/ZBlUdz7
Submitted November 20, 2023 at 04:27PM by security_aaudit
via reddit https://ift.tt/U6Z8lh2
https://ift.tt/ZBlUdz7
Submitted November 20, 2023 at 04:27PM by security_aaudit
via reddit https://ift.tt/U6Z8lh2
baldur.dk
How we could exploit a vulnerability in WithSecure Elements EDR to shut down a company network through malicious isolation.
Enriched Trivy database with Vulners data released and free for all
https://ift.tt/w3sTAh2
Submitted November 20, 2023 at 04:12PM by isox_xx
via reddit https://ift.tt/imVUp5b
https://ift.tt/w3sTAh2
Submitted November 20, 2023 at 04:12PM by isox_xx
via reddit https://ift.tt/imVUp5b
GitHub
GitHub - vulnersCom/trivy-plugin-vulners-db
Contribute to vulnersCom/trivy-plugin-vulners-db development by creating an account on GitHub.
sterrasec/genpatch: genpatch is IDA plugin that generates a python noscript for patching binary
https://ift.tt/fse8i0c
Submitted November 20, 2023 at 07:25PM by tkmru
via reddit https://ift.tt/UIqY3Ej
https://ift.tt/fse8i0c
Submitted November 20, 2023 at 07:25PM by tkmru
via reddit https://ift.tt/UIqY3Ej
GitHub
GitHub - sterrasec/genpatch: genpatch is IDA plugin that generates a python noscript for patching binary
genpatch is IDA plugin that generates a python noscript for patching binary - sterrasec/genpatch
Avoiding kernel triggered memory scans for process injection
https://ift.tt/g5wd3XH
Submitted November 20, 2023 at 11:26PM by S3cur3Th1sSh1t
via reddit https://ift.tt/rhbAVDe
https://ift.tt/g5wd3XH
Submitted November 20, 2023 at 11:26PM by S3cur3Th1sSh1t
via reddit https://ift.tt/rhbAVDe
www.r-tec.net
Process Injection: Avoiding Kernel Triggered Memory Scans
This Blog will show a novel way to avoid detections for Process Injection triggered by ETWti from Kernel.
OMGCICD - Attacking GitLab CI/CD via Shared Runners
https://ift.tt/Q7vg4sd
Submitted November 21, 2023 at 06:15AM by MysteriousHotel3017
via reddit https://ift.tt/y2AlRUQ
https://ift.tt/Q7vg4sd
Submitted November 21, 2023 at 06:15AM by MysteriousHotel3017
via reddit https://ift.tt/y2AlRUQ
Pulse Security
OMGCICD - Attacking GitLab CI/CD via Shared Runners
This article discusses compromising shared CI/CD runner infrastructure, and how an attacker can escalate their privileges from basic source-repository access to compromising the environments the wider system is deploying.
Can I get some help in relation to interpreting a log/data
https://ift.tt/4T7wQyi
Submitted November 21, 2023 at 05:47AM by Fai057
via reddit https://ift.tt/KikWD28
https://ift.tt/4T7wQyi
Submitted November 21, 2023 at 05:47AM by Fai057
via reddit https://ift.tt/KikWD28
[BlackHat MEA 23] SAP Penetration Testing
https://ift.tt/dJByLcG
Submitted November 21, 2023 at 04:55PM by vah_13
via reddit https://ift.tt/KHpci0g
https://ift.tt/dJByLcG
Submitted November 21, 2023 at 04:55PM by vah_13
via reddit https://ift.tt/KHpci0g
GitHub
SAP-Penetration-Testing/BHMEA23_SAP_Penetration_Testing.pdf at main · redrays-io/SAP-Penetration-Testing
SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues - redrays-io/SAP-Penetration-Testing
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
https://ift.tt/f9zCgSt
Submitted November 21, 2023 at 06:47PM by Pale_Fly_2673
via reddit https://ift.tt/s7Iquy5
https://ift.tt/f9zCgSt
Submitted November 21, 2023 at 06:47PM by Pale_Fly_2673
via reddit https://ift.tt/s7Iquy5
Aqua
The Ticking Supply Chain Attack Bomb of Exposed Kubernetes Secrets
Aqua Nautilus researchers found exposed Kubernetes secrets that pose a critical threat of supply chain attack to hundreds of organizations and OSS.
Private and Secure Windows
https://ift.tt/O4pSsAi
Submitted November 21, 2023 at 06:37PM by kygyty
via reddit https://ift.tt/Bgleroh
https://ift.tt/O4pSsAi
Submitted November 21, 2023 at 06:37PM by kygyty
via reddit https://ift.tt/Bgleroh
GitHub
GitHub - troennes/private-secure-windows: Privacy and security baseline for personal Windows 10 and Windows 11
Privacy and security baseline for personal Windows 10 and Windows 11 - troennes/private-secure-windows
InfoSec Black Friday Deals ~ "Friday Hack Fest" 2023 Edition
https://ift.tt/dVD8Kxz
Submitted November 21, 2023 at 05:50PM by B0b_Howard
via reddit https://ift.tt/SO9LeDV
https://ift.tt/dVD8Kxz
Submitted November 21, 2023 at 05:50PM by B0b_Howard
via reddit https://ift.tt/SO9LeDV
GitHub
GitHub - 0x90n/InfoSec-Black-Friday: All the deals for InfoSec related software/tools this Black Friday
All the deals for InfoSec related software/tools this Black Friday - 0x90n/InfoSec-Black-Friday
Log4Shell - different avenues of exploitation
https://ift.tt/fWNVMQU
Submitted November 21, 2023 at 07:08PM by forgambo
via reddit https://ift.tt/WiKFNCP
https://ift.tt/fWNVMQU
Submitted November 21, 2023 at 07:08PM by forgambo
via reddit https://ift.tt/WiKFNCP
Olex’s Substack
Log4Shell - different avenues of exploitation
This is a story about different ways to achieve RCE through the Java Log4j2 vulnerability (Log4Shell, CVE-2021-44228). And while some methods may not work, others may.
How to Use OAuth Scopes for Authorization
https://ift.tt/dmkYp7X
Submitted November 21, 2023 at 11:39PM by Permit_io
via reddit https://ift.tt/otZaknB
https://ift.tt/dmkYp7X
Submitted November 21, 2023 at 11:39PM by Permit_io
via reddit https://ift.tt/otZaknB
www.permit.io
How to Use OAuth Scopes for Authorization | Permit
Learn how, when, and where to use OAuth scopes for authorization. Get a clear understanding of OAuth scopes definition and their proper usage.