Why bother with argv[0]? It can deceive, break and corrupt your defences
https://ift.tt/Y9M3RGI
Submitted September 03, 2024 at 06:00PM by Wietze-
via reddit https://ift.tt/z2LxRvf
https://ift.tt/Y9M3RGI
Submitted September 03, 2024 at 06:00PM by Wietze-
via reddit https://ift.tt/z2LxRvf
www.wietzebeukema.nl
Why bother with argv[0]?
The first argument of a program’s command line, typically reflecting the program’s name/path and often referred to as argv[0], can in most cases be set to an arbitrary value without affecting the process’ flow. Making the case against argv[0], this post demonstrates…
From a GLPI patch bypass to RCE.
https://ift.tt/8kyWUMD
Submitted September 03, 2024 at 08:17PM by AlmondOffSec
via reddit https://ift.tt/RSlEr6b
https://ift.tt/8kyWUMD
Submitted September 03, 2024 at 08:17PM by AlmondOffSec
via reddit https://ift.tt/RSlEr6b
Sensepost
SensePost | From a glpi patch bypass to rce
Leaders in Information Security
Exploiting Misconfigured GitLab OIDC AWS IAM Roles
https://ift.tt/OGsZYdA
Submitted September 03, 2024 at 07:50PM by RedTermSession
via reddit https://ift.tt/HxJGX0v
https://ift.tt/OGsZYdA
Submitted September 03, 2024 at 07:50PM by RedTermSession
via reddit https://ift.tt/HxJGX0v
hackingthe.cloud
Exploiting Misconfigured GitLab OIDC AWS IAM Roles - Hacking The Cloud
Discover how to identify and exploit misconfigured AWS IAM roles using GitLab OIDC, with a detailed, step-by-step guide.
EUCLEAK is a side-channel vulnerability that requires physical access to a YubiKey 5 Series prior to version 5.7 and (other Infineon based microcontrollers) allowing private key extraction. YSA-2024-03
https://ift.tt/UPN4qoQ
Submitted September 03, 2024 at 11:33PM by lawrencesystems
via reddit https://ift.tt/dYmwZgG
https://ift.tt/UPN4qoQ
Submitted September 03, 2024 at 11:33PM by lawrencesystems
via reddit https://ift.tt/dYmwZgG
NinjaLab
EUCLEAK - NinjaLab
Download the Writeup Illustration Romain Flamand – Flamingo Studio – flamandromain@gmail.com Abstract Secure elements are small microcontrollers whose main purpose is to generate/store secrets and then execute cryptographic operations. They undergo the highest…
Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk
https://ift.tt/gmQlwYG
Submitted September 04, 2024 at 07:25PM by SRMish3
via reddit https://ift.tt/0QcFsuh
https://ift.tt/gmQlwYG
Submitted September 04, 2024 at 07:25PM by SRMish3
via reddit https://ift.tt/0QcFsuh
JFrog
Revival Hijack - PyPI hijack technique exploited in the wild, puts 22K packages at risk
JFrog’s security research team continuously monitors open-source software registries, proactively identifying and addressing potential malware and vulnerability threats to foster a secure and reliable ecosystem for open-source software development and deployment.…
EUCLEAK Impact on Hardware Wallet Security
https://ift.tt/EmGnyhN
Submitted September 04, 2024 at 10:08PM by coinspect
via reddit https://ift.tt/RcgEnr8
https://ift.tt/EmGnyhN
Submitted September 04, 2024 at 10:08PM by coinspect
via reddit https://ift.tt/RcgEnr8
Coinspect Security
EUCLEAK Impact on Hardware Wallet Security
The EUCLEAK attack allows attackers to steal private keys with just minutes of physical access and bypassing crucial secure hardware attestation protocols.
Windows Wi-Fi Driver RCE Vulnerability - CVE-2024-30078
https://ift.tt/CGVpoMU
Submitted September 05, 2024 at 09:41PM by Void_Sec
via reddit https://ift.tt/VFBdW0Z
https://ift.tt/CGVpoMU
Submitted September 05, 2024 at 09:41PM by Void_Sec
via reddit https://ift.tt/VFBdW0Z
Crowdfense
Windows Wi-Fi Driver RCE Vulnerability - CVE-2024-30078 - Crowdfense
Analysis of CVE-2024-30078, a Windows Wi-Fi driver vulnerability. Detailed root cause analysis and exploitation constraints.
A Security Analysis of Azure DevOps Job Execution
https://ift.tt/Z3f7cCY
Submitted September 05, 2024 at 11:52PM by jat0369
via reddit https://ift.tt/dmUifLu
https://ift.tt/Z3f7cCY
Submitted September 05, 2024 at 11:52PM by jat0369
via reddit https://ift.tt/dmUifLu
Cyberark
A Security Analysis of Azure DevOps Job Execution
In software development, CI/CD practices are now standard, helping to move code quickly and efficiently from development to production. Azure DevOps, previously known as Team Foundation Server...
Frida 16.5 is out with new hardware breakpoint and watchpoint APIs, Windows ARM support, and other goodies
https://ift.tt/FOzNdBT
Submitted September 07, 2024 at 08:53PM by oleavr
via reddit https://ift.tt/E1jKytR
https://ift.tt/FOzNdBT
Submitted September 07, 2024 at 08:53PM by oleavr
via reddit https://ift.tt/E1jKytR
Frida • A world-class dynamic instrumentation toolkit
Frida 16.5.0 Released
Observe and reprogram running programs on Windows, macOS, GNU/Linux, iOS, watchOS, tvOS, Android, FreeBSD, and QNX
Exploiting CI / CD Pipelines for fun and profit
https://ift.tt/2DXyRJz
Submitted September 09, 2024 at 05:19AM by mukesh610
via reddit https://ift.tt/v5JKhGi
https://ift.tt/2DXyRJz
Submitted September 09, 2024 at 05:19AM by mukesh610
via reddit https://ift.tt/v5JKhGi
How EDR works: the (Anti-)EDR Compendium
https://ift.tt/kt71OLy
Submitted September 09, 2024 at 03:22PM by AlmondOffSec
via reddit https://ift.tt/0ELKCOi
https://ift.tt/kt71OLy
Submitted September 09, 2024 at 03:22PM by AlmondOffSec
via reddit https://ift.tt/0ELKCOi
Companion scanner for mockingjay injection - My approach to DLL scanning in search for RWX regions
https://ift.tt/OkDQhnR
Submitted September 09, 2024 at 06:19PM by flamedpt
via reddit https://ift.tt/ClkEIpw
https://ift.tt/OkDQhnR
Submitted September 09, 2024 at 06:19PM by flamedpt
via reddit https://ift.tt/ClkEIpw
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
https://ift.tt/O0w5L2k
Submitted September 09, 2024 at 08:32PM by AlmondOffSec
via reddit https://ift.tt/puz5UCQ
https://ift.tt/O0w5L2k
Submitted September 09, 2024 at 08:32PM by AlmondOffSec
via reddit https://ift.tt/puz5UCQ
watchTowr Labs
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
Every sysadmin is familiar with Veeam’s enterprise-oriented backup solution, ‘Veeam Backup & Replication’. Unfortunately, so is every ransomware operator, given it's somewhat 'privileged position' in the storage world of most enterprise's networks. There's…
Hunting for hidden Paths
https://ift.tt/w1oiCcV
Submitted September 09, 2024 at 07:39PM by anasbetis94
via reddit https://ift.tt/WjaHn41
https://ift.tt/w1oiCcV
Submitted September 09, 2024 at 07:39PM by anasbetis94
via reddit https://ift.tt/WjaHn41
Medium
Hunting for Hidden API Endpoints Using Katana and Hakraler
Good day!
Analysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)
https://ift.tt/HK4nBmp
Submitted September 09, 2024 at 07:32PM by sercurity
via reddit https://ift.tt/yDSkrgT
https://ift.tt/HK4nBmp
Submitted September 09, 2024 at 07:32PM by sercurity
via reddit https://ift.tt/yDSkrgT
Conviso AppSec
Analysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)
In this post we describe an analysis of the security patches introducted by GitHub Enterprise Server (GHES) release 3.11.3.
When Certificates Fail: A Story of Bypassed MFA in Remote Access
https://ift.tt/8dbqCE9
Submitted September 10, 2024 at 01:42AM by edermi
via reddit https://ift.tt/TmQviw6
https://ift.tt/8dbqCE9
Submitted September 10, 2024 at 01:42AM by edermi
via reddit https://ift.tt/TmQviw6
edermi's Blog
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Long time no see! After 3 years of no new blog posts and also no conference talks from my side, I decided it’s time to write again. I’ll start easy with a fun story that happened a while …
Critical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution
https://ift.tt/mxcsg1Q
Submitted September 10, 2024 at 11:20AM by Blocikinio
via reddit https://ift.tt/3dbznLK
https://ift.tt/mxcsg1Q
Submitted September 10, 2024 at 11:20AM by Blocikinio
via reddit https://ift.tt/3dbznLK
Daily CyberSecurity
Critical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution
URGENT: Critical security advisory for Kibana users. Update to version 8.15.1 now to mitigate vulnerabilities CVE-2024-37288 and CVE-2024-37285.
Browser Stored Credentials
https://ift.tt/0YMPOhK
Submitted September 10, 2024 at 03:25PM by netbiosX
via reddit https://ift.tt/9WY8vtS
https://ift.tt/0YMPOhK
Submitted September 10, 2024 at 03:25PM by netbiosX
via reddit https://ift.tt/9WY8vtS
Purple Team
Browser Stored Credentials
Modern web browsers have the capability to store web application based credentials of users in an encrypted format. This functionality has been seen as a security improvement towards the password h…
SAP Security Patch Day – September 2024
https://ift.tt/Nkv3Y4h
Submitted September 10, 2024 at 04:02PM by vah_13
via reddit https://ift.tt/zUO2FJE
https://ift.tt/Nkv3Y4h
Submitted September 10, 2024 at 04:02PM by vah_13
via reddit https://ift.tt/zUO2FJE
SAP Community
SAP Security Patch Day – September 2024
As the second Tuesday of September 2024 approaches, SAP administrators and security professionals are preparing for another crucial event: SAP Security Patch Day. This month’s release addresses several vulnerabilities across various SAP products and components…
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
https://ift.tt/kd9iJy3
Submitted September 10, 2024 at 08:14PM by Nullbind
via reddit https://ift.tt/dDKO0sz
https://ift.tt/kd9iJy3
Submitted September 10, 2024 at 08:14PM by Nullbind
via reddit https://ift.tt/dDKO0sz
NetSPI
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
Learn how threat actors can exploit SQL Server credential objects to escalate domain privileges and how you can detect it.
CloudGoat Official Walkthrough Series: ‘glue_privesc’
https://ift.tt/g4ia5uA
Submitted September 10, 2024 at 10:07PM by hackers_and_builders
via reddit https://ift.tt/Jun8LiF
https://ift.tt/g4ia5uA
Submitted September 10, 2024 at 10:07PM by hackers_and_builders
via reddit https://ift.tt/Jun8LiF
Rhino Security Labs
CloudGoat Official Walkthrough Series: ‘glue_privesc’