Can You Get Root With Only a Cigarette Lighter?
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
https://ift.tt/d3l2DPB
Submitted October 09, 2024 at 07:45PM by gquere
via reddit https://ift.tt/kQfSaPJ
Redefining Ransomware Attacks on AWS using AWS KMS XKS
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
https://ift.tt/xEoYTMl
Submitted October 11, 2024 at 02:45AM by alt69785
via reddit https://ift.tt/0K51U3l
Medium
Perfecting Ransomware on AWS — Using ‘keys to the kingdom’ to change the locks
I unveil a new post exploit attack vector that allows devastating ransomware attacks on compromised AWS account along with preventive…
Aw, Sugar. Critical Vulnerabilities in SugarWOD
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
https://ift.tt/sKVvtyM
Submitted October 11, 2024 at 02:44AM by AlmondOffSec
via reddit https://ift.tt/Amj7vsM
SOC in 5 minutes! 🚀🔒 Set up your SOC with Wazuh, SOCFortress CoPilot, and Velociraptor #SOCSetup #blueteam #redteam
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
https://ift.tt/3fgRKxp
Submitted October 11, 2024 at 09:30AM by rmccurdyDOTcom
via reddit https://ift.tt/yxJM5BV
GitHub
GitHub - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy: Java Android Magisk Burp Objection Root Emulator Easy…
Java Android Magisk Burp Objection Root Emulator Easy (JAMBOREE) - freeload101/Java-Android-Magisk-Burp-Objection-Root-Emulator-Easy
CSPT Playground - A new tool for learning about finding and exploiting client-side path traversal related vulnerabilities
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
https://ift.tt/5JvpFgd
Submitted October 10, 2024 at 10:10PM by ds_at
via reddit https://ift.tt/D3yUrF2
GitHub
GitHub - doyensec/CSPTPlayground: CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).
CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT). - doyensec/CSPTPlayground
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
https://ift.tt/5BH8CJy
Submitted October 12, 2024 at 05:18PM by MegaManSec2
via reddit https://ift.tt/l8kFzR5
Gist
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies
1 bug, $50,000+ in bounties, how Zendesk intentionally left a backdoor in hundreds of Fortune 500 companies - zendesk.md
Tool for File Analysis
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
http://Malcore.io
Submitted October 14, 2024 at 05:06AM by Btp3605
via reddit https://ift.tt/3oiBrak
Top 10 Nhà cái uy tín
Top 10+ Nhà Cái Uy Tín Nhất Việt Nam 2025 - Đã Xác Thực 100%
Khám phá top 10+ nhà cái uy tín được kiểm định và xác thực 100% từ các chuyên gia cá cược, đảm bảo trải nghiệm cá cược tốt nhất cho người chơi
Threat Hunting + Log Analysis - What to look for in your logs
https://ift.tt/OMGaPYV
Submitted October 14, 2024 at 07:16PM by dbcid
via reddit https://ift.tt/qZt0MW2
https://ift.tt/OMGaPYV
Submitted October 14, 2024 at 07:16PM by dbcid
via reddit https://ift.tt/qZt0MW2
Trunc Logging
Threat Hunting: A Basic Guide to Log Analysis for Cybersecurity
Learn how to proactively identify cybersecurity threats through log analysis. This guide covers essential threat-hunting techniques, from detecting suspicious logins to flagging anomalies, ensuring your organization's defenses stay ahead of attackers.
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024 - watchTowr Labs
https://ift.tt/ZUYHzdE
Submitted October 14, 2024 at 10:00PM by dx7r__
via reddit https://ift.tt/G4j0PuE
https://ift.tt/ZUYHzdE
Submitted October 14, 2024 at 10:00PM by dx7r__
via reddit https://ift.tt/G4j0PuE
watchTowr Labs
Fortinet FortiGate CVE-2024-23113 - A Super Complex Vulnerability In A Super Secure Appliance In 2024
Today we'd like to share a recent journey into (yet another) SSLVPN appliance vulnerability - a Format String vulnerability, unusually, in Fortinet's FortiGate devices.
It affected (before patching) all currently-maintained branches, and recently was highlighted…
It affected (before patching) all currently-maintained branches, and recently was highlighted…
DLL Sideloading introduction & weaponization
https://ift.tt/UHtsrDA
Submitted October 15, 2024 at 02:29AM by S3cur3Th1sSh1t
via reddit https://ift.tt/U9mReHg
https://ift.tt/UHtsrDA
Submitted October 15, 2024 at 02:29AM by S3cur3Th1sSh1t
via reddit https://ift.tt/U9mReHg
www.r-tec.net
r-tec Blog | DLL Sideloading
The post describes DLL Sideloading, a technique that allows attackers to execute custom malicious code from within legitimate windows binaries/processes.
Container Hardening Process
https://ift.tt/MYpPTod
Submitted October 15, 2024 at 05:20PM by citypw
via reddit https://ift.tt/WOUAo5q
https://ift.tt/MYpPTod
Submitted October 15, 2024 at 05:20PM by citypw
via reddit https://ift.tt/WOUAo5q
hardenedlinux.org
Container Hardening Process
This is a step-by-step guide to the container hardening process on the GNU/Linux operating system. A containerized application (Podman with Pandoc) has been created for demonstration. The process begins with applying a customized Seccomp policy profile created…
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
Tracebit
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
We share a - now fixed - AWS vulnerability that would have enabled potentially undetectable data exfiltration from even the most locked down of AWS accounts by leveraging the audit trail itself to stealthily leak data.
Turning AWS Documentation into Gold: AI-Assisted Security Research
https://ift.tt/A9RjDXu
Submitted October 15, 2024 at 08:57PM by crustysecurity
via reddit https://ift.tt/n6xQGuD
https://ift.tt/A9RjDXu
Submitted October 15, 2024 at 08:57PM by crustysecurity
via reddit https://ift.tt/n6xQGuD
www.securityrunners.io
Turning AWS Documentation into Gold: AI-Assisted Security Research
In this article we went over how to use embeddings in AWS Bedrock, scraping AWS documentation, leveraging ripgrep for fast searches on local disk, and some interesting security research along the way.
search_vulns: Simplifying the Surprising Complexity of Finding Known Vulnerabilities
https://ift.tt/5WQyFPG
Submitted October 15, 2024 at 08:47PM by ra1nb0rn_
via reddit https://ift.tt/8DwLJVM
https://ift.tt/5WQyFPG
Submitted October 15, 2024 at 08:47PM by ra1nb0rn_
via reddit https://ift.tt/8DwLJVM
CloudGoat: New Scenario and Walkthrough (sns_secrets)
https://ift.tt/yhHIB0F
Submitted October 15, 2024 at 10:15PM by hackers_and_builders
via reddit https://ift.tt/Eto9yNY
https://ift.tt/yhHIB0F
Submitted October 15, 2024 at 10:15PM by hackers_and_builders
via reddit https://ift.tt/Eto9yNY
Rhino Security Labs
CloudGoat: New Scenario and Walkthrough (sns_secrets)
DTLS "ClientHello" Race Conditions in WebRTC Implementations
https://ift.tt/JrRxGhK
Submitted October 16, 2024 at 07:57PM by EnableSecurity
via reddit https://ift.tt/XBclW5V
https://ift.tt/JrRxGhK
Submitted October 16, 2024 at 07:57PM by EnableSecurity
via reddit https://ift.tt/XBclW5V
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
https://ift.tt/bHtOW5X
Submitted October 17, 2024 at 02:15AM by anvilventures
via reddit https://ift.tt/lYRzCy1
https://ift.tt/bHtOW5X
Submitted October 17, 2024 at 02:15AM by anvilventures
via reddit https://ift.tt/lYRzCy1
Anvil Secure
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
In short, the conntrack module, which tracks connections for the stateful firewall, does not account for the interface on which a connection was established. As a result, a firewall rule allowing…
DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami
https://ift.tt/R0ec1ru
Submitted October 17, 2024 at 09:03AM by fproulx
via reddit https://ift.tt/iKDz9jw
https://ift.tt/R0ec1ru
Submitted October 17, 2024 at 09:03AM by fproulx
via reddit https://ift.tt/iKDz9jw
[PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java
https://ift.tt/6EMhi15
Submitted October 17, 2024 at 11:50AM by vah_13
via reddit https://ift.tt/w0krQgM
https://ift.tt/6EMhi15
Submitted October 17, 2024 at 11:50AM by vah_13
via reddit https://ift.tt/w0krQgM
RedRays - Your SAP Security Solution
[PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java
Learn about the critical code injection vulnerability (CVE-2024-22127) in SAP NetWeaver AS Java Log Viewer plug-in. Discover mitigation steps and best practices to secure your SAP environment.
Escaping the Chrome Sandbox Through DevTools
https://ift.tt/ojk7Kyb
Submitted October 17, 2024 at 11:36AM by vk6_
via reddit https://ift.tt/dWXOqIl
https://ift.tt/ojk7Kyb
Submitted October 17, 2024 at 11:36AM by vk6_
via reddit https://ift.tt/dWXOqIl
ading.dev
Escaping the Chrome Sandbox Through DevTools
This blog post details how I found CVE-2024-6778 and CVE-2024-5836, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension.
DEF CON 32 talk recordings
https://www.youtube.com/playlist?list=PL9fPq3eQfaaB2scbXRczwvjVH0ckX4bwt
Submitted October 17, 2024 at 01:39PM by albinowax
via reddit https://ift.tt/T7p63CJ
https://www.youtube.com/playlist?list=PL9fPq3eQfaaB2scbXRczwvjVH0ckX4bwt
Submitted October 17, 2024 at 01:39PM by albinowax
via reddit https://ift.tt/T7p63CJ
YouTube
DEF CON 32 Main Stage Talks
Share your videos with friends, family, and the world