Can you Tell When A Power Outage Occurred? -- Determining How Long a Wi-Fi AP Has Been Active
https://ift.tt/vHaADyV
Submitted February 14, 2024 at 04:59PM by wirelessbits
via reddit https://ift.tt/pec3MUC
https://ift.tt/vHaADyV
Submitted February 14, 2024 at 04:59PM by wirelessbits
via reddit https://ift.tt/pec3MUC
Medium
Determining How Long a Wi-Fi AP Has Been Active
I spend a decent amount of time looking at IEEE 802.11 (Wi-Fi) packet captures and feel like every time I close Wireshark I’ve learned…
Snap Trap: The Hidden Dangers Within Ubuntu's Package Suggestion System
https://ift.tt/kW654Hy
Submitted February 14, 2024 at 06:50PM by ilay789
via reddit https://ift.tt/AsL2pjf
https://ift.tt/kW654Hy
Submitted February 14, 2024 at 06:50PM by ilay789
via reddit https://ift.tt/AsL2pjf
Aqua
The Hidden Dangers Within Ubuntu's Package Suggestion System
Aqua Nautilus researchers have identified a security issue that arises from the interaction between Ubuntu's command-not-found package and the snap package repository.
Staying ahead of threat actors in the age of AI
https://ift.tt/5WrFIyo
Submitted February 15, 2024 at 12:26AM by SCI_Rusher
via reddit https://ift.tt/gmwbeON
https://ift.tt/5WrFIyo
Submitted February 15, 2024 at 12:26AM by SCI_Rusher
via reddit https://ift.tt/gmwbeON
Microsoft Security Blog
Staying ahead of threat actors in the age of AI | Microsoft Security Blog
Microsoft, in collaboration with OpenAI, is publishing research on emerging threats in the age of AI, focusing on identified activity associated with known threat actors Forest Blizzard, Emerald Sleet, Crimson Sandstorm, and others. The observed activity…
SOC Interview Questions
https://ift.tt/pdaoMPU
Submitted February 15, 2024 at 03:06AM by ogunal00
via reddit https://ift.tt/VDhAF6n
https://ift.tt/pdaoMPU
Submitted February 15, 2024 at 03:06AM by ogunal00
via reddit https://ift.tt/VDhAF6n
GitHub
GitHub - LetsDefend/SOC-Interview-Questions: SOC Interview Questions
SOC Interview Questions. Contribute to LetsDefend/SOC-Interview-Questions development by creating an account on GitHub.
Microsoft 365 AiTM detection: the lessons learned
https://ift.tt/VghIqAu
Submitted February 15, 2024 at 11:10PM by wez32
via reddit https://ift.tt/Tk5chWM
https://ift.tt/VghIqAu
Submitted February 15, 2024 at 11:10PM by wez32
via reddit https://ift.tt/Tk5chWM
Zolder B.V.
Microsoft 365 AiTM detection: the lessons learned
The beginning of January we released a new way to detect AiTM attacks on your Microsoft 365 environment. In just one month, we are protecting over 100 tenants with this new approach. We were able t…
GitHub - deeexcee-io/duppy: python flask app which utilises ngrok and gunicorn to securely download and upload files to local machine over the internet. all handled by the bash noscript.
https://ift.tt/gBj69Rh
Submitted February 16, 2024 at 03:04AM by Leading-Employer-828
via reddit https://ift.tt/7HPEvFZ
https://ift.tt/gBj69Rh
Submitted February 16, 2024 at 03:04AM by Leading-Employer-828
via reddit https://ift.tt/7HPEvFZ
GitHub
GitHub - deeexcee-io/duppy: python flask app which utilises ngrok and gunicorn to securely upload files to local machine and download…
python flask app which utilises ngrok and gunicorn to securely upload files to local machine and download to remote machine over the internet. all handled by the bash noscript. - deeexcee-io/duppy
Exploiting TRACE
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
attackshipsonfi.re
Exploiting TRACE
TL;DR The presence of the TRACE method is generally considered to be at best an informational finding (and in isolation, I wouldn’t disagree with that). But before you deploy your meh, if you know what to look for, the TRACE method (and any other mechanism…
Exploiting Unsynchronised Clocks
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
attackshipsonfi.re
Exploiting Unsynchronised Clocks
TL;DR According to data from RIPE, over 40% of computers attached to the Internet have a few seconds of clock drift, which with the right combination of headers, will make an HTTP response unintentionally cacheable. Background Like many parts of the HTTP…
A Double Free vulnerability on the libdicom library and an in-depth analysis of the DICOM file format.
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
voidzone.me
Diving into the DICOM file format
Introduction While doing some research about file formats, I occasionally found some references about the DICOM file format. Since I never heard about it I’ve decided to dig deeper.
16/02/2024 Update It seems that the developer was already aware of the Double…
16/02/2024 Update It seems that the developer was already aware of the Double…
Elrouby Decrypted Desktop: The Best safe place for your files.
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
GitHub
GitHub - ElroubyMagnos/ElroubyDecryptedDesktop: The best safe place for your files
The best safe place for your files. Contribute to ElroubyMagnos/ElroubyDecryptedDesktop development by creating an account on GitHub.
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
ReynardSec
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
This article provides practical recommendations for configuring Docker platform aimed at increasing its security. It also suggests tools helpful in automation of some tasks related to securing Docker.
Analysis of Mirai variant leveraging CVE-2023-1389
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
Weekly digest of security-related conference talks
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
Top 10 web hacking techniques of 2023
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
PortSwigger Research
Top 10 web hacking techniques of 2023
Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
Code Review Like a Pro
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
haymiz@kali:~/blog$
Code Review Like a Pro
Discover how to uncover vulnerabilities in source code applications and learn key techniques to identify and mitigate security risks effectively.
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXE
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...
AS-REP Roasting
https://ift.tt/FYDvsUr
Submitted February 20, 2024 at 01:44PM by netbiosX
via reddit https://ift.tt/jvaPsEn
https://ift.tt/FYDvsUr
Submitted February 20, 2024 at 01:44PM by netbiosX
via reddit https://ift.tt/jvaPsEn
Penetration Testing Lab
AS-REP Roasting
Active Directory users that have the Kerberos pre-authentication enabled and require access to a resource initiate the Kerberos authentication process by sending an Authentication Server Request (A…
Auto DNS poisoning: while charging Android smartphone via computer it is possible to perform automated and even remotely controlled DNS poisoning without any user interaction
https://ift.tt/vp2HyMc
Submitted February 20, 2024 at 03:59PM by barakadua131
via reddit https://ift.tt/16szY9c
https://ift.tt/vp2HyMc
Submitted February 20, 2024 at 03:59PM by barakadua131
via reddit https://ift.tt/16szY9c
Mobile Hacker
Automated local DNS cache poisoning using Android while charging via computer - Mobile Hacker
I will delve into using Android smartphone while charging from computer to perform automated DNS poisoning attack without any user interaction. I go through its results, downsides and effective prevention tips.
GitHub - naksyn/Embedder: Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
https://ift.tt/NkWEi7K
Submitted February 20, 2024 at 06:11PM by naksyn_
via reddit https://ift.tt/g0mVu4Z
https://ift.tt/NkWEi7K
Submitted February 20, 2024 at 06:11PM by naksyn_
via reddit https://ift.tt/g0mVu4Z
GitHub
GitHub - naksyn/Embedder: Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies - naksyn/Embedder