Scheduled Task Tampering
https://ift.tt/k1h3EL6
Submitted January 03, 2024 at 12:44PM by netbiosX
via reddit https://ift.tt/WIJ8HuU
https://ift.tt/k1h3EL6
Submitted January 03, 2024 at 12:44PM by netbiosX
via reddit https://ift.tt/WIJ8HuU
Purple Team
Scheduled Task Tampering
The HAFNIUM threat actor is using an unconventional method to tamper scheduled tasks in order to establish persistence via modification of registry keys in their malware called Tarrask. The benefit…
Bitwarden Heist - How to Break into Password Vaults Without Using Passwords
https://ift.tt/J0PAyCQ
Submitted January 03, 2024 at 05:15PM by RedTeamPentesting
via reddit https://ift.tt/vQoSiCr
https://ift.tt/J0PAyCQ
Submitted January 03, 2024 at 05:15PM by RedTeamPentesting
via reddit https://ift.tt/vQoSiCr
RedTeam Pentesting - Blog
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …
Lessons from securing FreeRDP
https://ift.tt/TDPw7Oy
Submitted January 01, 2024 at 08:48PM by eyalitki
via reddit https://ift.tt/qBTYihJ
https://ift.tt/TDPw7Oy
Submitted January 01, 2024 at 08:48PM by eyalitki
via reddit https://ift.tt/qBTYihJ
Eyal Itkin
Lessons from Securing FreeRDP
Introduction The story behind this 2-part blog series started quite a while ago, on September 2018, when I started a vulnerability research on a (then) novel attack vector: “Reverse RDP”…
/r/netsec's Q1 2024 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 03, 2024 at 08:24PM by netsec_burn
via reddit https://ift.tt/rWM91DJ
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 03, 2024 at 08:24PM by netsec_burn
via reddit https://ift.tt/rWM91DJ
CloudPulse: A Tool for Tracking the Latest Cloud Security News
https://ift.tt/NSvZHAl
Submitted January 04, 2024 at 10:32PM by RoseSec_
via reddit https://ift.tt/I1SyA9J
https://ift.tt/NSvZHAl
Submitted January 04, 2024 at 10:32PM by RoseSec_
via reddit https://ift.tt/I1SyA9J
GitHub
GitHub - RoseSecurity/CloudPulse: A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information…
A tool to curate compelling news on cloud technologies and cybersecurity. By aggregating information from RSS feeds and Reddit, it identifies the most noteworthy and impactful updates in the tech i...
SSH-Snake: Automated Self-Propagating, Self-Replicating, Fileless SSH-Based Network Traversal
https://ift.tt/xs8T3Jy
Submitted January 05, 2024 at 02:55AM by MegaManSec2
via reddit https://ift.tt/p87Df3A
https://ift.tt/xs8T3Jy
Submitted January 05, 2024 at 02:55AM by MegaManSec2
via reddit https://ift.tt/p87Df3A
GitHub
GitHub - MegaManSec/SSH-Snake: SSH-Snake is a self-propagating, self-replicating, file-less noscript that automates the post-exploitation…
SSH-Snake is a self-propagating, self-replicating, file-less noscript that automates the post-exploitation task of SSH private key and host discovery. - MegaManSec/SSH-Snake
HackerGPT with embedded tools (subfinder, katana and naabu)
https://ift.tt/3RkVrFT
Submitted January 05, 2024 at 05:10AM by mycall
via reddit https://ift.tt/6Ju582j
https://ift.tt/3RkVrFT
Submitted January 05, 2024 at 05:10AM by mycall
via reddit https://ift.tt/6Ju582j
Galah: an LLM-powered web honeypot using the OpenAI API
https://ift.tt/WcgVhMP
Submitted January 05, 2024 at 06:11AM by netw0rm
via reddit https://ift.tt/C0jTBSn
https://ift.tt/WcgVhMP
Submitted January 05, 2024 at 06:11AM by netw0rm
via reddit https://ift.tt/C0jTBSn
GitHub
GitHub - 0x4D31/galah: Galah: An LLM-powered web honeypot.
Galah: An LLM-powered web honeypot. Contribute to 0x4D31/galah development by creating an account on GitHub.
The Artemis security scanner: how CERT PL scans Polish internet for vulnerabilities
https://ift.tt/YbCGIT5
Submitted January 05, 2024 at 04:49PM by kazetkazet
via reddit https://ift.tt/73qY9GR
https://ift.tt/YbCGIT5
Submitted January 05, 2024 at 04:49PM by kazetkazet
via reddit https://ift.tt/73qY9GR
cert.pl
The Artemis security scanner
Artemis is an open-source security vulnerability scanner developed by CERT PL. It is built to look for website misconfigurations and vulnerabilities on a large number of sites. It automatically prepares reports that can be sent to the affected institutions.…
Five WordPress Security Plugins Prevented Exploitation of Serious Vulnerability in Another Security Plugin
https://ift.tt/hLQG6Ae
Submitted January 05, 2024 at 10:53PM by PluginVulns
via reddit https://ift.tt/b8DLUrw
https://ift.tt/hLQG6Ae
Submitted January 05, 2024 at 10:53PM by PluginVulns
via reddit https://ift.tt/b8DLUrw
Plugin Vulnerabilities
Five WordPress Security Plugins Prevented Exploitation of Serious Vulnerability in Another Security Plugin
Intro into CI/CD research that has lead to critical vulnerabilities in Google, Meta, Microsoft, Blockchains, and more.
https://ift.tt/h5d8cFQ
Submitted January 06, 2024 at 03:37AM by IrohsLotusTile
via reddit https://ift.tt/UkgF9HO
https://ift.tt/h5d8cFQ
Submitted January 06, 2024 at 03:37AM by IrohsLotusTile
via reddit https://ift.tt/UkgF9HO
John Stawinski IV
Worse than SolarWinds: Three Steps to Hack Blockchains, GitHub, and ML through GitHub Actions
Six months ago, my friend and colleague Adnan Khan started researching a new class of CI/CD attacks. Adnan grasped the significance of these attacks after executing them against GitHub to gain tota…
2023 CVE Data Review
https://ift.tt/W5LRJ2r
Submitted January 06, 2024 at 03:18AM by JGamblin
via reddit https://ift.tt/1WJhMc7
https://ift.tt/W5LRJ2r
Submitted January 06, 2024 at 03:18AM by JGamblin
via reddit https://ift.tt/1WJhMc7
Bandook RAT Variant Resurfaces, Targeting Windows Machines
https://ift.tt/upnwfrz
Submitted January 06, 2024 at 11:09AM by No_Apple_997
via reddit https://ift.tt/1thlZEK
https://ift.tt/upnwfrz
Submitted January 06, 2024 at 11:09AM by No_Apple_997
via reddit https://ift.tt/1thlZEK
Leet.lat
News - Bandook RAT Variant Resurfaces, Targeting Windows Machines
It's January 2024 and there is a new troublemaker in town! Meet Bandook, the sneaky remote access trojan that's causing a ruckus on Windows machines.
Interested in IoT Security? Begin your journey with these key resources
https://ift.tt/KWgcY1u
Submitted January 06, 2024 at 01:41PM by falcnix
via reddit https://ift.tt/97Db4ou
https://ift.tt/KWgcY1u
Submitted January 06, 2024 at 01:41PM by falcnix
via reddit https://ift.tt/97Db4ou
LDAP Watchdog: A real-time LDAP monitoring tool for detecting (or stalking) directory changes
https://ift.tt/2h75SXD
Submitted January 07, 2024 at 12:31AM by MegaManSec2
via reddit https://ift.tt/Acqrz6C
https://ift.tt/2h75SXD
Submitted January 07, 2024 at 12:31AM by MegaManSec2
via reddit https://ift.tt/Acqrz6C
GitHub
GitHub - MegaManSec/LDAP-Monitoring-Watchdog: LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory…
LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, modifications, and deletions for administrators and security r...
Converting Integers to Hex with CyberChef - Recipe 0x1 - Securityinbits
https://ift.tt/Cfy2Nun
Submitted January 07, 2024 at 05:28PM by securityinbits
via reddit https://ift.tt/Fx6OzKL
https://ift.tt/Cfy2Nun
Submitted January 07, 2024 at 05:28PM by securityinbits
via reddit https://ift.tt/Fx6OzKL
Securityinbits
Converting Integers to Hex with CyberChef - Recipe 0x1 - Securityinbits
We will use CyberChef to decode the integer array into hex and pad it with extra 0s if needed. Then, we can disassemble the code using an online tool or CyberChef.
(Im)perfectProject(or) - Hacking a small WiFi connected projector for fun and to learn hard lessons.
https://ift.tt/g7f3BPC
Submitted January 07, 2024 at 09:18PM by CuckooExe
via reddit https://ift.tt/f1mM0hP
https://ift.tt/g7f3BPC
Submitted January 07, 2024 at 09:18PM by CuckooExe
via reddit https://ift.tt/f1mM0hP
Axel’s Blog
ImperfectProjector
A perfect project to hack an imperfect projector, including a hardware teardown, potential CLI injection, and some lessons learned.
Buffer Overflow in TP-Link Tapo C100 Home Security Camera
https://ift.tt/eNK9zhG
Submitted January 08, 2024 at 12:15AM by pwntheplanet
via reddit https://ift.tt/NIzy9L3
https://ift.tt/eNK9zhG
Submitted January 08, 2024 at 12:15AM by pwntheplanet
via reddit https://ift.tt/NIzy9L3
0xbigshaq.github.io
Exploiting n-day in Home Security Camera
Note: This blogpost was written in November 2023, but I was waiting for the TP Link Security Team to release a fix so now it’s published(Jan 2024).
Hello world! and happy new year. It’s been a long time since I last posted here.
I decided to take a new…
Hello world! and happy new year. It’s been a long time since I last posted here.
I decided to take a new…
Persistence – Event Log
https://ift.tt/riv3mxk
Submitted January 08, 2024 at 01:56PM by netbiosX
via reddit https://ift.tt/97tB8I1
https://ift.tt/riv3mxk
Submitted January 08, 2024 at 01:56PM by netbiosX
via reddit https://ift.tt/97tB8I1
Penetration Testing Lab
Persistence – Event Log
Windows Event logs are the main source of information for defensive security teams to identify threats and for administrators to troubleshoot errors. The logs are represented in a structured format…
Analysis of an Info Stealer - Chapter 1: The Phishing Website
https://ift.tt/VhUPKvS
Submitted January 08, 2024 at 01:52PM by _Fr4_
via reddit https://ift.tt/cODIvPj
https://ift.tt/VhUPKvS
Submitted January 08, 2024 at 01:52PM by _Fr4_
via reddit https://ift.tt/cODIvPj
Medium
Analysis of an Info Stealer — Chapter 1: The Phishing Website
Introduction
Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical devices
https://ift.tt/TvERjmG
Submitted January 08, 2024 at 02:59PM by aunga
via reddit https://ift.tt/sYqKA6L
https://ift.tt/TvERjmG
Submitted January 08, 2024 at 02:59PM by aunga
via reddit https://ift.tt/sYqKA6L
Pentagrid AG
Multiple vulnerabilities in Lantronix EDS-MD IoT gateway for medical d
The Lantronix EDS-MS is an "IoT gateway for mission critical medical devices and equipment connectivity". It is affected by multiple vulnerabilities.