HappyCamper: Doubling Down On Naming Space Location Randomization (NSLR)
https://ift.tt/mqkQaUI
Submitted March 07, 2024 at 10:19PM by operat1ve
via reddit https://ift.tt/YH3S06X
https://ift.tt/mqkQaUI
Submitted March 07, 2024 at 10:19PM by operat1ve
via reddit https://ift.tt/YH3S06X
www.karma-x.io
HappyCamper: Doubling Down On Naming Space Location Randomization (NSLR)
Git-Rotate: Leveraging GitHub Actions for Password Spraying
https://ift.tt/Gnw1UmZ
Submitted March 08, 2024 at 02:38AM by Acceptable-Doubt-878
via reddit https://ift.tt/vrKjwcS
https://ift.tt/Gnw1UmZ
Submitted March 08, 2024 at 02:38AM by Acceptable-Doubt-878
via reddit https://ift.tt/vrKjwcS
Aura Research Division
Git-Rotate: Leveraging GitHub Actions to Bypass Microsoft Entra Smart lockout
Explore how GitHub Actions can be leveraged to rotate IP addresses during password spraying attacks to bypass IP-Based blocking such as Entra Smart lockout.
pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE) - Shielder
https://ift.tt/GCkWRBI
Submitted March 08, 2024 at 07:27PM by smaury
via reddit https://ift.tt/9o6ePUA
https://ift.tt/GCkWRBI
Submitted March 08, 2024 at 07:27PM by smaury
via reddit https://ift.tt/9o6ePUA
Shielder
Shielder - pgAdmin (<=8.3) Path Traversal in Session Handling Leads to Unsafe Deserialization and Remote Code Execution (RCE)
pgAdmin <= 8.3 is affected by a path-traversal vulnerability while deserializing user's session in the session handling code. If the server is running on Windows, an unauthenticated attacker can load and deserialize remote pickle objects and gain code execution.…
Docker containers under attack in new malware campaign
https://ift.tt/sP7RCOS
Submitted March 08, 2024 at 09:00PM by ShadowStackRE
via reddit https://ift.tt/XUG5Mz4
https://ift.tt/sP7RCOS
Submitted March 08, 2024 at 09:00PM by ShadowStackRE
via reddit https://ift.tt/XUG5Mz4
Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
https://ift.tt/vs4WFj8
Submitted March 09, 2024 at 03:15AM by nexxai
via reddit https://ift.tt/QiqPAa5
https://ift.tt/vs4WFj8
Submitted March 09, 2024 at 03:15AM by nexxai
via reddit https://ift.tt/QiqPAa5
CTVNews
Behind the doors of a Chinese hacking company, a sordid culture fuelled by influence, alcohol and sex
A highly unusual leak last month of internal documents from a private contractor linked to China's government and police revealed the sordid wheeling and dealing that takes place behind the scenes in China's hacking industry.
Undisclosed PHP Remote Code Execution / Arbitrary File Read Vulnerabilities in RaspAP
https://ift.tt/TN3VcDm
Submitted March 09, 2024 at 04:08AM by supernetworks
via reddit https://ift.tt/v8TU3Pf
https://ift.tt/TN3VcDm
Submitted March 09, 2024 at 04:08AM by supernetworks
via reddit https://ift.tt/v8TU3Pf
dustri.org
Carrot disclosure
Personal blog of Julien (jvoisin) Voisin
GitHub - thiagopeixoto/winsos-poc: A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
https://ift.tt/dsYnL0J
Submitted March 11, 2024 at 03:51AM by thewatcher_
via reddit https://ift.tt/SVfQU72
https://ift.tt/dsYnL0J
Submitted March 11, 2024 at 03:51AM by thewatcher_
via reddit https://ift.tt/SVfQU72
GitHub
GitHub - thiagopeixoto/winsos-poc: A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries.
A PoC demonstrating code execution via DLL Side-Loading in WinSxS binaries. - thiagopeixoto/winsos-poc
Analyze installed Android app for security risks in Termux using APKDeepLens
https://ift.tt/LYFjw1b
Submitted March 11, 2024 at 02:07PM by barakadua131
via reddit https://ift.tt/SkQO0wu
https://ift.tt/LYFjw1b
Submitted March 11, 2024 at 02:07PM by barakadua131
via reddit https://ift.tt/SkQO0wu
Mobile Hacker
Analyze installed Android applications for security risks in Termux
I will show you how to install and run it on non-rooted Android device using Termux app. This brings convenience of analyzing Android apps directly on device
New OpenSecurityTraining2 class: "Trusted Computing 1101: Introductory Trusted Platform Module (TPM) usage" by Dimi Tomov of TPM.dev
https://ost2.fyi/TC1101
Submitted March 11, 2024 at 05:28PM by OpenSecurityTraining
via reddit https://ift.tt/h0noZvB
https://ost2.fyi/TC1101
Submitted March 11, 2024 at 05:28PM by OpenSecurityTraining
via reddit https://ift.tt/h0noZvB
p.ost2.fyi
Trusted Computing 1101: Introductory Trusted Platform Module (TPM) usage
Learning how to use Trusted Platform Modules (TPMs)
CVE-2024–23897 – Arbitrary file read in Jenkins
https://ift.tt/euIJ8Tj
Submitted March 11, 2024 at 04:35PM by SL7reach
via reddit https://ift.tt/VlaQT5z
https://ift.tt/euIJ8Tj
Submitted March 11, 2024 at 04:35PM by SL7reach
via reddit https://ift.tt/VlaQT5z
Penetration Testing and CyberSecurity Solution - SecureLayer7
CVE-2024–23897 – Arbitrary file read in Jenkins
Overview CVE-2024–23897 is a critical vulnerability discovered in Jenkins, with a high CVSS score of 9.8. This vulnerability allows the attacker to read files in the system through the integrated...
CVE-2023-49785 SSRF in NextChat: An AI Chatbot That Lets You Talk to Anyone You Want To
https://ift.tt/fne2riv
Submitted March 11, 2024 at 07:23PM by scopedsecurity
via reddit https://ift.tt/z5hI3gD
https://ift.tt/fne2riv
Submitted March 11, 2024 at 07:23PM by scopedsecurity
via reddit https://ift.tt/z5hI3gD
Horizon3.ai
NextChat: An AI Chatbot That Lets You Talk to Anyone You Want To – Horizon3.ai
NextChat a.k.a ChatGPT-Next-Web, a popular Gen AI ChatBot, is vulnerable to a critical server-side request forgery (SSRF) vulnerability.
Introduction to LLM Security
https://ift.tt/OVyD0hz
Submitted March 11, 2024 at 08:05PM by nilla615615
via reddit https://ift.tt/0mQ8o6M
https://ift.tt/OVyD0hz
Submitted March 11, 2024 at 08:05PM by nilla615615
via reddit https://ift.tt/0mQ8o6M
Cloudsecuritypartners
Introduction to LLM Security
Read about Introduction to LLM Security
CVE-2024-28084 iwd double-free in beacon parsing
https://ift.tt/0H384GQ
Submitted March 11, 2024 at 09:16PM by supernetworks
via reddit https://ift.tt/XhVS5OB
https://ift.tt/0H384GQ
Submitted March 11, 2024 at 09:16PM by supernetworks
via reddit https://ift.tt/XhVS5OB
www.supernetworks.org
Beacon Double Free in IWD | SPR
CVE-2024-28084 Patched in Inet Wireless Daemon 2.16
ShellFeck: A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept
https://ift.tt/Ic8FuAX
Submitted March 11, 2024 at 08:48PM by Aaron_Dj0nt
via reddit https://ift.tt/DKWTSyn
https://ift.tt/Ic8FuAX
Submitted March 11, 2024 at 08:48PM by Aaron_Dj0nt
via reddit https://ift.tt/DKWTSyn
GitHub
GitHub - CyberSecurityN00b/shellfeck: A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept
A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept - CyberSecurityN00b/shellfeck
Practical and Theoretical Attacks in the Industrial Landscape (Part 2)
https://ift.tt/N7ERgVO
Submitted March 12, 2024 at 01:29AM by sh0n1z
via reddit https://ift.tt/dt3Mv7l
https://ift.tt/N7ERgVO
Submitted March 12, 2024 at 01:29AM by sh0n1z
via reddit https://ift.tt/dt3Mv7l
Claroty
Practical and Theoretical Attacks in the Industrial Landscape (Part 2)
In part two of this Team82 series, we examine practical and theoretical attacks against operational technology (OT) through the use of a virtual factory environment. The attacks range in sophistication and present defenders with an opportunity to threat model…
Presenting Scanme: Deep Dive into Network Scanning with Golang: Building a Port Scanner
https://ift.tt/hMj24IS
Submitted March 12, 2024 at 01:19AM by Technical_Shelter621
via reddit https://ift.tt/x2btmqp
https://ift.tt/hMj24IS
Submitted March 12, 2024 at 01:19AM by Technical_Shelter621
via reddit https://ift.tt/x2btmqp
Blog
Presenting Scanme: Deep Dive into Network Scanning with Golang: …
Introduction: In today’s interconnected world, understanding network security is essential. One essential tool in a security professional’s arsenal is a port scanner. You probably thinking …
K8s LAN Party - A Kubernetes Network Security CTF
https://k8slanparty.com
Submitted March 12, 2024 at 02:42AM by geekydeveloper
via reddit https://ift.tt/Wvey3mz
https://k8slanparty.com
Submitted March 12, 2024 at 02:42AM by geekydeveloper
via reddit https://ift.tt/Wvey3mz
K8Slanparty
K8s LAN Party
Kubernetes LAN Party - by Wiz
How we built an AI-Powered Multi Terrain Hacking Robot
https://ift.tt/svflazq
Submitted March 12, 2024 at 07:18AM by berylliumsec
via reddit https://ift.tt/tvdmJr4
https://ift.tt/svflazq
Submitted March 12, 2024 at 07:18AM by berylliumsec
via reddit https://ift.tt/tvdmJr4
Beryllium
How We Built an AI-powered Multi-terrain Hacking Robot — Beryllium
Meet Asteroid - an AI-powered, multi-terrain hacking robot designed to conduct cybersecurity missions in challenging environments where human involvement is either unfeasible or hazardous.
AI Powered Sensitive Information Detection
https://ift.tt/CK8p6NA
Submitted March 12, 2024 at 04:21PM by Civil_Alternative410
via reddit https://ift.tt/gsOym9K
https://ift.tt/CK8p6NA
Submitted March 12, 2024 at 04:21PM by Civil_Alternative410
via reddit https://ift.tt/gsOym9K
GitHub
GitHub - berylliumsec/eclipse: AI Powered Sensitive Information Detection
AI Powered Sensitive Information Detection. Contribute to berylliumsec/eclipse development by creating an account on GitHub.
Malware Pulse - Proactive command and control server discovery hub
https://malpulse.com/
Submitted March 12, 2024 at 06:17PM by mamudogurban
via reddit https://ift.tt/3lxHVrj
https://malpulse.com/
Submitted March 12, 2024 at 06:17PM by mamudogurban
via reddit https://ift.tt/3lxHVrj
Patch Tuesday Diffing: CVE-2024–20696 — Windows Libarchive RCE
https://ift.tt/YZWSClf
Submitted March 12, 2024 at 07:44PM by onlinereadme
via reddit https://ift.tt/NJb0URS
https://ift.tt/YZWSClf
Submitted March 12, 2024 at 07:44PM by onlinereadme
via reddit https://ift.tt/NJb0URS
Medium
Patch Tuesday Diffing: CVE-2024–20696 — Windows Libarchive RCE
TL;DR This post will teach you how to patch diff CVE-2024–20696 (and indirectly CVE-2024–20697) from the January 2024 Patch Tuesday.