Nuking Weak Shellcode Hacker Hashes For Fun And Profit!
https://ift.tt/zV1R4E0
Submitted May 23, 2024 at 08:17PM by operat1ve
via reddit https://ift.tt/vtNFiy3
https://ift.tt/zV1R4E0
Submitted May 23, 2024 at 08:17PM by operat1ve
via reddit https://ift.tt/vtNFiy3
karma-x.io
Nuking Weak Shellcode Hacker Hashes For Fun And Profit
How to achieve eternal persistence in an Active Directory environment - Part 1
https://ift.tt/k59xmPg
Submitted May 24, 2024 at 02:38AM by darronofsky
via reddit https://ift.tt/a2wOUCx
https://ift.tt/k59xmPg
Submitted May 24, 2024 at 02:38AM by darronofsky
via reddit https://ift.tt/a2wOUCx
Huntandhackett
How to achieve eternal persistence in an Active Directory environment - Part 1
Explore passive techniques for surviving remediation and achieving eternal persistence in an AD environment.
Malicious PyPI packages targeting highly specific MacOS machines
https://ift.tt/WYpMSHd
Submitted May 24, 2024 at 01:56PM by thorn42
via reddit https://ift.tt/6MOYPkq
https://ift.tt/WYpMSHd
Submitted May 24, 2024 at 01:56PM by thorn42
via reddit https://ift.tt/6MOYPkq
Datadoghq
Malicious PyPI packages targeting highly specific MacOS machines
In this post, we analyze a cluster of malicious PyPI packages targeting specific MacOS machines.
[Must Read] Analysis of CVE-2023-39143 – PaperCut RCE
https://ift.tt/Al75hrW
Submitted May 24, 2024 at 06:41PM by SL7reach
via reddit https://ift.tt/upJAgYw
https://ift.tt/Al75hrW
Submitted May 24, 2024 at 06:41PM by SL7reach
via reddit https://ift.tt/upJAgYw
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Analysis of CVE-2023-39143 – PaperCut RCE
Overview CVE-2023-39143 is a path traversal vulnerability found in Papercut MF/NG, a print management solution. This particular CVE only affects Windows installations prior to version 22.1.3. With...
Entra ID service principals in business email compromise schemes
https://ift.tt/mweDagX
Submitted May 25, 2024 at 12:46AM by tvjust
via reddit https://ift.tt/iPSgyue
https://ift.tt/mweDagX
Submitted May 25, 2024 at 12:46AM by tvjust
via reddit https://ift.tt/iPSgyue
Red Canary
Entra ID service principals in business email compromise schemes | Red Canary
The service principals in Microsoft's Entra ID can be a boon for business email compromise, but they’re also a key log source for detection.
iGoat iOS Application - Challenge Solves Blog Post
https://ift.tt/c5hmnPy
Submitted May 25, 2024 at 09:27PM by lightgrains
via reddit https://ift.tt/p6I8Mig
https://ift.tt/c5hmnPy
Submitted May 25, 2024 at 09:27PM by lightgrains
via reddit https://ift.tt/p6I8Mig
LangChain JS Arbitrary File Read Vulnerability
https://ift.tt/kvD3ysb
Submitted May 26, 2024 at 05:03AM by Standard_Arm_4476
via reddit https://ift.tt/jFKNzqn
https://ift.tt/kvD3ysb
Submitted May 26, 2024 at 05:03AM by Standard_Arm_4476
via reddit https://ift.tt/jFKNzqn
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
https://ift.tt/Oj51ivm
Submitted May 27, 2024 at 02:21PM by cfambionics
via reddit https://ift.tt/IWUzXyx
https://ift.tt/Oj51ivm
Submitted May 27, 2024 at 02:21PM by cfambionics
via reddit https://ift.tt/IWUzXyx
Ambionics
Iconv, set the charset to RCE: Exploiting the glibc to hack the PHP engine (part 1)
A few months ago, I stumbled upon a 24 years old buffer overflow in the glibc, the base library for linux programs. Despite being reachable in multiple well-known libraries or executables, it proved rarely exploitable — while it didn't provide much leeway…
VS Code Extension: Convert Diagrams to Text Format | Better Code Documentation
https://ift.tt/cBTiXCU
Submitted May 27, 2024 at 06:53PM by mknined
via reddit https://ift.tt/KJBHZGy
https://ift.tt/cBTiXCU
Submitted May 27, 2024 at 06:53PM by mknined
via reddit https://ift.tt/KJBHZGy
Visualstudio
TexEtch - Visual Studio Marketplace
Extension for Visual Studio Code - Add beautiful diagrams drawn on draw.io to your code
Diagram to Text
Diagram to Text
Exploiting V8 at openECSC: A beginner-friendly journey from a memory corruption to a browser pwn
https://ift.tt/F0IAVEn
Submitted May 27, 2024 at 11:06PM by rebane2001
via reddit https://ift.tt/pw1g63s
https://ift.tt/F0IAVEn
Submitted May 27, 2024 at 11:06PM by rebane2001
via reddit https://ift.tt/pw1g63s
lyra's epic blog
Exploiting V8 at openECSC
A beginner-friendly journey from a memory corruption to a browser pwn.
Part 2: Threat Detection Engineering and Incident Response with AuditD and Sentinel — Combine Events by ID with Laurel before sending to Sentinel as JSON.
https://ift.tt/mEkjYCp
Submitted May 27, 2024 at 10:38PM by thattechkitten
via reddit https://ift.tt/FKnjrmC
https://ift.tt/mEkjYCp
Submitted May 27, 2024 at 10:38PM by thattechkitten
via reddit https://ift.tt/FKnjrmC
Medium
Part 2: Threat Detection Engineering and Incident Response with AuditD and Sentinel — Combine…
NOTE: This article is based off the following:
ManageEngine ADAudit - Reverse engineering Windows RPC to find CVEs - part 1 / RPC
https://ift.tt/l8jhnvx
Submitted May 28, 2024 at 12:08PM by ivxrehc
via reddit https://ift.tt/Yaj1cIz
https://ift.tt/l8jhnvx
Submitted May 28, 2024 at 12:08PM by ivxrehc
via reddit https://ift.tt/Yaj1cIz
Shelltrail
ManageEngine ADAudit - Reverse engineering Windows RPC to find CVEs - part 1 / RPC | Shelltrail
Follow along a journey to find vulnerabilities in the RPC functionaliy of ManageEngine ADAudit
Multiple vulnerabilities in Eclipse ThreadX
https://ift.tt/ycqIHV1
Submitted May 28, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/4lxKWd5
https://ift.tt/ycqIHV1
Submitted May 28, 2024 at 03:26PM by 0xdea
via reddit https://ift.tt/4lxKWd5
HN Security
Multiple vulnerabilities in Eclipse ThreadX - HN Security
Coordinated disclosure writeup about multiple vulnerabilities in Eclipse ThreadX (CVE-2024-2214, CVE-2024-2212, CVE-2024-2452).
CVE-2024-23108: Back Again! Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive, IOCs, and Exploit
https://ift.tt/NkrsvtD
Submitted May 28, 2024 at 06:05PM by scopedsecurity
via reddit https://ift.tt/xeLgMof
https://ift.tt/NkrsvtD
Submitted May 28, 2024 at 06:05PM by scopedsecurity
via reddit https://ift.tt/xeLgMof
Horizon3.ai
CVE-2024-23108: Fortinet FortiSIEM 2nd Order Command Injection Deep-Dive
CVE-2024-23108 Fortinet FortiSIEM Command Injection Deep-Dive and Indicators of Compromise. This blog details a command injection vulnerability which allows an unauthenticated attacker to access the FortiSIEM server as root to execute arbitrary commands.
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2
https://ift.tt/bEa3Mdo
Submitted May 28, 2024 at 06:30PM by onlinereadme
via reddit https://ift.tt/UScMLdI
https://ift.tt/bEa3Mdo
Submitted May 28, 2024 at 06:30PM by onlinereadme
via reddit https://ift.tt/UScMLdI
Medium
Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2
This post, another lesson from the “Everyday Ghidra” series, walks through the process of configuring Ghidra to automatically download…
Non-Production Endpoints as an Attack Surface in AWS | Datadog Security Labs
https://ift.tt/L2guky9
Submitted May 28, 2024 at 08:40PM by RedTermSession
via reddit https://ift.tt/JBOI9SP
https://ift.tt/L2guky9
Submitted May 28, 2024 at 08:40PM by RedTermSession
via reddit https://ift.tt/JBOI9SP
Datadoghq
Non-Production Endpoints as an Attack Surface in AWS
Public disclose of CloudTrail bypass vulnerabilities we've found in AWS along with our research on using non-production API endpoints for defense evasion.
HardwareBreakPoint + Ekko ROP modified to hold stack arguments + Kernel Objects Enumeration for some honest hiding in memory.
https://ift.tt/EwZRp6P
Submitted May 29, 2024 at 11:07AM by oldboy21
via reddit https://ift.tt/PAJsGSL
https://ift.tt/EwZRp6P
Submitted May 29, 2024 at 11:07AM by oldboy21
via reddit https://ift.tt/PAJsGSL
oldboy21.github.io
SWAPPALA: Why Change When You Can Hide?
Hello everyone! It’s been a while, many things happening and not much time for coding. Hard times. Nonetheless I had little time frames for playing with some stuff I would define cool enough to write some lines about it. Last time we talked about Indirect…
CVE-2024-22058 Ivanti Landesk LPE - Mantodea Security
https://ift.tt/k3nhb07
Submitted May 29, 2024 at 07:09PM by flxflndy
via reddit https://ift.tt/QwFdMX9
https://ift.tt/k3nhb07
Submitted May 29, 2024 at 07:09PM by flxflndy
via reddit https://ift.tt/QwFdMX9
Mantodea Security
CVE-2024-22058 Ivanti Landesk LPE - Mantodea Security
In this post we describe a vulnerability we discovered in the Ivanti LanDesk software and how it can be exploited to achieve local privilege escalation via arbitrary code execution.
Ivanti disclosed the vulnerability in their advisory on May 28th 2024…
DDoS-as-a-Service: The Rebirth Botnet
https://ift.tt/M7U8qAI
Submitted May 29, 2024 at 06:41PM by Hallow_Rose
via reddit https://ift.tt/3uJQNAY
https://ift.tt/M7U8qAI
Submitted May 29, 2024 at 06:41PM by Hallow_Rose
via reddit https://ift.tt/3uJQNAY
Sysdig
DDoS-as-a-Service: The Rebirth Botnet | Sysdig
In March 2024, the Sysdig Threat Research Team. discovered Rebirth - an increasingly popular DDoS-as-a-Service botnet.
Post-Exploiting an F5 Big-IP: root, and now what?
https://ift.tt/GvVt0px
Submitted May 29, 2024 at 04:30PM by AlmondOffSec
via reddit https://ift.tt/r8zg75a
https://ift.tt/GvVt0px
Submitted May 29, 2024 at 04:30PM by AlmondOffSec
via reddit https://ift.tt/r8zg75a
XZ Utils 5.6.2 (stable), 5.4.7 (old stable), 5.2.13 (old old stable) have been released
https://ift.tt/b8sCUrX
Submitted May 30, 2024 at 01:31AM by Neustradamus
via reddit https://ift.tt/KYlci6a
https://ift.tt/b8sCUrX
Submitted May 30, 2024 at 01:31AM by Neustradamus
via reddit https://ift.tt/KYlci6a