Direct Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryption
https://ift.tt/WH750xU
Submitted September 17, 2024 at 08:24PM by CyberSecurityIs
via reddit https://ift.tt/IjBO639
https://ift.tt/WH750xU
Submitted September 17, 2024 at 08:24PM by CyberSecurityIs
via reddit https://ift.tt/IjBO639
SureCloud Cyber Services
Direct Memory Access Attacks - An easy way to hack into memory, bypass logon screens and ignore device encryption | Blog | SureCloud…
Have you ever come across a laptop, server or desktop computer that has Full Device Encryption (FDE) and protected by a password/logon screen that you would like to hack into easily? Well Direct Memory Access (DMA) attacks can easily bypass these security…
Taking over Train infrastructure / Traction power substation and lighting systems in Europe
https://ift.tt/0hoMfzm
Submitted September 17, 2024 at 08:08PM by bertinjoseb
via reddit https://ift.tt/WKefT5q
https://ift.tt/0hoMfzm
Submitted September 17, 2024 at 08:08PM by bertinjoseb
via reddit https://ift.tt/WKefT5q
Medium
Taking over Train infrastructure in Poland /Traction power substation and lighting systems
(6 Months later CZAT 7 Server is offline or changed to another ip address , this post was written 6 months ago, published today 9/2/2024)
Revisiting MiniFilter Abuse Techniques to Blind EDR
https://ift.tt/ScV1YpK
Submitted September 18, 2024 at 05:58AM by eitot8
via reddit https://ift.tt/W29FYGL
https://ift.tt/ScV1YpK
Submitted September 18, 2024 at 05:58AM by eitot8
via reddit https://ift.tt/W29FYGL
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Improved SLEAPING sleepmask using Timers and APCs in order to spoof Timer Callback addresses at sleeping time achieving a more resilient sleep mask that works against great in-memory scanner like HSB, Moneta, etc. Also call stack return address detection is addressed in the SWAPPALA implementation.
https://ift.tt/lhtusmo
Submitted September 18, 2024 at 11:15AM by oldboy21
via reddit https://ift.tt/pQWEcXR
https://ift.tt/lhtusmo
Submitted September 18, 2024 at 11:15AM by oldboy21
via reddit https://ift.tt/pQWEcXR
oldboy21.github.io
Timer Callbacks Spoofing to Improve your SLEAP and SWAPPALA Untold
Hello, Hello, Aloooooooo. After some time away from coding I am here again talking about sleeping masks. Thanks to the great cybersec community there is always something to work on 😄
Last time in my blog I have talked how to hide a memory mapping (where in…
Last time in my blog I have talked how to hide a memory mapping (where in…
Hertz leaks 60,000 insurance claim reports on their claims website
https://ift.tt/6Uaz8Pn
Submitted September 18, 2024 at 07:43PM by ok_bye_now_
via reddit https://ift.tt/n4A5YjK
https://ift.tt/6Uaz8Pn
Submitted September 18, 2024 at 07:43PM by ok_bye_now_
via reddit https://ift.tt/n4A5YjK
www.adversis.io
Rental Car Vendor's Security Flaw Exposed Damage Claims Reports
Legitimate emails with bad practices and an insecure website add insult to injury.
Solidity Static Analyzers: Reducing False Positives with CodeQL
https://ift.tt/VGpXY8I
Submitted September 19, 2024 at 01:37AM by arrowflakes
via reddit https://ift.tt/BAbglwQ
https://ift.tt/VGpXY8I
Submitted September 19, 2024 at 01:37AM by arrowflakes
via reddit https://ift.tt/BAbglwQ
CoinFabrik
Solidity Static Analyzers: Reducing False Positives with CodeQL
There's a need to address the common issues with Solidity static analyzers to reduce false positives and enhance security analysis.
Vulnerabilities in Open Source C2 Frameworks
https://ift.tt/gAhMPVJ
Submitted September 19, 2024 at 01:35AM by 907jessejones
via reddit https://ift.tt/Ui8GWSs
https://ift.tt/gAhMPVJ
Submitted September 19, 2024 at 01:35AM by 907jessejones
via reddit https://ift.tt/Ui8GWSs
Include Security Research Blog
Vulnerabilities in Open Source C2 Frameworks - Include Security Research Blog
Hacking Hackers - Even the software used by teams of offensive security professionals is prone to standard web application vulnerabilities.
SAP Hash Cracking Techniques
https://ift.tt/UlmhFdV
Submitted September 19, 2024 at 01:03PM by vah_13
via reddit https://ift.tt/iCagDxT
https://ift.tt/UlmhFdV
Submitted September 19, 2024 at 01:03PM by vah_13
via reddit https://ift.tt/iCagDxT
RedRays - Your SAP Security Solution
SAP Hash Cracking Techniques
Justice Department disrupts vast Chinese hacking operation that infected consumer devices
https://ift.tt/JoAgXCe
Submitted September 19, 2024 at 04:35PM by Fun__Panda
via reddit https://ift.tt/tg34czQ
https://ift.tt/JoAgXCe
Submitted September 19, 2024 at 04:35PM by Fun__Panda
via reddit https://ift.tt/tg34czQ
AP News
Justice Department disrupts vast Chinese hacking operation that infected consumer devices
FBI Director Chris Wray says the FBI has disrupted a group of hackers working at the direction of the Chinese government who targeted universities, government agencies and other organizations.
Exploiting Android Client WebViews with Help from HSTS
https://ift.tt/VyEDoZb
Submitted September 19, 2024 at 04:54PM by SeanPesce
via reddit https://ift.tt/FwdSzpj
https://ift.tt/VyEDoZb
Submitted September 19, 2024 at 04:54PM by SeanPesce
via reddit https://ift.tt/FwdSzpj
Blogspot
Exploiting Android Client WebViews with Help from HSTS
TL;DR I discovered a one-click account takeover vulnerability in a popular Indonesian Android app called Tokopedia . Th...
Applying security engineering to make phishing harder
https://ift.tt/1jlr3Iu
Submitted September 19, 2024 at 07:08PM by nibblesec
via reddit https://ift.tt/0OptxP1
https://ift.tt/1jlr3Iu
Submitted September 19, 2024 at 07:08PM by nibblesec
via reddit https://ift.tt/0OptxP1
Stowaway -- Multi-hop Proxy Tool for pentesters
https://ift.tt/5CcY6E7
Submitted September 19, 2024 at 05:16PM by CryptographerWeak578
via reddit https://ift.tt/ri3UkdW
https://ift.tt/5CcY6E7
Submitted September 19, 2024 at 05:16PM by CryptographerWeak578
via reddit https://ift.tt/ri3UkdW
GitHub
Stowaway/README_EN.md at master · ph4ntonn/Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters. Contribute to ph4ntonn/Stowaway development by creating an account on GitHub.
I wrote a password spraying tool to use against M365 accounts which relies on the error messaging from Microsoft to gather additional details against a target.
https://ift.tt/Dq2YlrW
Submitted September 18, 2024 at 07:44PM by TheresAFewConors
via reddit https://ift.tt/2hI08fG
https://ift.tt/Dq2YlrW
Submitted September 18, 2024 at 07:44PM by TheresAFewConors
via reddit https://ift.tt/2hI08fG
GitHub
GitHub - TheresAFewConors/MSSprinkler: MSSprinkler is a password spraying utility for organizations to test their Microsoft Online…
MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employs a 'low-and-slow' approach to avoid lock...
Seezo SDR – Automated security design reviews
https://seezo.io/
Submitted September 19, 2024 at 10:23PM by phantom69_ftw
via reddit https://ift.tt/tEcnhjg
https://seezo.io/
Submitted September 19, 2024 at 10:23PM by phantom69_ftw
via reddit https://ift.tt/tEcnhjg
seezo.io
Seezo – Automate Security Design Reviews
Seezo provides context-specific security requirements to developers before they start coding
An Elliptic Curve-based Secure Chat, written using Rust and Protobuf
https://ift.tt/h8x4oHl
Submitted September 19, 2024 at 11:40PM by vaktibabat
via reddit https://ift.tt/GtqUyw7
https://ift.tt/h8x4oHl
Submitted September 19, 2024 at 11:40PM by vaktibabat
via reddit https://ift.tt/GtqUyw7
Vaktibabat
Secure Chat 2.0 (Elliptic Curves, Protobufs, and MACs)
Intro Several months ago, I wrote a post about developing a secure chat in Rust using RSA and AES-CBC. Writing that post taught me a lot (like in this post, all of the crypto algorithms were implemented from scratch), but there were 2 major problems with…
New free, open, online, practical security class from Czech Technical University.
https://ift.tt/AXv2ND6
Submitted September 20, 2024 at 02:53AM by sebagarcia
via reddit https://ift.tt/H3YNG7j
https://ift.tt/AXv2ND6
Submitted September 20, 2024 at 02:53AM by sebagarcia
via reddit https://ift.tt/H3YNG7j
cybersecurity.bsy.fel.cvut.cz
Introduction to Security
Introduction to Security Class (BSY), FEL, Czech Technical University
Link-Write Attack: A sweet combination to attack extraction implementations
https://ift.tt/gha4YFt
Submitted September 20, 2024 at 03:30PM by 0x4a616e
via reddit https://ift.tt/LKnhDQg
https://ift.tt/gha4YFt
Submitted September 20, 2024 at 03:30PM by 0x4a616e
via reddit https://ift.tt/LKnhDQg
blog.nody.cc
Link-Write Attack: A sweet combination
I’ve recently been working on some exciting development projects, including a deep dive into archive extraction. During this work, I discovered some fascinating behaviours that I’m thrilled to share with you in the following sections.
A Journey From `sudo iptables` To Local Privilege Escalation - Shielder
https://ift.tt/vaiSy9Z
Submitted September 20, 2024 at 07:10PM by smaury
via reddit https://ift.tt/z1jyZMe
https://ift.tt/vaiSy9Z
Submitted September 20, 2024 at 07:10PM by smaury
via reddit https://ift.tt/z1jyZMe
Shielder
Shielder - A Journey From `sudo iptables` To Local Privilege Escalation
In this post, we demonstrate two techniques allowing a low privileged user to escalate their privileges to root in case they can run iptables and/or iptables-save as
Using YouTube to steal your files ($41337 bounty)
https://ift.tt/XdszDkO
Submitted September 21, 2024 at 01:54AM by AlmondOffSec
via reddit https://ift.tt/stJW9Ck
https://ift.tt/XdszDkO
Submitted September 21, 2024 at 01:54AM by AlmondOffSec
via reddit https://ift.tt/stJW9Ck
lyra's epic blog
Using YouTube to steal your files
A writeup of my $4133.70 Google Drive vulnerability chain.
Analysis of CVE-2024-20439 in Cisco Smart Licensing Utility
https://ift.tt/6U4nDeG
Submitted September 21, 2024 at 07:16AM by lightgrains
via reddit https://ift.tt/bPNuJv1
https://ift.tt/6U4nDeG
Submitted September 21, 2024 at 07:16AM by lightgrains
via reddit https://ift.tt/bPNuJv1
0-Click RCE in MediaTek Wi-Fi Chipsets — 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
https://ift.tt/cWaFyw4
Submitted September 21, 2024 at 11:49AM by MegaManSec2
via reddit https://ift.tt/GO8PMJq
https://ift.tt/cWaFyw4
Submitted September 21, 2024 at 11:49AM by MegaManSec2
via reddit https://ift.tt/GO8PMJq
hyprblog
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
a post going over 4 exploits for CVE-2024-20017, a remotely exploitable buffer overflow in a component of the MediaTek MT7622 SDK.