Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
https://ift.tt/O0w5L2k
Submitted September 09, 2024 at 08:32PM by AlmondOffSec
via reddit https://ift.tt/puz5UCQ
https://ift.tt/O0w5L2k
Submitted September 09, 2024 at 08:32PM by AlmondOffSec
via reddit https://ift.tt/puz5UCQ
watchTowr Labs
Veeam Backup & Response - RCE With Auth, But Mostly Without Auth (CVE-2024-40711)
Every sysadmin is familiar with Veeam’s enterprise-oriented backup solution, ‘Veeam Backup & Replication’. Unfortunately, so is every ransomware operator, given it's somewhat 'privileged position' in the storage world of most enterprise's networks. There's…
Hunting for hidden Paths
https://ift.tt/w1oiCcV
Submitted September 09, 2024 at 07:39PM by anasbetis94
via reddit https://ift.tt/WjaHn41
https://ift.tt/w1oiCcV
Submitted September 09, 2024 at 07:39PM by anasbetis94
via reddit https://ift.tt/WjaHn41
Medium
Hunting for Hidden API Endpoints Using Katana and Hakraler
Good day!
Analysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)
https://ift.tt/HK4nBmp
Submitted September 09, 2024 at 07:32PM by sercurity
via reddit https://ift.tt/yDSkrgT
https://ift.tt/HK4nBmp
Submitted September 09, 2024 at 07:32PM by sercurity
via reddit https://ift.tt/yDSkrgT
Conviso AppSec
Analysis of GitHub Enterprise vulnerabilities (CVE-2024-0507/CVE-2024-0200)
In this post we describe an analysis of the security patches introducted by GitHub Enterprise Server (GHES) release 3.11.3.
When Certificates Fail: A Story of Bypassed MFA in Remote Access
https://ift.tt/8dbqCE9
Submitted September 10, 2024 at 01:42AM by edermi
via reddit https://ift.tt/TmQviw6
https://ift.tt/8dbqCE9
Submitted September 10, 2024 at 01:42AM by edermi
via reddit https://ift.tt/TmQviw6
edermi's Blog
When Certificates Fail: A Story of Bypassed MFA in Remote Access
Long time no see! After 3 years of no new blog posts and also no conference talks from my side, I decided it’s time to write again. I’ll start easy with a fun story that happened a while …
Critical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution
https://ift.tt/mxcsg1Q
Submitted September 10, 2024 at 11:20AM by Blocikinio
via reddit https://ift.tt/3dbznLK
https://ift.tt/mxcsg1Q
Submitted September 10, 2024 at 11:20AM by Blocikinio
via reddit https://ift.tt/3dbznLK
Daily CyberSecurity
Critical Kibana Flaws (CVE-2024-37288, CVE-2024-37285) Expose Systems to Arbitrary Code Execution
URGENT: Critical security advisory for Kibana users. Update to version 8.15.1 now to mitigate vulnerabilities CVE-2024-37288 and CVE-2024-37285.
Browser Stored Credentials
https://ift.tt/0YMPOhK
Submitted September 10, 2024 at 03:25PM by netbiosX
via reddit https://ift.tt/9WY8vtS
https://ift.tt/0YMPOhK
Submitted September 10, 2024 at 03:25PM by netbiosX
via reddit https://ift.tt/9WY8vtS
Purple Team
Browser Stored Credentials
Modern web browsers have the capability to store web application based credentials of users in an encrypted format. This functionality has been seen as a security improvement towards the password h…
SAP Security Patch Day – September 2024
https://ift.tt/Nkv3Y4h
Submitted September 10, 2024 at 04:02PM by vah_13
via reddit https://ift.tt/zUO2FJE
https://ift.tt/Nkv3Y4h
Submitted September 10, 2024 at 04:02PM by vah_13
via reddit https://ift.tt/zUO2FJE
SAP Community
SAP Security Patch Day – September 2024
As the second Tuesday of September 2024 approaches, SAP administrators and security professionals are preparing for another crucial event: SAP Security Patch Day. This month’s release addresses several vulnerabilities across various SAP products and components…
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
https://ift.tt/kd9iJy3
Submitted September 10, 2024 at 08:14PM by Nullbind
via reddit https://ift.tt/dDKO0sz
https://ift.tt/kd9iJy3
Submitted September 10, 2024 at 08:14PM by Nullbind
via reddit https://ift.tt/dDKO0sz
NetSPI
Hijacking SQL Server Credentials using Agent Jobs for Domain Privilege Escalation
Learn how threat actors can exploit SQL Server credential objects to escalate domain privileges and how you can detect it.
CloudGoat Official Walkthrough Series: ‘glue_privesc’
https://ift.tt/g4ia5uA
Submitted September 10, 2024 at 10:07PM by hackers_and_builders
via reddit https://ift.tt/Jun8LiF
https://ift.tt/g4ia5uA
Submitted September 10, 2024 at 10:07PM by hackers_and_builders
via reddit https://ift.tt/Jun8LiF
Rhino Security Labs
CloudGoat Official Walkthrough Series: ‘glue_privesc’
Blog Series on Android Bytecode Exploitation
https://ift.tt/o9fKqEL
Submitted September 11, 2024 at 01:21PM by martinclauss
via reddit https://ift.tt/vVK6oG5
https://ift.tt/o9fKqEL
Submitted September 11, 2024 at 01:21PM by martinclauss
via reddit https://ift.tt/vVK6oG5
Feeld dating app - Your nudes and data were publicly available
https://ift.tt/lmiPkrc
Submitted September 11, 2024 at 12:55PM by adrian_rt
via reddit https://ift.tt/v9DYFIX
https://ift.tt/lmiPkrc
Submitted September 11, 2024 at 12:55PM by adrian_rt
via reddit https://ift.tt/v9DYFIX
Cyber Security Services - London
Feeld dating app - Your nudes and data were publicly available
Discover critical Feeld app vulnerabilities from our pentest. See how flaws in security controls expose personal data and learn key fixes.
The Security Canary Maturity Model
https://ift.tt/69xoD8p
Submitted September 11, 2024 at 01:57PM by tracebit
via reddit https://ift.tt/vjZMBVw
https://ift.tt/69xoD8p
Submitted September 11, 2024 at 01:57PM by tracebit
via reddit https://ift.tt/vjZMBVw
Tracebit
The Security Canary Maturity Model | Tracebit
We layout the different levels of maturity your organization may be at in their Security Canary Maturity, as well as discussing the value in maturity models themselves.
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI - watchTowr Labs
https://ift.tt/LY6Hxwl
Submitted September 11, 2024 at 04:15PM by dx7r__
via reddit https://ift.tt/VKFCN3p
https://ift.tt/LY6Hxwl
Submitted September 11, 2024 at 04:15PM by dx7r__
via reddit https://ift.tt/VKFCN3p
watchTowr Labs
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
A new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labs
https://ift.tt/WCXab4G
Submitted September 11, 2024 at 05:24PM by f3d_0x0
via reddit https://ift.tt/kMRpqfz
https://ift.tt/WCXab4G
Submitted September 11, 2024 at 05:24PM by f3d_0x0
via reddit https://ift.tt/kMRpqfz
Cleafy
A new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labs
Explore Cleafy's analysis of a newly discovered TrickMo variant, revealing enhanced malware capabilities and critical endpoints used for storing stolen credentials and data from victims. Here is the latest threat analyst report.
Why Django’s [DEBUG=True] is a Goldmine for Hackers
https://ift.tt/nLPQF0M
Submitted September 11, 2024 at 08:22PM by Justin_coco
via reddit https://ift.tt/awStuKk
https://ift.tt/nLPQF0M
Submitted September 11, 2024 at 08:22PM by Justin_coco
via reddit https://ift.tt/awStuKk
Medium
Why Django’s [DEBUG=True] is a Goldmine for Hackers
Misconfigurations are often the weakest link in an otherwise secure environment. One of the most dangerous yet easily overlooked…
SSH Keystroke Obfuscation Bypass
https://ift.tt/cXjya97
Submitted September 12, 2024 at 01:25AM by netsec_burn
via reddit https://ift.tt/QZ8UxjK
https://ift.tt/cXjya97
Submitted September 12, 2024 at 01:25AM by netsec_burn
via reddit https://ift.tt/QZ8UxjK
crzphil.github.io
SSH Keystroke Obfuscation Bypass
A disclosure for an OpenSSH keystroke obfuscation bypass affecting current OpenSSH versions after 9.4.
Blog Post: Intelligent Adversary Emulation with the Bounty Hunter
https://ift.tt/z0LinYb
Submitted September 12, 2024 at 02:53PM by L015H4CK
via reddit https://ift.tt/hT36u7J
https://ift.tt/z0LinYb
Submitted September 12, 2024 at 02:53PM by L015H4CK
via reddit https://ift.tt/hT36u7J
lolcads tech blog
Adversary Emulation is a Complicated Profession - Intelligent Cyber Adversary Emulation with the Bounty Hunter
This blog post introduces the Bounty Hunter - a novel Caldera plugin for intelligent cyber adversary emulation. Its main contribution is the emulation of complete, realistic cyber attack chains. The Plugin is available on [**GitHub**](https://github.com/fkie…
CVE-2024-38014 0-day - Microsoft Windows MSI Installer - Repair to SYSTEM + msiscan open-source detection tool
https://ift.tt/olB5XMs
Submitted September 12, 2024 at 08:08PM by 0x9000
via reddit https://ift.tt/5W2ICMk
https://ift.tt/olB5XMs
Submitted September 12, 2024 at 08:08PM by 0x9000
via reddit https://ift.tt/5W2ICMk
SEC Consult
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Repair functions of Microsoft Windows MSI installers can be vulnerable in several ways, for instance allowing local attackers to escalate their privileges to SYSTEM rights. This vulnerability is referenced as CVE-2024-38014.
AlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreter
https://ift.tt/aeAH4uq
Submitted September 12, 2024 at 09:26PM by Traditional_Steak841
via reddit https://ift.tt/b7t0eql
https://ift.tt/aeAH4uq
Submitted September 12, 2024 at 09:26PM by Traditional_Steak841
via reddit https://ift.tt/b7t0eql
deda.lol
AlcaWASM Challenge Writeup - Pwning an In-Browser Lua Interpreter
Gamedevs of the world, unite! Your favourite language is in danger -- the l33t wrongdoers have figured out how to BYOB (Bring Your Own Bytecode) and pwn the Lua v5.4 interpreter!
CVE-2024-29847 Deep Dive: Ivanti Endpoint Manager AgentPortal Deserialization of Untrusted Data Remote Code Execution Vulnerability – Horizon3.ai
https://ift.tt/MGqi2U6
Submitted September 13, 2024 at 08:13PM by scopedsecurity
via reddit https://ift.tt/D4OhawG
https://ift.tt/MGqi2U6
Submitted September 13, 2024 at 08:13PM by scopedsecurity
via reddit https://ift.tt/D4OhawG
Horizon3.ai
CVE-2023-28324 Deep Dive: Ivanti Endpoint Manager AgentPortal Improper Input Validation
CVE-2023-28324 Ivanti Endpoint Manager AgentPortal Improper Input Validation Remote Code Execution Vulnerability.
Exploring Deserialization Attacks and Their Effects
https://ift.tt/Kh1oLWl
Submitted September 13, 2024 at 10:39PM by HayMiz
via reddit https://ift.tt/qW6uDtj
https://ift.tt/Kh1oLWl
Submitted September 13, 2024 at 10:39PM by HayMiz
via reddit https://ift.tt/qW6uDtj
haymiz@kali:~/blog$
Exploring Deserialization Attacks and Their Effects
Uncover how deserialization attacks work with real-world example and learn how to mitigate their risks.