Cracking Wi-Fi password using combinatorics
https://ift.tt/oIzu3tO
Submitted August 06, 2024 at 06:03PM by yurichev
via reddit https://ift.tt/3kQzIaj
https://ift.tt/oIzu3tO
Submitted August 06, 2024 at 06:03PM by yurichev
via reddit https://ift.tt/3kQzIaj
Homebrew Security Audit 2023
https://ift.tt/lhoZMvR
Submitted August 06, 2024 at 05:37PM by ChemicalImaginary319
via reddit https://ift.tt/ndWwyIq
https://ift.tt/lhoZMvR
Submitted August 06, 2024 at 05:37PM by ChemicalImaginary319
via reddit https://ift.tt/ndWwyIq
Homebrew
2023 Security Audit
Homebrew had a security audit performed in 2023. This audit was funded by the Open Technology Fund and conducted by Trail of Bits. Trail of Bits’ report contained 25 items, of which 16 were fixed, 3 are in progress, and 6 are acknowledged by Homebrew’s maintainers.…
Unveiling the Power Duo: osquery and osctrl
https://ift.tt/DFNwz9x
Submitted August 06, 2024 at 09:25PM by javuto
via reddit https://ift.tt/noQmhpM
https://ift.tt/DFNwz9x
Submitted August 06, 2024 at 09:25PM by javuto
via reddit https://ift.tt/noQmhpM
Medium
Unveiling the Power Duo: osquery and osctrl
Get ready to discover the power of osquery and osctrl, your dynamic duo for advanced system monitoring and security.
Vestaboard: Exploring Broken Access Controls and Privilege Escalation
https://ift.tt/cSQqZ9N
Submitted August 06, 2024 at 10:41PM by hackers_and_builders
via reddit https://ift.tt/osqd4zN
https://ift.tt/cSQqZ9N
Submitted August 06, 2024 at 10:41PM by hackers_and_builders
via reddit https://ift.tt/osqd4zN
Rhino Security Labs
Vestaboard: Exploring Broken Access Controls and Privilege Escalation - Rhino Security Labs
During research on the Vestaboard web platform, the Rhino Security Labs research team identified three vulnerable instances of Broken Access Controls.
Cracking Wi-Fi password using combinatorics
https://ift.tt/oIzu3tO
Submitted August 06, 2024 at 10:53PM by yurichev
via reddit https://ift.tt/0FhGfLp
https://ift.tt/oIzu3tO
Submitted August 06, 2024 at 10:53PM by yurichev
via reddit https://ift.tt/0FhGfLp
Reddit
[deleted by user] : r/netsec
515K subscribers in the netsec community. /r/netsec is a community-curated aggregator of technical information security content. Our mission is to…
Announcing the Vulnerability Management program pack 1.0
https://ift.tt/C4eNYlS
Submitted August 07, 2024 at 02:40AM by SecTemplates
via reddit https://ift.tt/grDE8AY
https://ift.tt/C4eNYlS
Submitted August 07, 2024 at 02:40AM by SecTemplates
via reddit https://ift.tt/grDE8AY
SecTemplates.com
Announcing the Vulnerability Management program pack 1.0
Introduction Several times in my enterprise security career I experienced challenges when it came to security defect/vulnerability handling and management. When I joined eBay in 2006, the security team was fairly small and I recall filing a cross-site noscripting…
Master Your Craft - Tavis Ormandy Analysis on The CrowdStrike Incident
https://ift.tt/pkwRB4d
Submitted August 07, 2024 at 02:57AM by tahaid
via reddit https://ift.tt/VExvziy
https://ift.tt/pkwRB4d
Submitted August 07, 2024 at 02:57AM by tahaid
via reddit https://ift.tt/VExvziy
My keyboard was misbehaving so I had to exploit my NAS
https://ift.tt/9nwkJud
Submitted August 07, 2024 at 08:12PM by himazawa
via reddit https://ift.tt/RoZraSM
https://ift.tt/9nwkJud
Submitted August 07, 2024 at 08:12PM by himazawa
via reddit https://ift.tt/RoZraSM
appsec & stuff
My keyboard was misbehaving so I had to exploit my NAS
I recently received my ZimaCube: a NAS from IceWhale, the same company behind the ZimaBlade, ZimaBoard and most notably CasaOS, a UI to manage docker applications.
“Zovek” , My Offensive IoT Redteam Implant v1.0
https://ift.tt/Sv1o5Nk
Submitted August 07, 2024 at 10:04PM by alt3kx
via reddit https://ift.tt/ps95cVo
https://ift.tt/Sv1o5Nk
Submitted August 07, 2024 at 10:04PM by alt3kx
via reddit https://ift.tt/ps95cVo
Medium
“Zovek” , My Offensive IoT Redteam Implant v1.0
Why write this?
0.0.0.0 Day: Exploiting Localhost APIs From the Browser
https://ift.tt/qirSPpG
Submitted August 07, 2024 at 11:34PM by cov_id19
via reddit https://ift.tt/WnXdmJH
https://ift.tt/qirSPpG
Submitted August 07, 2024 at 11:34PM by cov_id19
via reddit https://ift.tt/WnXdmJH
www.oligo.security
0.0.0.0 Day: Exploiting Localhost APIs From the Browser | Oligo Security
Oligo Security's research team recently disclosed the “0.0.0.0 Day” vulnerability. This vulnerability allows malicious websites to bypass browser security and interact with services running on an organization’s local network
Exploiting authorization by nonce in WordPress plugins
https://ift.tt/8EYbUug
Submitted August 08, 2024 at 12:04AM by _vavkamil_
via reddit https://ift.tt/k2afdgx
https://ift.tt/8EYbUug
Submitted August 08, 2024 at 12:04AM by _vavkamil_
via reddit https://ift.tt/k2afdgx
nowotarski.info
Exploiting authorization by nonce in WordPress plugins
About WordPress As of 2024, WordPress powers 43% of all websites in the internet. 474 million websites run WordPress software and one or more out of 70 000 plugins. Unfortunately, as history shows, many WordPress plugins, even popular ones, often contain…
Tony Hawk's Pro Strcpy
https://ift.tt/fPys5eL
Submitted August 08, 2024 at 02:00AM by _vavkamil_
via reddit https://ift.tt/39xWaPO
https://ift.tt/fPys5eL
Submitted August 08, 2024 at 02:00AM by _vavkamil_
via reddit https://ift.tt/39xWaPO
I Code 4 Coffee
Tony Hawk's Pro Strcpy
Tony Hawk's Pro Strcpy: A game save and RCE exploit for the Tony Hawk game series that can be used to hack Xbox, Playstation 2, Gamecube, and Xbox 360 consoles.
Extracting Forensics Data from Unitronics PLCs
https://ift.tt/BphkH0A
Submitted August 08, 2024 at 01:54AM by derp6996
via reddit https://ift.tt/BNfZ9TK
https://ift.tt/BphkH0A
Submitted August 08, 2024 at 01:54AM by derp6996
via reddit https://ift.tt/BNfZ9TK
Claroty
From Exploits to Forensics: Unraveling the Unitronics Attack
Claroty Team82 is publishing details of our research into Unitronics' integrated PLCs/HMIs, which began on the heels of numerous critical infrastructure attacks that were disclosed last fall, in particular at water treatment facilities in the United States…
A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
https://ift.tt/RVOgqwc
Submitted August 08, 2024 at 04:57PM by sadyetfly11
via reddit https://ift.tt/e0au4VX
https://ift.tt/RVOgqwc
Submitted August 08, 2024 at 04:57PM by sadyetfly11
via reddit https://ift.tt/e0au4VX
Google
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
This blog post takes a look at the years where eBPF was one of the kernel subsystems that grabbed the attention of a lot of security researchers. We will tell the story of how we discovered CVE-2023-2163, what our root-cause analysis process looked like,…
Listen to the whispers: web timing attacks that actually work
https://ift.tt/3rXy6gi
Submitted August 08, 2024 at 07:50PM by albinowax
via reddit https://ift.tt/Vzybl9a
https://ift.tt/3rXy6gi
Submitted August 08, 2024 at 07:50PM by albinowax
via reddit https://ift.tt/Vzybl9a
PortSwigger Research
Listen to the whispers: web timing attacks that actually work
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets
Living off the VPN: Exploring VPN post exploitation techniques
https://ift.tt/TniPER0
Submitted August 09, 2024 at 12:45AM by oridavid1231
via reddit https://ift.tt/cEVJ6j1
https://ift.tt/TniPER0
Submitted August 09, 2024 at 12:45AM by oridavid1231
via reddit https://ift.tt/cEVJ6j1
Akamai
Living off the VPN — Exploring VPN Post-Exploitation Techniques | Akamai
VPN exploitations traditionally has been primarily for initial access. Ori David shows just how much more can be done maliciously post-exploit.
Black Hat USA 2024 is running with a lot of great presentations
https://ift.tt/EFhyCLY
Submitted August 09, 2024 at 02:08AM by si9int
via reddit https://ift.tt/jvIRXPn
https://ift.tt/EFhyCLY
Submitted August 09, 2024 at 02:08AM by si9int
via reddit https://ift.tt/jvIRXPn
Blackhat
Black Hat USA 2024
Black Hat USA: Lessons Learned After CrowdStrike Incident
https://ift.tt/tBMeWXQ
Submitted August 09, 2024 at 10:46AM by Background_Value_610
via reddit https://ift.tt/VflOzb0
https://ift.tt/tBMeWXQ
Submitted August 09, 2024 at 10:46AM by Background_Value_610
via reddit https://ift.tt/VflOzb0
ChannelE2E
Black Hat USA: Lessons Learned After CrowdStrike Incident
Black Hat USA is a great outlet for sharing lessons learned after the CrowdStrike incident.
Exploiting pfsense Remote Code Execution – CVE-2022-31814
https://ift.tt/3dDX8At
Submitted August 09, 2024 at 10:43AM by Ancient_Title_1860
via reddit https://ift.tt/W9yrl7i
https://ift.tt/3dDX8At
Submitted August 09, 2024 at 10:43AM by Ancient_Title_1860
via reddit https://ift.tt/W9yrl7i
Laburity - Cyber Security Services
Exploiting pfsense Remote Code Execution – CVE-2022-31814 - Laburity
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has been done against the pfsense CVE-2022-31814. What is pfsense? pfSense software is a FreeBSD-based operating system designed to install and configure a firewall…
Apache OFBiz RCE Scanner (CVE-2024-38856)
https://ift.tt/Qlh3TMU
Submitted August 08, 2024 at 08:37AM by FreshConversation639
via reddit https://ift.tt/NYAbmSy
https://ift.tt/Qlh3TMU
Submitted August 08, 2024 at 08:37AM by FreshConversation639
via reddit https://ift.tt/NYAbmSy
GitHub
GitHub - securelayer7/CVE-2024-38856_Scanner: Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856)
Apache OFBiz RCE Scanner & Exploit (CVE-2024-38856) - securelayer7/CVE-2024-38856_Scanner
BBoT 2.0 Released!
https://ift.tt/npm12Vl
Submitted August 09, 2024 at 07:44PM by aconite33
via reddit https://ift.tt/ZTW8o3J
https://ift.tt/npm12Vl
Submitted August 09, 2024 at 07:44PM by aconite33
via reddit https://ift.tt/ZTW8o3J
Blacklanternsecurity
BBOT 2.0 - Release Announcement
The recursive internet scanner gets an upgrade