Launched Today: The NHI Index
https://non-human.id
Submitted October 08, 2024 at 09:10PM by shlumper3
via reddit https://ift.tt/ZJvjBay
https://non-human.id
Submitted October 08, 2024 at 09:10PM by shlumper3
via reddit https://ift.tt/ZJvjBay
Clutch
NHI Index
The NHI Index is a centralized resource for understanding, managing, and securing Non-Human Identities like API keys, tokens, secrets, and service accounts. Explore mapping of 360+ NHIs and access essential resources to enhance security.
EKUwu: Not just another AD CS ESC
https://ift.tt/4iaVvnx
Submitted October 08, 2024 at 11:57PM by AlmondOffSec
via reddit https://ift.tt/cpNA2Jz
https://ift.tt/4iaVvnx
Submitted October 08, 2024 at 11:57PM by AlmondOffSec
via reddit https://ift.tt/cpNA2Jz
TrustedSec
EKUwu: Not just another AD CS ESC
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…
Ivanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)
https://ift.tt/d5xhWLf
Submitted October 08, 2024 at 11:56PM by AlmondOffSec
via reddit https://ift.tt/yXfw1KO
https://ift.tt/d5xhWLf
Submitted October 08, 2024 at 11:56PM by AlmondOffSec
via reddit https://ift.tt/yXfw1KO
Amberwolf
Ivanti Connect Secure - Authenticated RCE via OpenSSL CRLF Injection (CVE-2024-37404)
Today, we are releasing the details of CVE-2024-37404, a zero-day vulnerability in the Ivanti Connect Secure product. This vulnerability allows an authenticated administrator to execute arbitrary code with `root` privileges on the underlying system.
How to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only
https://ift.tt/LxrKBvW
Submitted October 09, 2024 at 02:49AM by MegaManSec2
via reddit https://ift.tt/sLihfdp
https://ift.tt/LxrKBvW
Submitted October 09, 2024 at 02:49AM by MegaManSec2
via reddit https://ift.tt/sLihfdp
Sonarsource
Why Code Security Matters - Even in Hardened Environments
This blog post showcases why fundamental code security is essential for an application despite all hardening measures applied in the underlying infrastructure.
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3
https://ift.tt/G6zLdgB
Submitted October 09, 2024 at 06:36PM by 0xdea
via reddit https://ift.tt/uIl6ay0
https://ift.tt/G6zLdgB
Submitted October 09, 2024 at 06:36PM by 0xdea
via reddit https://ift.tt/uIl6ay0
hn security
Exploiting AMD atdcm64a.sys arbitrary pointer dereference - Part 3 - hn security
In the previous part of the […]
MITRE Blog Post: Emulating complete, realistic attack chains with the new Caldera Bounty Hunter plugin
https://ift.tt/gO4tkNL
Submitted October 09, 2024 at 05:54PM by L015H4CK
via reddit https://ift.tt/fPsiyJZ
https://ift.tt/gO4tkNL
Submitted October 09, 2024 at 05:54PM by L015H4CK
via reddit https://ift.tt/fPsiyJZ
Medium
Emulating complete, realistic cyber attack chains with the new Caldera Bounty Hunter plugin
Authors: Louis Hackländer-Jansen
Palo Alto Expedition: From N-Day to Full Compromise – Horizon3.ai
https://ift.tt/yHX0qvI
Submitted October 09, 2024 at 10:29PM by scopedsecurity
via reddit https://ift.tt/ezXtkOT
https://ift.tt/yHX0qvI
Submitted October 09, 2024 at 10:29PM by scopedsecurity
via reddit https://ift.tt/ezXtkOT
Horizon3.ai
Palo Alto Expedition: From N-Day to Full Compromise
Technical analysis and indicators of compromise for Palo Alto Expedition CVE-2024-5910, CVE-2024-9464, CVE-2024-9465, and CVE-2024-9466 leading to system compromise and credential exposure.
Axis Camera takeover alternative
https://ift.tt/cM6GIFJ
Submitted October 10, 2024 at 01:21AM by S3cur3Th1sSh1t
via reddit https://ift.tt/xSgrGA5
https://ift.tt/cM6GIFJ
Submitted October 10, 2024 at 01:21AM by S3cur3Th1sSh1t
via reddit https://ift.tt/xSgrGA5
www.r-tec.net
Blog Axis Camera APP takeover
r-tec recently analysed an Axis IP Camera of the model F9111 in a penetrationtest for one of our customers.
Measuring Detection Coverage
https://ift.tt/QYEvKxD
Submitted October 10, 2024 at 01:20PM by netbiosX
via reddit https://ift.tt/qk6AEJs
https://ift.tt/QYEvKxD
Submitted October 10, 2024 at 01:20PM by netbiosX
via reddit https://ift.tt/qk6AEJs
Purple Team
Measuring Detection Coverage
Purple Teaming and Detection Engineering even though that as a concept exist in the information security industry for years lack of specific standardization, models and metrics. The absence of dedi…
Can You Get Root With Only a Cigarette Lighter?
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
Redefining Ransomware Attacks on AWS using AWS KMS XKS
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
Medium
Perfecting Ransomware on AWS — Using ‘keys to the kingdom’ to change the locks
I unveil a new post exploit attack vector that allows devastating ransomware attacks on compromised AWS account along with preventive…
Aw, Sugar. Critical Vulnerabilities in SugarWOD
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
SOC in 5 minutes! 🚀🔒 Set up your SOC with Wazuh, SOCFortress CoPilot, and Velociraptor #SOCSetup #blueteam #redteam
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
GitHub
GitHub - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy: Java Android Magisk Burp Objection Root Emulator Easy…
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE) - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
CSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilities
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
GitHub
GitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT). - doyensec/CSPTPlayground
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
Gist
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md
Tool for File Analysis
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
Top 10 Nhà cái uy tín
Top 10+ Nhà Cái Uy Tín Nhất Việt Nam 2025 - Đã Xác Thực 100%
Khám phá top 10+ nhà cái uy tín được kiểm định và xác thực 100% từ các chuyên gia cá cược, đảm bảo trải nghiệm cá cược tốt nhất cho người chơi
Threat Hunting + Log Analysis - What to look for in your logs
https://ift.tt/OMGaPYV
Submitted October 14, 2024 at 07:16PM by dbcid
via reddit https://ift.tt/qZt0MW2
https://ift.tt/OMGaPYV
Submitted October 14, 2024 at 07:16PM by dbcid
via reddit https://ift.tt/qZt0MW2
Trunc Logging
Threat Hunting: A Basic Guide to Log Analysis for Cybersecurity
Learn how to proactively identify cybersecurity threats through log analysis. This guide covers essential threat-hunting techniques, from detecting suspicious logins to flagging anomalies, ensuring your organization's defenses stay ahead of attackers.
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs
https://ift.tt/ZUYHzdE
Submitted October 14, 2024 at 10:00PM by dx7r__
via reddit https://ift.tt/G4j0PuE
https://ift.tt/ZUYHzdE
Submitted October 14, 2024 at 10:00PM by dx7r__
via reddit https://ift.tt/G4j0PuE
watchTowr Labs
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
Today we'd like to share a recent journey into (yet another) SSLVPN appliance vulnerability - a Format String vulnerability, unusually, in Fortinet's FortiGate devices.
It affected (before patching) all currently-maintained branches, and recently was highlighted…
It affected (before patching) all currently-maintained branches, and recently was highlighted…
DLL Sideloading introduction & weaponization
https://ift.tt/UHtsrDA
Submitted October 15, 2024 at 02:29AM by S3cur3Th1sSh1t
via reddit https://ift.tt/U9mReHg
https://ift.tt/UHtsrDA
Submitted October 15, 2024 at 02:29AM by S3cur3Th1sSh1t
via reddit https://ift.tt/U9mReHg
www.r-tec.net
r-tec Blog | DLL Sideloading
The post describes DLL Sideloading, a technique that allows attackers to execute custom malicious code from within legitimate windows binaries/processes.
Container Hardening Process
https://ift.tt/MYpPTod
Submitted October 15, 2024 at 05:20PM by citypw
via reddit https://ift.tt/WOUAo5q
https://ift.tt/MYpPTod
Submitted October 15, 2024 at 05:20PM by citypw
via reddit https://ift.tt/WOUAo5q
hardenedlinux.org
Container Hardening Process
This is a step-by-step guide to the container hardening process on the GNU/Linux operating system. A containerized application (Podman with Pandoc) has been created for demonstration. The process begins with applying a customized Seccomp policy profile created…
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
Tracebit
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
We share a - now fixed - AWS vulnerability that would have enabled potentially undetectable data exfiltration from even the most locked down of AWS accounts by leveraging the audit trail itself to stealthily leak data.