Browser-based Assembler - Client Side Only
https://ift.tt/4BE5dNm
Submitted July 08, 2024 at 04:48AM by lightgrains
via reddit https://ift.tt/ea1u8KZ
https://ift.tt/4BE5dNm
Submitted July 08, 2024 at 04:48AM by lightgrains
via reddit https://ift.tt/ea1u8KZ
Awesome TLS: Burp extension which overrides Burp Suite's default HTTP/TLS stack to make it immune to WAF fingerprinting methods (JA3, HTTP 2 frames, etc.)
https://ift.tt/4eiUtKf
Submitted July 07, 2024 at 02:03AM by Sleeyax1
via reddit https://ift.tt/M3s1GcN
https://ift.tt/4eiUtKf
Submitted July 07, 2024 at 02:03AM by Sleeyax1
via reddit https://ift.tt/M3s1GcN
GitHub
GitHub - sleeyax/burp-awesome-tls: Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser.
Burp extension to evade TLS fingerprinting. Bypass WAF, spoof any browser. - sleeyax/burp-awesome-tls
Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough
https://ift.tt/QcHF7ys
Submitted July 08, 2024 at 06:11PM by cov_id19
via reddit https://ift.tt/qAlacQs
https://ift.tt/QcHF7ys
Submitted July 08, 2024 at 06:11PM by cov_id19
via reddit https://ift.tt/qAlacQs
www.oligo.security
Shelltorch Explained: Multiple Vulnerabilities in Pytorch Model Server (Torchserve) (CVSS 9.9, CVSS 9.8) Walkthrough | Oligo Security
Want the deep dive, full story with technical walkthrough for the Pytorch (TorchServe) ShellTorch vulnerabilities CVE-2023-43654 (CVSS: 9.8) and CVE-2022-1471 (CVSS: 9.9)? You’re in the right place
The Current State of Browser Cookies
https://ift.tt/8klazYT
Submitted July 08, 2024 at 11:24PM by jat0369
via reddit https://ift.tt/oG1gpif
https://ift.tt/8klazYT
Submitted July 08, 2024 at 11:24PM by jat0369
via reddit https://ift.tt/oG1gpif
Cyberark
The Current State of Browser Cookies
What Are Cookies When you hear “cookies,” you may initially think of the delicious chocolate chip ones. However, web cookies function quite differently than their crumbly-baked counterparts....
angr for real-world use cases
https://ift.tt/2eraMtZ
Submitted July 08, 2024 at 11:04PM by Schwag
via reddit https://ift.tt/IJSXBos
https://ift.tt/2eraMtZ
Submitted July 08, 2024 at 11:04PM by Schwag
via reddit https://ift.tt/IJSXBos
plowsec.github.io
angr for real-world use cases
My experiences using angr for real-world use cases in 2024, and extending it to diagnose problems / show what it’s doing
WhatsUp Gold SetAdminPassword Privilege Escalation CVE-2024-5009
https://ift.tt/TRK05gv
Submitted July 09, 2024 at 12:40AM by CyberSecSomething
via reddit https://ift.tt/GyxWzoj
https://ift.tt/TRK05gv
Submitted July 09, 2024 at 12:40AM by CyberSecSomething
via reddit https://ift.tt/GyxWzoj
Summoning Team
WhatsUp Gold SetAdminPassword Privilege Escalation
Lets analyze a privilege escalation which I found targeting progress whatsup gold, this is the story of CVE-2024-5009
WhatsUp Gold Pre-Auth RCE WriteDataFile Primitive CVE-2024-4883
https://ift.tt/DKTalAG
Submitted July 09, 2024 at 12:40AM by CyberSecSomething
via reddit https://ift.tt/UVPakY7
https://ift.tt/DKTalAG
Submitted July 09, 2024 at 12:40AM by CyberSecSomething
via reddit https://ift.tt/UVPakY7
Summoning Team
WhatsUp Gold Pre-Auth RCE WriteDataFile Primitive
Using a path traversal vulnerability to achieve remote code execution, this is the story of CVE-2024-4883 a pre-auth RCE against progress whatsup gold
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip PrimitiveCVE-2024-4885
https://ift.tt/ecWS0lM
Submitted July 09, 2024 at 12:39AM by CyberSecSomething
via reddit https://ift.tt/6ZWcFUd
https://ift.tt/ecWS0lM
Submitted July 09, 2024 at 12:39AM by CyberSecSomething
via reddit https://ift.tt/6ZWcFUd
Summoning Team
WhatsUp Gold Pre-Auth RCE GetFileWithoutZip Primitive
I discovered an unauthenticated path traversal against the latest version of progress whatsup gold and turned it into a pre-auth RCE, following is how I did it, this is the story of CVE-2024-4885
North Korean Backed Threat Actors Continue Supply Chain Attacks On npm Developers
https://ift.tt/zfQLlMc
Submitted July 09, 2024 at 05:45AM by louis11
via reddit https://ift.tt/LBN2xSu
https://ift.tt/zfQLlMc
Submitted July 09, 2024 at 05:45AM by louis11
via reddit https://ift.tt/LBN2xSu
Phylum Research | Software Supply Chain Security
New Tactics from a Familiar Threat | Phylum
North Korean hackers are using a new tactic to target software developers. They create fake copies of legitimate packages to steal cryptocurrency and other sensitive data. See Phylum Research...
Where is the ESPM (Enterprise Security Posture Management) to address the fragmented security posture management and offer a unified approach to manage the whole enterprise network security. The blog delves into trends of security posture and explores the path to an orchestrated security posture
https://ift.tt/zJc4mgi
Submitted July 09, 2024 at 02:19PM by PutApart5987
via reddit https://ift.tt/iwqCZfR
https://ift.tt/zJc4mgi
Submitted July 09, 2024 at 02:19PM by PutApart5987
via reddit https://ift.tt/iwqCZfR
SecurityScouter
Where is the Enterprise Security Posture Management?
Made with Softr, the easiest way to turn your data into portals and internal tools.
Exploiting An Enterprise Backup Driver For Privilege Escalation - CVE-2023-43896
https://ift.tt/oNhnWHr
Submitted July 09, 2024 at 02:01PM by lldre
via reddit https://ift.tt/93LMSTy
https://ift.tt/oNhnWHr
Submitted July 09, 2024 at 02:01PM by lldre
via reddit https://ift.tt/93LMSTy
Another One (in OpenSSH)! CVE-2024-6409
https://ift.tt/e3nDmPZ
Submitted July 09, 2024 at 04:39PM by cov_id19
via reddit https://ift.tt/V6pbHix
https://ift.tt/e3nDmPZ
Submitted July 09, 2024 at 04:39PM by cov_id19
via reddit https://ift.tt/V6pbHix
www.oligo.security
Critical RCE Vulnerabilities in OpenSSH (CVE-2024-6387, CVE-2024-6409) - How to Detect and Mitigate | Oligo Security
Discover the critical OpenSSH RCE vulnerabilities (CVE-2024-6387, CVE-2024-6409) and learn detection and mitigation steps to protect your servers from potential exploits.
Pwn2Own: WAN-to-LAN Exploit Showcase TP-Link ER605 routers and Synology BC500 IP camera - Part 1: WAN
https://ift.tt/xSdCGnm
Submitted July 10, 2024 at 12:12PM by sh0n1z
via reddit https://ift.tt/PoGE9qn
https://ift.tt/xSdCGnm
Submitted July 10, 2024 at 12:12PM by sh0n1z
via reddit https://ift.tt/PoGE9qn
Claroty
Pwn2Own: WAN-to-LAN Exploit Showcase, Part 1
Claroty Team82 demonstrates how it exploited vulnerabilities in TP-Link ER605 routers on the WAN in order to pivot onto the local network (LAN) and exploit an IoT device, in this case, a Synology BC500 security camera.
Choosing the Right Framework for Cross-Platform Mobile App Development
https://ift.tt/FA1xT8W
Submitted July 10, 2024 at 12:08PM by anujtomar_17
via reddit https://ift.tt/pdJ0vX6
https://ift.tt/FA1xT8W
Submitted July 10, 2024 at 12:08PM by anujtomar_17
via reddit https://ift.tt/pdJ0vX6
Quickway Infoystems
Choosing the Right Framework for Cross-Platform Mobile App Development
Discover how to choose the best framework for cross-platform mobile app development. Explore top frameworks and find the right one for your project.
Time-based ORM leak attacks
https://ift.tt/b9xWO27
Submitted July 10, 2024 at 03:52PM by albinowax
via reddit https://ift.tt/YtO6FZl
https://ift.tt/b9xWO27
Submitted July 10, 2024 at 03:52PM by albinowax
via reddit https://ift.tt/YtO6FZl
Elttam
plORMbing your Prisma ORM with Time-based Attacks
elttam is an independent security company providing research-driven security assessment services. We combine pragmatism and deep technical insight to help our customers secure their most important assets.
Chaining Three Bugs to Access All Your ServiceNow Data
https://ift.tt/1qfUtDv
Submitted July 11, 2024 at 09:53AM by Mempodipper
via reddit https://ift.tt/9gBWmHD
https://ift.tt/1qfUtDv
Submitted July 11, 2024 at 09:53AM by Mempodipper
via reddit https://ift.tt/9gBWmHD
www.assetnote.io
Chaining Three Bugs to Access All Your ServiceNow Data
Through the course of 3/4 weeks, we were able to find a chain of vulnerabilities that allows full database access and full access to any MID servers configured. This resulted in 3 separate CVE's.
Preventing the worst supply chain attack you can imagine in the Python ecosystem
https://ift.tt/6ITCmhz
Submitted July 11, 2024 at 09:43PM by SRMish3
via reddit https://ift.tt/T6x4Rli
https://ift.tt/6ITCmhz
Submitted July 11, 2024 at 09:43PM by SRMish3
via reddit https://ift.tt/T6x4Rli
JFrog
Binary secret scanning helped us prevent (what might have been) the worst supply chain attack you can imagine
The JFrog Security Research team has recently discovered and reported a leaked access token with administrator access to Python’s, PyPI’s and Python Software Foundation’s GitHub repositories, which was leaked in a public Docker container hosted on Docker…
SaladCat: open-source and highly scalable password cracking using gamer GPUs
https://ift.tt/gQUZLrV
Submitted July 11, 2024 at 09:37PM by JetSetKyle
via reddit https://ift.tt/fdicBOp
https://ift.tt/gQUZLrV
Submitted July 11, 2024 at 09:37PM by JetSetKyle
via reddit https://ift.tt/fdicBOp
A Race to the Bottom - Database Transactions Undermining Your AppSec
https://ift.tt/uc6Eajz
Submitted July 11, 2024 at 10:35PM by nibblesec
via reddit https://ift.tt/eE5ymMc
https://ift.tt/uc6Eajz
Submitted July 11, 2024 at 10:35PM by nibblesec
via reddit https://ift.tt/eE5ymMc
CORS: the ultimate guide
https://ift.tt/BZvai3S
Submitted July 12, 2024 at 01:02AM by imaibou
via reddit https://ift.tt/oEe5vJi
https://ift.tt/BZvai3S
Submitted July 12, 2024 at 01:02AM by imaibou
via reddit https://ift.tt/oEe5vJi
Introduction to Hardware Hacking with a Raspberry Pi: Software Configuration
https://ift.tt/adnpWOZ
Submitted July 12, 2024 at 06:07PM by wrongbaud
via reddit https://ift.tt/vDEgPVL
https://ift.tt/adnpWOZ
Submitted July 12, 2024 at 06:07PM by wrongbaud
via reddit https://ift.tt/vDEgPVL
Voidstar Security Research Blog
Hardware Hacking with a Raspberry Pi - Configuring the PiFex