Check Point - Wrong Check Point (CVE-2024-24919) - watchTowr Labs
https://ift.tt/RT6tHQl
Submitted May 30, 2024 at 07:36AM by dx7r__
via reddit https://ift.tt/GCbYnST
https://ift.tt/RT6tHQl
Submitted May 30, 2024 at 07:36AM by dx7r__
via reddit https://ift.tt/GCbYnST
watchTowr Labs
Check Point - Wrong Check Point (CVE-2024-24919)
Gather round, gather round - it’s time for another blogpost tearing open an SSLVPN appliance and laying bare a recent in-the-wild exploited bug. This time, it is Check Point who is the focus of our penetrative gaze.
Check Point, for those unaware, is the…
Check Point, for those unaware, is the…
How to achieve passive persistence - part 2: outliving the krbtgt reset
https://ift.tt/ZU0EVDf
Submitted May 30, 2024 at 01:49PM by One-Assistance-8552
via reddit https://ift.tt/c7UJHID
https://ift.tt/ZU0EVDf
Submitted May 30, 2024 at 01:49PM by One-Assistance-8552
via reddit https://ift.tt/c7UJHID
Huntandhackett
How to Achieve Eternal Persistence Part 2: Outliving the Krbtgt Password Reset
In this blog, we welcome the return of the LM hash - which is still in use in specific scenarios even if it is explicitly disabled! - and demonstrate how to survive the reset of the krbtgt service account. Our goal is to learn whether it is possible to achieve…
Upgrade Citrix Workspace app for MaC to Mitigate CVE-2024-5027..
https://ift.tt/8ru5v6s
Submitted May 30, 2024 at 07:32PM by patchnow24x7
via reddit https://ift.tt/SX7T2Nw
https://ift.tt/8ru5v6s
Submitted May 30, 2024 at 07:32PM by patchnow24x7
via reddit https://ift.tt/SX7T2Nw
Things you wish you didn't need to know about S3
https://ift.tt/R51jVaX
Submitted May 31, 2024 at 08:55AM by dagrz-cloudsec
via reddit https://ift.tt/6dbH3TG
https://ift.tt/R51jVaX
Submitted May 31, 2024 at 08:55AM by dagrz-cloudsec
via reddit https://ift.tt/6dbH3TG
Plerion
Things you wish you didn't need to know about S3
S3 is weirder than you think. Make sure you know all the quirks before they turn into vulnerabilities in your AWS infrastructure.
Snowflake, Cloud Storage Giant, Suffers Massive Breach: Hacker Confirms to Hudson Rock Access Through Infostealer Infection
https://ift.tt/PWGOoZI
Submitted May 31, 2024 at 08:15PM by Malwarebeasts
via reddit https://ift.tt/HTQ80tL
https://ift.tt/PWGOoZI
Submitted May 31, 2024 at 08:15PM by Malwarebeasts
via reddit https://ift.tt/HTQ80tL
Hudson Rock
Hudson Rock - Infostealer Intelligence Solutions
Powered by Hudson Rock's continuously augmented cybercrime database, composed of millions of machines compromised by Infostealers in global malware spreading campaigns.
Hacks and Propaganda: Meet the Two Brothers Bringing Russia’s Digital War to Europe
https://ift.tt/QpimYhs
Submitted May 31, 2024 at 09:08PM by Substantial-Bag202
via reddit https://ift.tt/VWqoirS
https://ift.tt/QpimYhs
Submitted May 31, 2024 at 09:08PM by Substantial-Bag202
via reddit https://ift.tt/VWqoirS
CORRECTIV
Hacks and Propaganda: Meet the Two Brothers Bringing Russia’s Cyber War to Europe
Two Moldovan brothers’ companies, Stark Industries Solutions and PQ Hosting, provide technology for Russian propaganda and hacking attacks, a CORRECTIV investigation shows.
Hunting bugs in Nginx JavaScript engine (njs) with with fuzzing and CodeQL
https://ift.tt/zJoxeyl
Submitted May 31, 2024 at 10:22PM by pwntheplanet
via reddit https://ift.tt/KScbOfW
https://ift.tt/zJoxeyl
Submitted May 31, 2024 at 10:22PM by pwntheplanet
via reddit https://ift.tt/KScbOfW
State of WiFi Security in 2024
https://ift.tt/zH0nypj
Submitted June 01, 2024 at 09:23PM by Material-Tonight8924
via reddit https://ift.tt/c1O0hIt
https://ift.tt/zH0nypj
Submitted June 01, 2024 at 09:23PM by Material-Tonight8924
via reddit https://ift.tt/c1O0hIt
Medium
State of WiFi Security in 2024
Article describing various exploits in the IEEE802.11 WiFi protocol.
Hands-On Kernel & User-Mode Hooking: From Theory to Working Code
https://ift.tt/1ZP87sc
Submitted June 01, 2024 at 11:14PM by Gumbo72
via reddit https://ift.tt/TiZVEly
https://ift.tt/1ZP87sc
Submitted June 01, 2024 at 11:14PM by Gumbo72
via reddit https://ift.tt/TiZVEly
GitHub
GitHub - carlos-al/user-kernel-syscall-hook
Contribute to carlos-al/user-kernel-syscall-hook development by creating an account on GitHub.
Release of SnoopGod Linux 24.04.1 - The Ethical Hacker's Arsenal | SnoopGod
https://ift.tt/zxjX78r
Submitted June 02, 2024 at 08:24PM by snoopgodlinux
via reddit https://ift.tt/I78ytAF
https://ift.tt/zxjX78r
Submitted June 02, 2024 at 08:24PM by snoopgodlinux
via reddit https://ift.tt/I78ytAF
Encryption At Rest: Whose Threat Model Is It Anyway?
https://ift.tt/aU5F8Hk
Submitted June 03, 2024 at 09:13AM by sarciszewski
via reddit https://ift.tt/KTWUxqk
https://ift.tt/aU5F8Hk
Submitted June 03, 2024 at 09:13AM by sarciszewski
via reddit https://ift.tt/KTWUxqk
Semantically Secure
Encryption At Rest: Whose Threat Model Is It Anyway?
Head’s up: This is a blog post about applied cryptography, with a focus on web and cloud applications that encrypt data at rest in a database or filesystem. While the lessons can be broadly a…
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
https://ift.tt/YtOvjwR
Submitted June 03, 2024 at 11:05AM by samwcurry
via reddit https://ift.tt/fF9Ojkv
https://ift.tt/YtOvjwR
Submitted June 03, 2024 at 11:05AM by samwcurry
via reddit https://ift.tt/fF9Ojkv
samcurry.net
Hacking Millions of Modems (and Investigating Who Hacked My Modem)
Two years ago, something very strange happened to me while working from my home network. I was exploiting a blind XXE vulnerability that required an external HTTP server to smuggle out files, so I spun up an AWS box and ran a simple Python webserver to receive…
GitHub Security Guide: How to Defend Your Organization and Repositories from Supply Chain Attacks - Rezonate
https://ift.tt/9gGh5K2
Submitted June 03, 2024 at 05:03PM by Or1rez
via reddit https://ift.tt/JtmN8jR
https://ift.tt/9gGh5K2
Submitted June 03, 2024 at 05:03PM by Or1rez
via reddit https://ift.tt/JtmN8jR
Silverfort
Okta’s GitHub Breach: Insights and Recommendations
Silverfort can help Okta customers protect themselves in the wake of the recent breach that resulted in theft of the company’s source code.
Hackers use GitHub profiles to pose as 1Password
https://ift.tt/kEPTX9j
Submitted June 03, 2024 at 11:00PM by moonlock_security
via reddit https://ift.tt/yzAmYOX
https://ift.tt/kEPTX9j
Submitted June 03, 2024 at 11:00PM by moonlock_security
via reddit https://ift.tt/yzAmYOX
Moonlock
Hackers use GitHub profiles to pose as 1Password
Here's what can be done to address it.
Molding lies into reality || Exploiting CVE-2024-4358
https://ift.tt/mD2owiK
Submitted June 04, 2024 at 08:39AM by juken
via reddit https://ift.tt/jT3ZadA
https://ift.tt/mD2owiK
Submitted June 04, 2024 at 08:39AM by juken
via reddit https://ift.tt/jT3ZadA
Summoning Team
Molding lies into reality || Exploiting CVE-2024-4358
Discovering a zero-day authentication bypass and chaining a .NET deserialization to achieve pre-auth RCE on Progress Report Server
Attacking NIST SP 800-108 (Loss of Key Control Security with CMAC in Counter Mode)
https://ift.tt/rwOBasK
Submitted June 04, 2024 at 01:27PM by sarciszewski
via reddit https://ift.tt/Y3xWmJZ
https://ift.tt/rwOBasK
Submitted June 04, 2024 at 01:27PM by sarciszewski
via reddit https://ift.tt/Y3xWmJZ
Semantically Secure
Attacking NIST SP 800-108
If you’ve never heard of NIST SP 800-108 before, or NIST Special Publications in general, here’s a quick primer: Special Publications are a type of publication issued by NIST. Specifica…
Deep diving into F5 Secure Vault
https://ift.tt/moZUaEA
Submitted June 04, 2024 at 03:36PM by AlmondOffSec
via reddit https://ift.tt/iGEJbnD
https://ift.tt/moZUaEA
Submitted June 04, 2024 at 03:36PM by AlmondOffSec
via reddit https://ift.tt/iGEJbnD
Identifying Container Image Vulnerabilities with Docker Scout
https://ift.tt/UhDG47S
Submitted June 04, 2024 at 03:31PM by pliutau
via reddit https://ift.tt/MAqg9BR
https://ift.tt/UhDG47S
Submitted June 04, 2024 at 03:31PM by pliutau
via reddit https://ift.tt/MAqg9BR
packagemain.tech
Identifying Container Image Vulnerabilities with Docker Scout
A guide on how to maintain a more secure containerized software.
PHISHING LIKE A PRO: A GUIDE FOR PENTESTERS TO ADD SPF, DMARC, DKIM AND MX RECORDS TO EVILGINX
https://ift.tt/utx2CpE
Submitted June 04, 2024 at 03:11PM by adrian_rt
via reddit https://ift.tt/r6bxQXu
https://ift.tt/utx2CpE
Submitted June 04, 2024 at 03:11PM by adrian_rt
via reddit https://ift.tt/r6bxQXu
Cyber Security Services - London
Phishing Like a Pro: A Guide for Pentesters to Add SPF, DMARC, DKIM and MX records to Evilginx
Master phishing: Add SPF, DMARC, DKIM, and MX records to Evilginx to boost your sender's reputation and ensure email deliverability.
CVE-2023-48788: Revisiting Fortinet FortiClient EMS to Exploit 7.2.X
https://ift.tt/oxNJ0Ug
Submitted June 04, 2024 at 05:46PM by scopedsecurity
via reddit https://ift.tt/C3u84jf
https://ift.tt/oxNJ0Ug
Submitted June 04, 2024 at 05:46PM by scopedsecurity
via reddit https://ift.tt/C3u84jf
Horizon3.ai
CVE-2023-48788: Revisiting Fortinet FortiClient EMS to Exploit 7.2.X
Revisiting CVE-2023-48788, a SQL injection in Fortinet FortiClient EMS Server. This blog details bypassing several restrictions to achieve arbitrary command execution as SYSTEM.
Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938
https://ift.tt/VnT45Iy
Submitted June 04, 2024 at 05:36PM by poltess0
via reddit https://ift.tt/ZDFw5r3
https://ift.tt/VnT45Iy
Submitted June 04, 2024 at 05:36PM by poltess0
via reddit https://ift.tt/ZDFw5r3
Withgoogle
Attacking Android Binder: Analysis and Exploitation of CVE-2023-20938 - Android Offensive Security Blog
At OffensiveCon 2024, the Android Red Team gave a presentation (slides) on finding and exploiting CVE-2023-20938, a use-after-free vulnerability in the Android Binder device driver. This post will provide technical details about this vulnerability and how…