Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects
https://ift.tt/woBcxsT
Submitted March 15, 2024 at 11:11PM by fproulx
via reddit https://ift.tt/ExpcsDh
https://ift.tt/woBcxsT
Submitted March 15, 2024 at 11:11PM by fproulx
via reddit https://ift.tt/ExpcsDh
boostsecurity.io
Opening Pandora’s box - Supply Chain Insider Threats in Open Source projects
Granting "Write" access in an Open Source repo is a high-stakes decision. We discuss risks of insider threats, using a responsible disclosure for the AWS Karpenter project. Strict safeguards are essential, especially for release artifacts. Also GitHub lacks…
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
https://ift.tt/VNfhCqM
Submitted March 17, 2024 at 06:27AM by Mempodipper
via reddit https://ift.tt/rgUfICV
https://ift.tt/VNfhCqM
Submitted March 17, 2024 at 06:27AM by Mempodipper
via reddit https://ift.tt/rgUfICV
www.assetnote.io
Two Bytes is Plenty: FortiGate RCE with CVE-2024-21762
Early this February, Fortinet released an advisory for an "out-of-bounds write vulnerability" that could lead to remote code execution. The issue affected the SSL VPN component of their FortiGate network appliance and was potentially already being exploited…
De4py Python RE Toolkit: v1.0.8 has been released
https://ift.tt/kDvb3uw
Submitted March 17, 2024 at 06:26PM by AhmedMinegames
via reddit https://ift.tt/RLzsHNw
https://ift.tt/kDvb3uw
Submitted March 17, 2024 at 06:26PM by AhmedMinegames
via reddit https://ift.tt/RLzsHNw
GitHub
Release v1.0.8 · Fadi002/de4py
Features added:
* Error reporting
* Stealth windows noscripts mode
* Stealth injection mode
* PYC dumper runtime
* Added deobfuscator for development tools obfuscator
* Fixed some bugs
* Added installer
* Error reporting
* Stealth windows noscripts mode
* Stealth injection mode
* PYC dumper runtime
* Added deobfuscator for development tools obfuscator
* Fixed some bugs
* Added installer
Analyzing Pipedream / Incontroller with MITRE/STIX
https://ift.tt/VgvWE5D
Submitted March 17, 2024 at 07:45PM by DiabloHorn
via reddit https://ift.tt/nXqu6GZ
https://ift.tt/VgvWE5D
Submitted March 17, 2024 at 07:45PM by DiabloHorn
via reddit https://ift.tt/nXqu6GZ
DiabloHorn
Analyzing Pipedream / Incontroller with MITRE/STIX
This blog post is intended to further practice with MITRE data as well as understand some OT attack techniques implemented by OT malware. For this we are going to look at Pipedream (researched by D…
jsmug - A PoC code for smuggling arbitrary files using insignificant bytes through JSON Smuggling
https://ift.tt/ktDsgTz
Submitted March 18, 2024 at 03:54AM by xscorp7
via reddit https://ift.tt/I1vu7XF
https://ift.tt/ktDsgTz
Submitted March 18, 2024 at 03:54AM by xscorp7
via reddit https://ift.tt/I1vu7XF
GitHub
GitHub - xscorp/jsmug: A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON
A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON - xscorp/jsmug
Blind SQL Injection in update query for OSWE - PostgreSQL Database
https://ift.tt/LF9D0QC
Submitted March 18, 2024 at 10:25AM by 1046ica
via reddit https://ift.tt/4lygnfv
https://ift.tt/LF9D0QC
Submitted March 18, 2024 at 10:25AM by 1046ica
via reddit https://ift.tt/4lygnfv
www.mannulinux.org
Blind SQL Injection in update query for OSWE - PostgreSQL Database
Learn Basic Concepts of Linux. Best site to learn Linux from beginner to Advanced.
Return Oriented Programming Buffer Overflow Exploitation Part 1 - In Lab Exercise
https://ift.tt/QBA1Igm
Submitted March 18, 2024 at 11:59AM by Accomplished-Mud1210
via reddit https://ift.tt/F6Enfw7
https://ift.tt/QBA1Igm
Submitted March 18, 2024 at 11:59AM by Accomplished-Mud1210
via reddit https://ift.tt/F6Enfw7
RingBuffer's Blog
Return Oriented Programming – Buffer Overflow Part 1 – RingBuffer's Blog
Return Oriented Programming Buffer Overflow Attack Demonstration
Social Minefield - a higher stakes game of Minesweeper using Clickjacking
https://ift.tt/LYECBOf
Submitted March 18, 2024 at 04:42PM by pnappa
via reddit https://ift.tt/rHUepat
https://ift.tt/LYECBOf
Submitted March 18, 2024 at 04:42PM by pnappa
via reddit https://ift.tt/rHUepat
Gaining kernel code execution on an MTE-enabled Pixel 8
https://ift.tt/YkB3169
Submitted March 19, 2024 at 09:32AM by netsec_burn
via reddit https://ift.tt/xDoGXBa
https://ift.tt/YkB3169
Submitted March 19, 2024 at 09:32AM by netsec_burn
via reddit https://ift.tt/xDoGXBa
The GitHub Blog
Gaining kernel code execution on an MTE-enabled Pixel 8
In this post, I’ll look at CVE-2023-6241, a vulnerability in the Arm Mali GPU that allows a malicious app to gain arbitrary kernel code execution and root on an Android phone. I’ll show how this vulnerability can be exploited even when Memory Tagging Extension…
Bypassing USBGuard on Linux
https://ift.tt/Yclyptn
Submitted March 19, 2024 at 12:04PM by MysteriousHotel3017
via reddit https://ift.tt/CRISBc8
https://ift.tt/Yclyptn
Submitted March 19, 2024 at 12:04PM by MysteriousHotel3017
via reddit https://ift.tt/CRISBc8
Pulse Security
Bypassing USBGuard on Linux
Configuring USBGuard without explicitly specifying vendor and product IDs allows an attacker to bypass some USB authorisation policies on Linux.
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
https://ift.tt/grTUAEK
Submitted March 19, 2024 at 11:39AM by oil_sardine
via reddit https://ift.tt/z0FBJbr
https://ift.tt/grTUAEK
Submitted March 19, 2024 at 11:39AM by oil_sardine
via reddit https://ift.tt/z0FBJbr
Home
Exploit Development: No Code Execution? No Problem! Living The Age of VBS, HVCI, and Kernel CFG
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
Microsoft AITM honeytoken: warning the victims
https://ift.tt/2p8dzwv
Submitted March 19, 2024 at 04:58PM by wez32
via reddit https://ift.tt/V5Ais0d
https://ift.tt/2p8dzwv
Submitted March 19, 2024 at 04:58PM by wez32
via reddit https://ift.tt/V5Ais0d
Zolder - Applied Security Research
Microsoft AITM honeytoken: warning the victims | Zolder - Applied Security Research
In January we launched new functionality for Attic to detect AiTM attacks targeting the Microsoft 365 tenant of customers. Using the platform of didsomeoneclone.me and custom...
How Rogue ISPs Tamper With Geofeeds
https://ift.tt/HzQTBM2
Submitted March 19, 2024 at 07:25PM by OwnPreparation3424
via reddit https://ift.tt/JZyU7z5
https://ift.tt/HzQTBM2
Submitted March 19, 2024 at 07:25PM by OwnPreparation3424
via reddit https://ift.tt/JZyU7z5
Medium
How Rogue ISPs Tamper With Geofeeds
Geofeeds allow ISPs to publish information on the physical location of their networks. But what if a rogue ISP puts false information in…
Weaponizing Windows Thread Pool APIs: Proxying DLL Loads Using I/O Completion Callbacks
https://ift.tt/NYlqyPD
Submitted March 19, 2024 at 06:54PM by fin3ss3g0d
via reddit https://ift.tt/kyL5icz
https://ift.tt/NYlqyPD
Submitted March 19, 2024 at 06:54PM by fin3ss3g0d
via reddit https://ift.tt/kyL5icz
From Error to Entry: Cracking the Code of Password-Spraying Tools - Discovery around the handling of AADSTS50079 error message in Password spraying tools. This error has changed over the years from Microsoft and does not longer mean that MFA is in use, it actually means that MFA must be onboarded
https://ift.tt/iGaSLgB
Submitted March 19, 2024 at 08:38PM by oddvarmoe
via reddit https://ift.tt/y9md8qf
https://ift.tt/iGaSLgB
Submitted March 19, 2024 at 08:38PM by oddvarmoe
via reddit https://ift.tt/y9md8qf
TrustedSec
From Error to Entry: Cracking the Code of Password-Spraying Tools
Discover how to effectively onboard MFA for Office 365 users with MSOLSpray, and unlock remote access with our expert guide.
From Error to Entry: Cracking the Code of Password-Spraying Tools
https://ift.tt/iGaSLgB
Submitted March 19, 2024 at 10:35PM by oddvarmoe
via reddit https://ift.tt/ovd86tj
https://ift.tt/iGaSLgB
Submitted March 19, 2024 at 10:35PM by oddvarmoe
via reddit https://ift.tt/ovd86tj
TrustedSec
From Error to Entry: Cracking the Code of Password-Spraying Tools
Discover how to effectively onboard MFA for Office 365 users with MSOLSpray, and unlock remote access with our expert guide.
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster
https://ift.tt/oY0Agz9
Submitted March 19, 2024 at 10:13PM by hackers_and_builders
via reddit https://ift.tt/W03rbsD
https://ift.tt/oY0Agz9
Submitted March 19, 2024 at 10:13PM by hackers_and_builders
via reddit https://ift.tt/W03rbsD
Rhino Security Labs
CVE-2024-1212: Unauthenticated Command Injection In Progress Kemp LoadMaster
CVE-2024-1212 is an unauthenticated command injection found in Progress Kemp LoadMaster load balancer's administrator web interface by Rhino Security Labs.
New Short Episode Podcast ft. Insane Stories from Real Penetration Tests
https://www.youtube.com/watch?v=85tMZ_8m7wc&list=PLRQLxipnETnkricBrUexOIM6IUqApdVCe&index=2
Submitted March 19, 2024 at 10:43PM by hpo1n7
via reddit https://ift.tt/ymhYZcl
https://www.youtube.com/watch?v=85tMZ_8m7wc&list=PLRQLxipnETnkricBrUexOIM6IUqApdVCe&index=2
Submitted March 19, 2024 at 10:43PM by hpo1n7
via reddit https://ift.tt/ymhYZcl
YouTube
Episode 1: "Then we got arrested" ft. Matt Barnett
Zac Davis hosts War Stories, a podcast featuring stories from real life penetration testers. Zac covers their background, favorite tools, and stories that define their career.
Sponsored by Cyber Coffee. Real hackers need real caffeine.
www.sevnx.com/shop
Sponsored by Cyber Coffee. Real hackers need real caffeine.
www.sevnx.com/shop
How to Emulate a Ransomware Attack
https://ift.tt/c5IZoE1
Submitted March 20, 2024 at 03:21AM by pracsec
via reddit https://ift.tt/gC4OcUR
https://ift.tt/c5IZoE1
Submitted March 20, 2024 at 03:21AM by pracsec
via reddit https://ift.tt/gC4OcUR
Practical Security Analytics LLC
How to Emulate a Ransomware Attack
Overview Ransomware is here to stay and cyber security professionals need to be trained to prevent, detect, respond, and recover from ransomeware attacks. So, how do we do that in an ethical and re…
Open Source - Terminal based AI Powered Ethical Hacking Assistant.
https://ift.tt/qGVhexY
Submitted March 20, 2024 at 03:56AM by Civil_Alternative410
via reddit https://ift.tt/8wHlTap
https://ift.tt/qGVhexY
Submitted March 20, 2024 at 03:56AM by Civil_Alternative410
via reddit https://ift.tt/8wHlTap
GitHub
GitHub - berylliumsec/neutron: AI Powered Terminal Based Ethical Hacking Assistant
AI Powered Terminal Based Ethical Hacking Assistant - berylliumsec/neutron
Honeypots vs Canary Infra : Bringing Honeypots towards general adoption
https://ift.tt/WrbUz5x
Submitted March 20, 2024 at 06:23PM by tracebit
via reddit https://ift.tt/xUNbAoV
https://ift.tt/WrbUz5x
Submitted March 20, 2024 at 06:23PM by tracebit
via reddit https://ift.tt/xUNbAoV
Tracebit
Canary Infra: Bringing Honeypots towards general adoption | Tracebit
Laying out why we think 'Canary Infra' is a game changer for honeypots and intrusion detection.