Threat modeling an IdP compromise, and hardening (Teleport specific). Full tech paper.
https://ift.tt/mu3c8hk
Submitted June 21, 2024 at 01:58PM by nibblesec
via reddit https://ift.tt/jmn530D
https://ift.tt/mu3c8hk
Submitted June 21, 2024 at 01:58PM by nibblesec
via reddit https://ift.tt/jmn530D
Analysis of CVE-2024-25065: Apache OFBiz Security bypass
https://ift.tt/k1eKZHn
Submitted June 21, 2024 at 05:14PM by SL7reach
via reddit https://ift.tt/xwaWDpL
https://ift.tt/k1eKZHn
Submitted June 21, 2024 at 05:14PM by SL7reach
via reddit https://ift.tt/xwaWDpL
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Analysis of CVE-2024-25065: Apache OFBiz Security bypass
Introduction CVE-2024-25065 is a vulnerability that exists in Apache OFBiz before version 18.12.12. It is a path traversal vulnerability that allows authentication bypass through the contextPath...
Reverse Engineering and Exploiting Augentix System on Chip Unicorn Binary
https://ift.tt/PEKnOCs
Submitted June 22, 2024 at 03:56AM by somersetrecon
via reddit https://ift.tt/vdXrQ3A
https://ift.tt/PEKnOCs
Submitted June 22, 2024 at 03:56AM by somersetrecon
via reddit https://ift.tt/vdXrQ3A
Somerset Recon
Reverse Engineering The Unicorn — Somerset Recon
While reversing a device, we stumbled across an interesting binary named unicorn . The binary appeared to be a developer utility potentially related to the Augentix SoC SDK. The unicorn binary is only executed when the device is set to developer mode. Fortunately…
Zip Slip meets Artifactory: A Bug Bounty Story
https://ift.tt/hZoDydb
Submitted June 23, 2024 at 04:16PM by eg1x
via reddit https://ift.tt/VxWF5BN
https://ift.tt/hZoDydb
Submitted June 23, 2024 at 04:16PM by eg1x
via reddit https://ift.tt/VxWF5BN
Karmainsecurity
Zip Slip meets Artifactory: A Bug Bounty Story | Karma(In)Security
This is the personal website of Egidio Romano, a very curious guy from Sicily, Italy. He's a computer security enthusiast, particularly addicted to webapp security.
Understanding Protected Management Frames
https://ift.tt/HVhe7py
Submitted June 23, 2024 at 03:48PM by thexerocouk
via reddit https://ift.tt/ILytpcn
https://ift.tt/HVhe7py
Submitted June 23, 2024 at 03:48PM by thexerocouk
via reddit https://ift.tt/ILytpcn
Monitor file system changes using fsmon on Android, Linux, iOS, OS X
https://ift.tt/7HsR65l
Submitted June 24, 2024 at 06:11PM by barakadua131
via reddit https://ift.tt/X0MmBqr
https://ift.tt/7HsR65l
Submitted June 24, 2024 at 06:11PM by barakadua131
via reddit https://ift.tt/X0MmBqr
Mobile Hacker
Monitoring Android file system with fsmon
FileSystem Monitor (fsmon) allows you to monitor file system events at runtime on Linux, OSX, iOS and Android systems. Useful for bug bounty hunters, malware analyst
Crack Faster, Hack Smarter: Custom Hashcat Module for Apache Shiro 1 SHA-512
https://ift.tt/Ht4JkSQ
Submitted June 25, 2024 at 12:30AM by meterpretersession1
via reddit https://ift.tt/C7qG6Kr
https://ift.tt/Ht4JkSQ
Submitted June 25, 2024 at 12:30AM by meterpretersession1
via reddit https://ift.tt/C7qG6Kr
Medium
Crack Faster, Hack Smarter: Custom Hashcat Module for Apache Shiro 1 SHA-512
Custom Hashcat Module for Apache Shiro 1 SHA-512
Two bluetooth vulnerabilities in Windows (write-up: CVE-2023-24871 + CVE-2023-23388)
https://ift.tt/MKNhWbJ
Submitted June 25, 2024 at 12:14AM by goodbyeselene
via reddit https://ift.tt/KbiTlks
https://ift.tt/MKNhWbJ
Submitted June 25, 2024 at 12:14AM by goodbyeselene
via reddit https://ift.tt/KbiTlks
###
Two bluetooth vulnerabilities in Windows
Announcing the Ronin 2.1.0 Open Beta. Ronin is a Free and Open Source Ruby Toolkit for Security Research and Development.
https://ift.tt/4VTENOy
Submitted June 25, 2024 at 09:38AM by postmodern
via reddit https://ift.tt/4ygI1zB
https://ift.tt/4VTENOy
Submitted June 25, 2024 at 09:38AM by postmodern
via reddit https://ift.tt/4ygI1zB
Medusa Reborn: A New Compact Variant Discovered / Cleafy Labs
https://ift.tt/jHJ7oML
Submitted June 25, 2024 at 05:36PM by f3d_0x0
via reddit https://ift.tt/wpQ5ChU
https://ift.tt/jHJ7oML
Submitted June 25, 2024 at 05:36PM by f3d_0x0
via reddit https://ift.tt/wpQ5ChU
Cleafy
Medusa Reborn: A New Compact Variant Discovered | Cleafy Labs
Discover the latest insights from the Cleafy Threat Intelligence team on new fraud campaigns involving the Medusa (TangleBot) banking trojan. Learn about Medusa's sophisticated capabilities, recent updates, and shifts in distribution strategies targeting…
ORM Leak vulnerabilities
https://ift.tt/7EBDf1I
Submitted June 25, 2024 at 06:11PM by albinowax
via reddit https://ift.tt/b3OzsYn
https://ift.tt/7EBDf1I
Submitted June 25, 2024 at 06:11PM by albinowax
via reddit https://ift.tt/b3OzsYn
Elttam
plORMbing your Django ORM - elttam
elttam is a globally recognised, independent information security company, renowned for our advanced technical security assessments.
Reverse engineering eBPF programs
https://ift.tt/1qH6mP7
Submitted June 25, 2024 at 05:52PM by amitschenedel
via reddit https://ift.tt/TDHxECf
https://ift.tt/1qH6mP7
Submitted June 25, 2024 at 05:52PM by amitschenedel
via reddit https://ift.tt/TDHxECf
ARMO
Reverse Engineering eBPF Programs: A Deep Dive
Explore how eBPF technology works by reverse engineering eBPF-based programs. Learn about its internals, benefits, and applications in modern computing
MIPS Emulation with Qiling
https://ift.tt/S8saMdV
Submitted June 25, 2024 at 06:56PM by 0x2e2e2fetc2fpasswd
via reddit https://ift.tt/k29jU53
https://ift.tt/S8saMdV
Submitted June 25, 2024 at 06:56PM by 0x2e2e2fetc2fpasswd
via reddit https://ift.tt/k29jU53
LRQA
Emulation with Qiling
Qiling is an emulation framework that builds upon the Unicorn emulator by providing higher level functionality such as support for dynamic library loading, syscall interception and more. In this Labs post, we look into Qiling and how it can be used to emulate…
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806) - watchTowr Labs
https://ift.tt/MxkyYjf
Submitted June 25, 2024 at 08:44PM by dx7r__
via reddit https://ift.tt/uKFbayH
https://ift.tt/MxkyYjf
Submitted June 25, 2024 at 08:44PM by dx7r__
via reddit https://ift.tt/uKFbayH
watchTowr Labs
Auth. Bypass In (Un)Limited Scenarios - Progress MOVEit Transfer (CVE-2024-5806)
In the early hours of a day in a month in 2024, watchTowr Labs was sent a chat log:
13:37 -!- dav1d_bl41ne [def_not_phalanx@kernel.org] has joined #!hack (irc.efnet.nl)
13:37 -!- dav1d_bl41ne changed the topic of #!hack to: mag1c sh0w
13:37 -!- dav1d_bl41ne [def_not_phalanx@kernel.org] has joined #!hack (irc.efnet.nl)
13:37 -!- dav1d_bl41ne changed the topic of #!hack to: mag1c sh0w
My AWS “Segmentation Test” Methodology for Pentesters v1.0
https://ift.tt/iJWZL6k
Submitted June 26, 2024 at 09:34AM by alt3kx
via reddit https://ift.tt/WJBtpXr
https://ift.tt/iJWZL6k
Submitted June 26, 2024 at 09:34AM by alt3kx
via reddit https://ift.tt/WJBtpXr
Medium
My AWS “Segmentation Test” Methodology for Pentesters v1.0
Why write this?
A Novel DoS Vulnerability affecting WebRTC Media Servers
https://ift.tt/3KVJrFW
Submitted June 26, 2024 at 11:14AM by EnableSecurity
via reddit https://ift.tt/7jZoHT0
https://ift.tt/3KVJrFW
Submitted June 26, 2024 at 11:14AM by EnableSecurity
via reddit https://ift.tt/7jZoHT0
Enablesecurity
A Novel DoS Vulnerability affecting WebRTC Media Servers
This blog post details an application denial-of-service (DoS) vulnerability in WebRTC media servers handling DTLS-SRTP. Exploitation, detection and mitigation.
Why nested deserialization is harmful: Magento XXE (CVE-2024-34102)
https://ift.tt/rJguqEk
Submitted June 26, 2024 at 04:07PM by Mempodipper
via reddit https://ift.tt/SOB3Rpu
https://ift.tt/rJguqEk
Submitted June 26, 2024 at 04:07PM by Mempodipper
via reddit https://ift.tt/SOB3Rpu
www.assetnote.io
Why nested deserialization is harmful: Magento XXE (CVE-2024-34102)
A critical, pre-authentication XML entity injection issue in Magento / Adobe Commerce (CVE-2024-34102), which Adobe rated as CVSS 9.8.
Learn how unsafe deserialization vulnerabilities work in Ruby projects (+ working gadget chains)
https://ift.tt/fIJY25x
Submitted June 26, 2024 at 06:32PM by ulldma
via reddit https://ift.tt/3dVYgKy
https://ift.tt/fIJY25x
Submitted June 26, 2024 at 06:32PM by ulldma
via reddit https://ift.tt/3dVYgKy
The GitHub Blog
Execute commands by sending JSON? Learn how unsafe deserialization vulnerabilities work in Ruby projects
Can an attacker execute arbitrary commands on a remote server just by sending JSON? Yes, if the running code contains unsafe deserialization vulnerabilities. But how is that possible? In this blog post, we’ll describe how unsafe deserialization vulnerabilities…
Clone and emulate RFID access card in a second using proxmark3 in standalone mode
https://ift.tt/hdT9rMk
Submitted June 26, 2024 at 06:23PM by barakadua131
via reddit https://ift.tt/LPId2UG
https://ift.tt/hdT9rMk
Submitted June 26, 2024 at 06:23PM by barakadua131
via reddit https://ift.tt/LPId2UG
Mobile Hacker
RFID Hacking with Proxmark3: Cloning, Emulating, and Standalone Mode
Access cards – those little plastic rectangles that grant us entry to buildings, parking lots, and secure areas. But what if I told you that these cards can be cloned, and even emulated? Enter the Proxmark3, a powerful tool that opens doors (literally) to…
Phantom Secrets: Undetected Secrets Expose Major Corporations
https://ift.tt/B2T7hyz
Submitted June 26, 2024 at 06:50PM by Pale_Fly_2673
via reddit https://ift.tt/3EMLgl6
https://ift.tt/B2T7hyz
Submitted June 26, 2024 at 06:50PM by Pale_Fly_2673
via reddit https://ift.tt/3EMLgl6
Aqua
Phantom Secrets: Undetected Secrets Expose Major Corporations
Our research discovers that almost 18% of secrets might be overlooked and some cannot be discovered by current scanning tools.
Fuzzing noscripting languages' interpreters' native functions using AFL++ to find memory corruption and more
https://ift.tt/0BQ4TgO
Submitted June 27, 2024 at 04:21PM by MegaManSec2
via reddit https://ift.tt/7S43acH
https://ift.tt/0BQ4TgO
Submitted June 27, 2024 at 04:21PM by MegaManSec2
via reddit https://ift.tt/7S43acH
Joshua.Hu Joshua Rogers’ Scribbles
Fuzzing noscripting languages’ interpreters’ native functions using AFL++ to find memory corruption and more
Fuzzing applications needs no introduction, and I have written about some interesting problems related to fuzzing in the past [0][1][2][3]. At scale, fuzzing has traditionally focused on compiled binaries and detecting crashes and other memory corruption…