Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
https://ift.tt/xXeZYwi
Submitted October 15, 2024 at 05:08PM by tracebit
via reddit https://ift.tt/rzMw6HF
Tracebit
Breaching the Data Perimeter: CloudTrail as a mechanism for Data Exfiltration
We share a - now fixed - AWS vulnerability that would have enabled potentially undetectable data exfiltration from even the most locked down of AWS accounts by leveraging the audit trail itself to stealthily leak data.
Turning AWS Documentation into Gold: AI-Assisted Security Research
https://ift.tt/A9RjDXu
Submitted October 15, 2024 at 08:57PM by crustysecurity
via reddit https://ift.tt/n6xQGuD
https://ift.tt/A9RjDXu
Submitted October 15, 2024 at 08:57PM by crustysecurity
via reddit https://ift.tt/n6xQGuD
www.securityrunners.io
Turning AWS Documentation into Gold: AI-Assisted Security Research
In this article we went over how to use embeddings in AWS Bedrock, scraping AWS documentation, leveraging ripgrep for fast searches on local disk, and some interesting security research along the way.
search_vulns: Simplifying the Surprising Complexity of Finding Known Vulnerabilities
https://ift.tt/5WQyFPG
Submitted October 15, 2024 at 08:47PM by ra1nb0rn_
via reddit https://ift.tt/8DwLJVM
https://ift.tt/5WQyFPG
Submitted October 15, 2024 at 08:47PM by ra1nb0rn_
via reddit https://ift.tt/8DwLJVM
CloudGoat: New Scenario and Walkthrough (sns_secrets)
https://ift.tt/yhHIB0F
Submitted October 15, 2024 at 10:15PM by hackers_and_builders
via reddit https://ift.tt/Eto9yNY
https://ift.tt/yhHIB0F
Submitted October 15, 2024 at 10:15PM by hackers_and_builders
via reddit https://ift.tt/Eto9yNY
Rhino Security Labs
CloudGoat: New Scenario and Walkthrough (sns_secrets)
DTLS "ClientHello" Race Conditions in WebRTC Implementations
https://ift.tt/JrRxGhK
Submitted October 16, 2024 at 07:57PM by EnableSecurity
via reddit https://ift.tt/XBclW5V
https://ift.tt/JrRxGhK
Submitted October 16, 2024 at 07:57PM by EnableSecurity
via reddit https://ift.tt/XBclW5V
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
https://ift.tt/bHtOW5X
Submitted October 17, 2024 at 02:15AM by anvilventures
via reddit https://ift.tt/lYRzCy1
https://ift.tt/bHtOW5X
Submitted October 17, 2024 at 02:15AM by anvilventures
via reddit https://ift.tt/lYRzCy1
Anvil Secure
Spoofing Internal Packets for Multihomed Linux Devices - Anvil Secure
In short, the conntrack module, which tracks connections for the stateful firewall, does not account for the interface on which a connection was established. As a result, a firewall rule allowing…
DEF CON 32 - OH MY DC Abusing OIDC all the way to your cloud - Aviad Hahami
https://ift.tt/R0ec1ru
Submitted October 17, 2024 at 09:03AM by fproulx
via reddit https://ift.tt/iKDz9jw
https://ift.tt/R0ec1ru
Submitted October 17, 2024 at 09:03AM by fproulx
via reddit https://ift.tt/iKDz9jw
[PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java
https://ift.tt/6EMhi15
Submitted October 17, 2024 at 11:50AM by vah_13
via reddit https://ift.tt/w0krQgM
https://ift.tt/6EMhi15
Submitted October 17, 2024 at 11:50AM by vah_13
via reddit https://ift.tt/w0krQgM
RedRays - Your SAP Security Solution
[PoC] SAP Note 3433192 - Code Injection vulnerability in SAP NetWeaver AS Java
Learn about the critical code injection vulnerability (CVE-2024-22127) in SAP NetWeaver AS Java Log Viewer plug-in. Discover mitigation steps and best practices to secure your SAP environment.
Escaping the Chrome Sandbox Through DevTools
https://ift.tt/ojk7Kyb
Submitted October 17, 2024 at 11:36AM by vk6_
via reddit https://ift.tt/dWXOqIl
https://ift.tt/ojk7Kyb
Submitted October 17, 2024 at 11:36AM by vk6_
via reddit https://ift.tt/dWXOqIl
ading.dev
Escaping the Chrome Sandbox Through DevTools
This blog post details how I found CVE-2024-6778 and CVE-2024-5836, which are vulnerabilities within the Chromium web browser which allowed for a sandbox escape from a browser extension.
DEF CON 32 talk recordings
https://www.youtube.com/playlist?list=PL9fPq3eQfaaB2scbXRczwvjVH0ckX4bwt
Submitted October 17, 2024 at 01:39PM by albinowax
via reddit https://ift.tt/T7p63CJ
https://www.youtube.com/playlist?list=PL9fPq3eQfaaB2scbXRczwvjVH0ckX4bwt
Submitted October 17, 2024 at 01:39PM by albinowax
via reddit https://ift.tt/T7p63CJ
YouTube
DEF CON 32 Main Stage Talks
Share your videos with friends, family, and the world
CVE-2024-45844: Privilege escalation in F5 BIG-IP
https://ift.tt/kFWxNP4
Submitted October 17, 2024 at 04:52PM by AlmondOffSec
via reddit https://ift.tt/zsJvqyT
https://ift.tt/kFWxNP4
Submitted October 17, 2024 at 04:52PM by AlmondOffSec
via reddit https://ift.tt/zsJvqyT
Finding Vulnerability Variants at Scale
https://ift.tt/x7jfvcn
Submitted October 17, 2024 at 06:25PM by x30n
via reddit https://ift.tt/ICvrnbD
https://ift.tt/x7jfvcn
Submitted October 17, 2024 at 06:25PM by x30n
via reddit https://ift.tt/ICvrnbD
Blackwinghq
Finding Vulnerability Variants at Scale
Blackwing Intelligence provides high-end security engineering, analysis, and research services for engineering focused organizations
Call stack spoofing explained using APT41 malware
https://ift.tt/AnPL4oq
Submitted October 17, 2024 at 06:25PM by CyberMasterV
via reddit https://ift.tt/328ALJZ
https://ift.tt/AnPL4oq
Submitted October 17, 2024 at 06:25PM by CyberMasterV
via reddit https://ift.tt/328ALJZ
ONBUILD COPY . /var/www/pwned/
https://ift.tt/UOlpH7F
Submitted October 18, 2024 at 06:11AM by david-song
via reddit https://ift.tt/x5aZbt4
https://ift.tt/UOlpH7F
Submitted October 18, 2024 at 06:11AM by david-song
via reddit https://ift.tt/x5aZbt4
1-click Exploit in South Korea's biggest mobile chat app
https://ift.tt/OHps6dm
Submitted October 20, 2024 at 08:59PM by AlmondOffSec
via reddit https://ift.tt/mZMhwck
https://ift.tt/OHps6dm
Submitted October 20, 2024 at 08:59PM by AlmondOffSec
via reddit https://ift.tt/mZMhwck
stulle123
1-click Exploit in South Korea's biggest mobile chat app
Stealing another KakaoTalk user’s chat messages with a simple 1-click exploit.
Attacking APIs using JSON Injection
https://ift.tt/S9qmDX4
Submitted October 21, 2024 at 07:27AM by alt69785
via reddit https://ift.tt/IlfTYPQ
https://ift.tt/S9qmDX4
Submitted October 21, 2024 at 07:27AM by alt69785
via reddit https://ift.tt/IlfTYPQ
Dana Epp's Blog
Attacking APIs using JSON Injection
Learn how to use JSON injection to manipulate API payloads to control the flow of data and business logic within an API.
SELinux bypasses
https://ift.tt/5G3m8ZC
Submitted October 23, 2024 at 11:46AM by ffyns
via reddit https://ift.tt/AXVFWKq
https://ift.tt/5G3m8ZC
Submitted October 23, 2024 at 11:46AM by ffyns
via reddit https://ift.tt/AXVFWKq
Klecko Blog
SELinux bypasses
This post aims at giving an overview of what SELinux is, how it is implemented, and how to bypass it, from the point of view of Android kernel exploitation.
SQL Injection Polyglots / nastystereo.com
https://ift.tt/klmhEXL
Submitted October 23, 2024 at 11:45AM by ffyns
via reddit https://ift.tt/Tfi74PU
https://ift.tt/klmhEXL
Submitted October 23, 2024 at 11:45AM by ffyns
via reddit https://ift.tt/Tfi74PU
The EMBA binary analyzer addresses SBOMs with new release - SBOMdorado v1.5.0 is available
https://ift.tt/aYuBhCq
Submitted October 22, 2024 at 10:38PM by _m-1-k-3_
via reddit https://ift.tt/pixUqf4
https://ift.tt/aYuBhCq
Submitted October 22, 2024 at 10:38PM by _m-1-k-3_
via reddit https://ift.tt/pixUqf4
GitHub
Release EMBA v1.5.0 - SBOMdorado · e-m-b-a/emba
The main goal of EMBA was always to get an accurate real life overview of the threats of a firmware image. While a few years ago the target audience were only pentesters, in today’s EMBA world also...
Auth RCE in multiple Xerox printer series
https://ift.tt/vHUcquo
Submitted October 23, 2024 at 02:20PM by 0x9000
via reddit https://ift.tt/uVWgnHj
https://ift.tt/vHUcquo
Submitted October 23, 2024 at 02:20PM by 0x9000
via reddit https://ift.tt/uVWgnHj
SEC Consult
Authenticated Remote Code Execution in multiple Xerox printers
Multiple Xerox printers (EC80xx, AltaLink, VersaLink, WorkCentre) were affected by an authenticated remote code execution vulnerability which allowed an attacker with administrative web credentials to fully compromise the devices with root privileges on the…
Using Nix to Fuzz Test a PDF Parser
https://ift.tt/NnhycRG
Submitted October 23, 2024 at 08:28PM by mtlynch
via reddit https://ift.tt/udDFf9t
https://ift.tt/NnhycRG
Submitted October 23, 2024 at 08:28PM by mtlynch
via reddit https://ift.tt/udDFf9t
mtlynch.io
Using Nix to Fuzz Test a PDF Parser (Part One)
Fuzz testing is a technique for automatically uncovering bugs in software. The problem is that it’s a pain to set up. Read any fuzz testing tutorial, and the first task is an hour of building tools from source and chasing down dependencies upon dependencies.…