Exploiting TRACE
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
https://ift.tt/v7zGeir
Submitted February 16, 2024 at 10:11PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CTj6pxm
attackshipsonfi.re
Exploiting TRACE
TL;DR The presence of the TRACE method is generally considered to be at best an informational finding (and in isolation, I wouldn’t disagree with that). But before you deploy your meh, if you know what to look for, the TRACE method (and any other mechanism…
Exploiting Unsynchronised Clocks
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
https://ift.tt/2SioyCd
Submitted February 16, 2024 at 10:09PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/CpsTRre
attackshipsonfi.re
Exploiting Unsynchronised Clocks
TL;DR According to data from RIPE, over 40% of computers attached to the Internet have a few seconds of clock drift, which with the right combination of headers, will make an HTTP response unintentionally cacheable. Background Like many parts of the HTTP…
A Double Free vulnerability on the libdicom library and an in-depth analysis of the DICOM file format.
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
https://ift.tt/UJV8ylb
Submitted February 16, 2024 at 09:52PM by voidz0r
via reddit https://ift.tt/DdnQEho
voidzone.me
Diving into the DICOM file format
Introduction While doing some research about file formats, I occasionally found some references about the DICOM file format. Since I never heard about it I’ve decided to dig deeper.
16/02/2024 Update It seems that the developer was already aware of the Double…
16/02/2024 Update It seems that the developer was already aware of the Double…
Elrouby Decrypted Desktop: The Best safe place for your files.
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
https://ift.tt/cn3SCr6
Submitted February 17, 2024 at 01:59PM by AhmedMinegames
via reddit https://ift.tt/hcCdTLR
GitHub
GitHub - ElroubyMagnos/ElroubyDecryptedDesktop: The best safe place for your files
The best safe place for your files. Contribute to ElroubyMagnos/ElroubyDecryptedDesktop development by creating an account on GitHub.
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
https://ift.tt/Mq0H3lV
Submitted February 18, 2024 at 08:23PM by DigOptimal9293
via reddit https://ift.tt/nOagE91
ReynardSec
Docker Security - Step-by-Step Hardening (Docker Hardening) - ReynardSec
This article provides practical recommendations for configuring Docker platform aimed at increasing its security. It also suggests tools helpful in automation of some tasks related to securing Docker.
Analysis of Mirai variant leveraging CVE-2023-1389
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
https://ift.tt/BgJTWUR
Submitted February 19, 2024 at 11:51AM by Permafr0stsec
via reddit https://ift.tt/FEoMs5m
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
https://ift.tt/sKEwe80
Submitted February 19, 2024 at 03:03PM by FreshConversation639
via reddit https://ift.tt/NZuX4fH
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...
A technical analysis of the BackMyData ransomware used to attack hospitals in Romania
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
https://ift.tt/x6FAkmY
Submitted February 19, 2024 at 06:20PM by CyberMasterV
via reddit https://ift.tt/HDPfsKY
Weekly digest of security-related conference talks
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
https://talks.donsan.uk
Submitted February 19, 2024 at 07:11PM by don-san-sec
via reddit https://ift.tt/Q4tSA1V
Top 10 web hacking techniques of 2023
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
https://ift.tt/tvKfqO1
Submitted February 19, 2024 at 10:38PM by loselasso
via reddit https://ift.tt/2OGZimz
PortSwigger Research
Top 10 web hacking techniques of 2023
Welcome to the Top 10 Web Hacking Techniques of 2023, the 17th edition of our annual community-powered effort to identify the most innovative must-read web security research published in the last year
Code Review Like a Pro
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
https://ift.tt/gPIeGfN
Submitted February 20, 2024 at 02:19AM by HayMiz
via reddit https://ift.tt/s7PI1aK
haymiz@kali:~/blog$
Code Review Like a Pro
Discover how to uncover vulnerabilities in source code applications and learn key techniques to identify and mitigate security risks effectively.
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs - XXE
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
https://ift.tt/sKEwe80
Submitted February 20, 2024 at 07:56AM by appsec1337
via reddit https://ift.tt/tmFaNHb
Penetration Testing and CyberSecurity Solution - SecureLayer7
Ivanti Connect Secure Under Attack: Uncovering Five Exploitable CVEs
Overview Recently, five CVEs have been discovered in Ivanti Connect Secure, a software product designed to offer secure remote access to corporate resources and applications. This product is...
AS-REP Roasting
https://ift.tt/FYDvsUr
Submitted February 20, 2024 at 01:44PM by netbiosX
via reddit https://ift.tt/jvaPsEn
https://ift.tt/FYDvsUr
Submitted February 20, 2024 at 01:44PM by netbiosX
via reddit https://ift.tt/jvaPsEn
Penetration Testing Lab
AS-REP Roasting
Active Directory users that have the Kerberos pre-authentication enabled and require access to a resource initiate the Kerberos authentication process by sending an Authentication Server Request (A…
Auto DNS poisoning: while charging Android smartphone via computer it is possible to perform automated and even remotely controlled DNS poisoning without any user interaction
https://ift.tt/vp2HyMc
Submitted February 20, 2024 at 03:59PM by barakadua131
via reddit https://ift.tt/16szY9c
https://ift.tt/vp2HyMc
Submitted February 20, 2024 at 03:59PM by barakadua131
via reddit https://ift.tt/16szY9c
Mobile Hacker
Automated local DNS cache poisoning using Android while charging via computer - Mobile Hacker
I will delve into using Android smartphone while charging from computer to perform automated DNS poisoning attack without any user interaction. I go through its results, downsides and effective prevention tips.
GitHub - naksyn/Embedder: Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
https://ift.tt/NkWEi7K
Submitted February 20, 2024 at 06:11PM by naksyn_
via reddit https://ift.tt/g0mVu4Z
https://ift.tt/NkWEi7K
Submitted February 20, 2024 at 06:11PM by naksyn_
via reddit https://ift.tt/g0mVu4Z
GitHub
GitHub - naksyn/Embedder: Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies
Embedder is a collection of sources in different languages to embed Python interpreter with minimal dependencies - naksyn/Embedder
Exploiting Cacheable Responses
https://ift.tt/tueSYzH
Submitted February 20, 2024 at 08:59PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/KnmZ2qx
https://ift.tt/tueSYzH
Submitted February 20, 2024 at 08:59PM by 6W99ocQnb8Zy17
via reddit https://ift.tt/KnmZ2qx
attackshipsonfi.re
Exploiting Cacheable Responses
TL;DR The main browsers share their cache between Fetch requests and normal navigation.
GitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPF
https://ift.tt/ZNTlKVS
Submitted February 20, 2024 at 08:55PM by Frequent_Passenger82
via reddit https://ift.tt/dfqUsrW
https://ift.tt/ZNTlKVS
Submitted February 20, 2024 at 08:55PM by Frequent_Passenger82
via reddit https://ift.tt/dfqUsrW
GitHub
GitHub - mlcsec/FormThief: Spoofing desktop login applications with WinForms and WPF
Spoofing desktop login applications with WinForms and WPF - mlcsec/FormThief
Lockbit Ransomeware global taketown
https://ift.tt/p6hGQuO
Submitted February 21, 2024 at 03:26AM by foundapairofknickers
via reddit https://ift.tt/ds6kx1J
https://ift.tt/p6hGQuO
Submitted February 21, 2024 at 03:26AM by foundapairofknickers
via reddit https://ift.tt/ds6kx1J
iTnews
Lockbit cybercrime gang faces global takedown
With indictments and arrests.
Authentication bypass in the IWD and wpa_supplicant Wi-Fi deamons
https://ift.tt/9bJPeZo
Submitted February 21, 2024 at 06:38AM by omegga
via reddit https://ift.tt/2CMDplh
https://ift.tt/9bJPeZo
Submitted February 21, 2024 at 06:38AM by omegga
via reddit https://ift.tt/2CMDplh
Top10Vpn
New WiFi Authentication Vulnerabilities Discovered
Two new WiFi vulnerabilities allow hackers to trick you into connecting to fake hotspots and steal your data, and join secure networks without the password.
PEAP Phase-2 authentication in Linux's wpa_suppcliant could be bypassed
https://ift.tt/AiNYyDj
Submitted February 21, 2024 at 07:17AM by omegga
via reddit https://ift.tt/fX82Nc5
https://ift.tt/AiNYyDj
Submitted February 21, 2024 at 07:17AM by omegga
via reddit https://ift.tt/fX82Nc5
Detection Rules Development Framework
https://ift.tt/ExwslWR
Submitted February 21, 2024 at 03:06PM by netbiosX
via reddit https://ift.tt/YCPMhkc
https://ift.tt/ExwslWR
Submitted February 21, 2024 at 03:06PM by netbiosX
via reddit https://ift.tt/YCPMhkc
Purple Team
Detection Rules Development Framework
Organizations who invest in detection engineering have an edge towards identification of threats. However, there is no industry standard to define the framework around the development of detection …