Revisiting MiniFilter Abuse Techniques to Blind EDR
https://ift.tt/ScV1YpK
Submitted September 18, 2024 at 05:58AM by eitot8
via reddit https://ift.tt/W29FYGL
https://ift.tt/ScV1YpK
Submitted September 18, 2024 at 05:58AM by eitot8
via reddit https://ift.tt/W29FYGL
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team
Improved SLEAPING sleepmask using Timers and APCs in order to spoof Timer Callback addresses at sleeping time achieving a more resilient sleep mask that works against great in-memory scanner like HSB, Moneta, etc. Also call stack return address detection is addressed in the SWAPPALA implementation.
https://ift.tt/lhtusmo
Submitted September 18, 2024 at 11:15AM by oldboy21
via reddit https://ift.tt/pQWEcXR
https://ift.tt/lhtusmo
Submitted September 18, 2024 at 11:15AM by oldboy21
via reddit https://ift.tt/pQWEcXR
oldboy21.github.io
Timer Callbacks Spoofing to Improve your SLEAP and SWAPPALA Untold
Hello, Hello, Aloooooooo. After some time away from coding I am here again talking about sleeping masks. Thanks to the great cybersec community there is always something to work on 😄
Last time in my blog I have talked how to hide a memory mapping (where in…
Last time in my blog I have talked how to hide a memory mapping (where in…
Hertz leaks 60,000 insurance claim reports on their claims website
https://ift.tt/6Uaz8Pn
Submitted September 18, 2024 at 07:43PM by ok_bye_now_
via reddit https://ift.tt/n4A5YjK
https://ift.tt/6Uaz8Pn
Submitted September 18, 2024 at 07:43PM by ok_bye_now_
via reddit https://ift.tt/n4A5YjK
www.adversis.io
Rental Car Vendor's Security Flaw Exposed Damage Claims Reports
Legitimate emails with bad practices and an insecure website add insult to injury.
Solidity Static Analyzers: Reducing False Positives with CodeQL
https://ift.tt/VGpXY8I
Submitted September 19, 2024 at 01:37AM by arrowflakes
via reddit https://ift.tt/BAbglwQ
https://ift.tt/VGpXY8I
Submitted September 19, 2024 at 01:37AM by arrowflakes
via reddit https://ift.tt/BAbglwQ
CoinFabrik
Solidity Static Analyzers: Reducing False Positives with CodeQL
There's a need to address the common issues with Solidity static analyzers to reduce false positives and enhance security analysis.
Vulnerabilities in Open Source C2 Frameworks
https://ift.tt/gAhMPVJ
Submitted September 19, 2024 at 01:35AM by 907jessejones
via reddit https://ift.tt/Ui8GWSs
https://ift.tt/gAhMPVJ
Submitted September 19, 2024 at 01:35AM by 907jessejones
via reddit https://ift.tt/Ui8GWSs
Include Security Research Blog
Vulnerabilities in Open Source C2 Frameworks - Include Security Research Blog
Hacking Hackers - Even the software used by teams of offensive security professionals is prone to standard web application vulnerabilities.
SAP Hash Cracking Techniques
https://ift.tt/UlmhFdV
Submitted September 19, 2024 at 01:03PM by vah_13
via reddit https://ift.tt/iCagDxT
https://ift.tt/UlmhFdV
Submitted September 19, 2024 at 01:03PM by vah_13
via reddit https://ift.tt/iCagDxT
RedRays - Your SAP Security Solution
SAP Hash Cracking Techniques
Justice Department disrupts vast Chinese hacking operation that infected consumer devices
https://ift.tt/JoAgXCe
Submitted September 19, 2024 at 04:35PM by Fun__Panda
via reddit https://ift.tt/tg34czQ
https://ift.tt/JoAgXCe
Submitted September 19, 2024 at 04:35PM by Fun__Panda
via reddit https://ift.tt/tg34czQ
AP News
Justice Department disrupts vast Chinese hacking operation that infected consumer devices
FBI Director Chris Wray says the FBI has disrupted a group of hackers working at the direction of the Chinese government who targeted universities, government agencies and other organizations.
Exploiting Android Client WebViews with Help from HSTS
https://ift.tt/VyEDoZb
Submitted September 19, 2024 at 04:54PM by SeanPesce
via reddit https://ift.tt/FwdSzpj
https://ift.tt/VyEDoZb
Submitted September 19, 2024 at 04:54PM by SeanPesce
via reddit https://ift.tt/FwdSzpj
Blogspot
Exploiting Android Client WebViews with Help from HSTS
TL;DR I discovered a one-click account takeover vulnerability in a popular Indonesian Android app called Tokopedia . Th...
Applying security engineering to make phishing harder
https://ift.tt/1jlr3Iu
Submitted September 19, 2024 at 07:08PM by nibblesec
via reddit https://ift.tt/0OptxP1
https://ift.tt/1jlr3Iu
Submitted September 19, 2024 at 07:08PM by nibblesec
via reddit https://ift.tt/0OptxP1
Stowaway -- Multi-hop Proxy Tool for pentesters
https://ift.tt/5CcY6E7
Submitted September 19, 2024 at 05:16PM by CryptographerWeak578
via reddit https://ift.tt/ri3UkdW
https://ift.tt/5CcY6E7
Submitted September 19, 2024 at 05:16PM by CryptographerWeak578
via reddit https://ift.tt/ri3UkdW
GitHub
Stowaway/README_EN.md at master · ph4ntonn/Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters. Contribute to ph4ntonn/Stowaway development by creating an account on GitHub.
I wrote a password spraying tool to use against M365 accounts which relies on the error messaging from Microsoft to gather additional details against a target.
https://ift.tt/Dq2YlrW
Submitted September 18, 2024 at 07:44PM by TheresAFewConors
via reddit https://ift.tt/2hI08fG
https://ift.tt/Dq2YlrW
Submitted September 18, 2024 at 07:44PM by TheresAFewConors
via reddit https://ift.tt/2hI08fG
GitHub
GitHub - TheresAFewConors/MSSprinkler: MSSprinkler is a password spraying utility for organizations to test their Microsoft Online…
MSSprinkler is a password spraying utility for organizations to test their Microsoft Online accounts from an external perspective. It employs a 'low-and-slow' approach to avoid lock...
Seezo SDR – Automated security design reviews
https://seezo.io/
Submitted September 19, 2024 at 10:23PM by phantom69_ftw
via reddit https://ift.tt/tEcnhjg
https://seezo.io/
Submitted September 19, 2024 at 10:23PM by phantom69_ftw
via reddit https://ift.tt/tEcnhjg
seezo.io
Seezo – Automate Security Design Reviews
Seezo provides context-specific security requirements to developers before they start coding
An Elliptic Curve-based Secure Chat, written using Rust and Protobuf
https://ift.tt/h8x4oHl
Submitted September 19, 2024 at 11:40PM by vaktibabat
via reddit https://ift.tt/GtqUyw7
https://ift.tt/h8x4oHl
Submitted September 19, 2024 at 11:40PM by vaktibabat
via reddit https://ift.tt/GtqUyw7
Vaktibabat
Secure Chat 2.0 (Elliptic Curves, Protobufs, and MACs)
Intro Several months ago, I wrote a post about developing a secure chat in Rust using RSA and AES-CBC. Writing that post taught me a lot (like in this post, all of the crypto algorithms were implemented from scratch), but there were 2 major problems with…
New free, open, online, practical security class from Czech Technical University.
https://ift.tt/AXv2ND6
Submitted September 20, 2024 at 02:53AM by sebagarcia
via reddit https://ift.tt/H3YNG7j
https://ift.tt/AXv2ND6
Submitted September 20, 2024 at 02:53AM by sebagarcia
via reddit https://ift.tt/H3YNG7j
cybersecurity.bsy.fel.cvut.cz
Introduction to Security
Introduction to Security Class (BSY), FEL, Czech Technical University
Link-Write Attack: A sweet combination to attack extraction implementations
https://ift.tt/gha4YFt
Submitted September 20, 2024 at 03:30PM by 0x4a616e
via reddit https://ift.tt/LKnhDQg
https://ift.tt/gha4YFt
Submitted September 20, 2024 at 03:30PM by 0x4a616e
via reddit https://ift.tt/LKnhDQg
blog.nody.cc
Link-Write Attack: A sweet combination
I’ve recently been working on some exciting development projects, including a deep dive into archive extraction. During this work, I discovered some fascinating behaviours that I’m thrilled to share with you in the following sections.
A Journey From `sudo iptables` To Local Privilege Escalation - Shielder
https://ift.tt/vaiSy9Z
Submitted September 20, 2024 at 07:10PM by smaury
via reddit https://ift.tt/z1jyZMe
https://ift.tt/vaiSy9Z
Submitted September 20, 2024 at 07:10PM by smaury
via reddit https://ift.tt/z1jyZMe
Shielder
Shielder - A Journey From `sudo iptables` To Local Privilege Escalation
In this post, we demonstrate two techniques allowing a low privileged user to escalate their privileges to root in case they can run iptables and/or iptables-save as
Using YouTube to steal your files ($41337 bounty)
https://ift.tt/XdszDkO
Submitted September 21, 2024 at 01:54AM by AlmondOffSec
via reddit https://ift.tt/stJW9Ck
https://ift.tt/XdszDkO
Submitted September 21, 2024 at 01:54AM by AlmondOffSec
via reddit https://ift.tt/stJW9Ck
lyra's epic blog
Using YouTube to steal your files
A writeup of my $4133.70 Google Drive vulnerability chain.
Analysis of CVE-2024-20439 in Cisco Smart Licensing Utility
https://ift.tt/6U4nDeG
Submitted September 21, 2024 at 07:16AM by lightgrains
via reddit https://ift.tt/bPNuJv1
https://ift.tt/6U4nDeG
Submitted September 21, 2024 at 07:16AM by lightgrains
via reddit https://ift.tt/bPNuJv1
0-Click RCE in MediaTek Wi-Fi Chipsets — 4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
https://ift.tt/cWaFyw4
Submitted September 21, 2024 at 11:49AM by MegaManSec2
via reddit https://ift.tt/GO8PMJq
https://ift.tt/cWaFyw4
Submitted September 21, 2024 at 11:49AM by MegaManSec2
via reddit https://ift.tt/GO8PMJq
hyprblog
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
a post going over 4 exploits for CVE-2024-20017, a remotely exploitable buffer overflow in a component of the MediaTek MT7622 SDK.
Published a handy tool to create tar/zip archives to exploit zipslip vulnerability
https://ift.tt/VLZonHz
Submitted September 20, 2024 at 03:34PM by 0x4a616e
via reddit https://ift.tt/uwPi0qe
https://ift.tt/VLZonHz
Submitted September 20, 2024 at 03:34PM by 0x4a616e
via reddit https://ift.tt/uwPi0qe
GitHub
GitHub - nodyhub/zipslipper: Create tar/zip archives that try to exploit zipslip vulnerability.
Create tar/zip archives that try to exploit zipslip vulnerability. - nodyhub/zipslipper
Announcing Security Exception Program Pack 1.0
https://ift.tt/m7gScUw
Submitted September 22, 2024 at 05:27AM by SecTemplates
via reddit https://ift.tt/UnbO7hK
https://ift.tt/m7gScUw
Submitted September 22, 2024 at 05:27AM by SecTemplates
via reddit https://ift.tt/UnbO7hK
SecTemplates.com
Announcing the Security Exceptions program pack 1.0
Introduction Every company establishes processes to identify security vulnerabilities, prioritize them, develop solutions, and, in some cases, strategically accept risk either temporarily or permanently. Security exceptions are closely tied to vulnerability…