Reverse Engineering the Parrot Anafi Drone: Control Start/Land via PC
https://ift.tt/2YLKTQf
Submitted November 11, 2024 at 02:13AM by f3nter
via reddit https://ift.tt/s7PuYkB
https://ift.tt/2YLKTQf
Submitted November 11, 2024 at 02:13AM by f3nter
via reddit https://ift.tt/s7PuYkB
www.hardbreak.wiki
Parrot Anafi Drone Reverse Engineering | HardBreak
Red Team and Pentest anecdotes
https://ift.tt/YWTMBSZ
Submitted November 11, 2024 at 04:14PM by _kawhl
via reddit https://ift.tt/0Ne67Ay
https://ift.tt/YWTMBSZ
Submitted November 11, 2024 at 04:14PM by _kawhl
via reddit https://ift.tt/0Ne67Ay
therealunicornsecurity.github.io
Tales of the Crimson Foes
The Tales of the Crimson Foes
A compilation of red team and pentest stories
A compilation of red team and pentest stories
Bypass GuardDuty Pentest Findings for the AWS CLI
https://ift.tt/NAy1SFv
Submitted November 11, 2024 at 09:21PM by RedTermSession
via reddit https://ift.tt/iA6NBWr
https://ift.tt/NAy1SFv
Submitted November 11, 2024 at 09:21PM by RedTermSession
via reddit https://ift.tt/iA6NBWr
hackingthe.cloud
Bypass GuardDuty Pentest Findings for the AWS CLI - Hacking The Cloud
Prevent Kali Linux, ParrotOS, and Pentoo Linux from throwing GuardDuty alerts by modifying the User Agent string when using the AWS CLI.
Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1
https://ift.tt/rZOb70t
Submitted November 12, 2024 at 08:13PM by onlinereadme
via reddit https://ift.tt/khyHoXe
https://ift.tt/rZOb70t
Submitted November 12, 2024 at 08:13PM by onlinereadme
via reddit https://ift.tt/khyHoXe
Medium
Everyday Ghidra: Ghidra Data Types— When to Create Custom GDTs — Part 1
In this 2-part “Everyday Ghidra” series post, we’ll walk through creating custom Ghidra data types by parsing C header files. In Everyday…
System Prompt Exposure: How AI Image Generators May Leak Sensitive Instructions
https://ift.tt/mOJWR29
Submitted November 12, 2024 at 09:32PM by Ok_Information1453
via reddit https://ift.tt/yFWYvP1
https://ift.tt/mOJWR29
Submitted November 12, 2024 at 09:32PM by Ok_Information1453
via reddit https://ift.tt/yFWYvP1
Invicti
System Prompt Exposure: How AI Image Generators May Leak Sensitive Instructions
Recraft's image generation service uses a unique architecture combining an LLM (Claude) with a diffusion model. Learn what led to the discovery that carefully crafted prompts could expose the system's internal instructions.
Citrix Virtual Apps and Desktops (XEN) Unauthenticated Remote Code execution
https://ift.tt/X8RlmsY
Submitted November 12, 2024 at 10:38PM by TheL0singEdge
via reddit https://ift.tt/1EfxHBC
https://ift.tt/X8RlmsY
Submitted November 12, 2024 at 10:38PM by TheL0singEdge
via reddit https://ift.tt/1EfxHBC
watchTowr Labs
Visionaries Have Democratised Remote Network Access - Citrix Virtual Apps and Desktops (CVE-2024-8068 and CVE-2024-8069)
Well, we’re back again, with yet another fresh-off-the-press bug chain (and associated Interactive Artifact Generator). This time, it’s in Citrix’s “Virtual Apps and Desktops” offering.
This is a tech stack that enables end-users (and likely, your friendly…
This is a tech stack that enables end-users (and likely, your friendly…
Announcing a New Probely Chapter, As We Join Snyk's Family
https://ift.tt/hjivM6Z
Submitted November 13, 2024 at 06:51AM by petermal67
via reddit https://ift.tt/csPYk8n
https://ift.tt/hjivM6Z
Submitted November 13, 2024 at 06:51AM by petermal67
via reddit https://ift.tt/csPYk8n
https://probely.com
Announcing a New Probely Chapter, As We Join Snyk's Family
Probely has been acquired by Snyk, an industry leader in developer security. Learn more about the acquisition in this article.
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight
https://ift.tt/qskEWY0
Submitted November 13, 2024 at 09:08AM by Smooth-Loquat-4954
via reddit https://ift.tt/57osZyd
https://ift.tt/qskEWY0
Submitted November 13, 2024 at 09:08AM by Smooth-Loquat-4954
via reddit https://ift.tt/57osZyd
Workos
Ruby SAML CVE-2024-45409: As bad as it gets and hiding in plain sight — WorkOS
On September 10th, 2024, a critical security flaw was disclosed in the Ruby-SAML and OmniAuth-SAML libraries, exposing a vulnerability that allows complete authentication bypass. This flaw, CVE-2024-45409, earned the highest possible score of 10 on GitHub's…
Fault Injection - Down the Rabbit Hole
https://ift.tt/wfrkPG1
Submitted November 13, 2024 at 02:58PM by 0xdea
via reddit https://ift.tt/0qpyf5J
https://ift.tt/wfrkPG1
Submitted November 13, 2024 at 02:58PM by 0xdea
via reddit https://ift.tt/0qpyf5J
HN Security
Fault Injection - Down the Rabbit Hole - HN Security
Intro This series of articles describes fault injection attack techniques in order to understand their real potential by testing their […]
The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
https://ift.tt/va2jMK0
Submitted November 13, 2024 at 02:53PM by sh0n1z
via reddit https://ift.tt/bAUEPlj
Claroty
The Problem with IoT Cloud-Connectivity and How it Exposed All OvrC Devices to Hijacking
Team82 researched the security of the OvrC cloud platform, which is used by businesses and consumers to remotely manage IoT devices. We uncovered 10 different vulnerabilities that, when chained, allow attackers to execute code on OvrC cloud-connected devices…
The cost of a NAND chip off attack is 170.83€
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
https://ift.tt/CxApPvs
Submitted November 13, 2024 at 09:20PM by gquere
via reddit https://ift.tt/FmzOjLC
Attestations: A new generation of signatures on PyPI
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
https://ift.tt/XYTFCJm
Submitted November 14, 2024 at 08:06PM by yossarian_flew_away
via reddit https://ift.tt/PdVFvkh
The Trail of Bits Blog
Attestations: A new generation of signatures on PyPI
For the past year, we’ve worked with the Python Package Index (PyPI) on a new security feature for the Python ecosystem: index-hosted digital attestations, as specified in PEP 740. These attestations improve on traditional PGP signatures (which have been…
The Definitive Guide to Linux Process Injection
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
https://ift.tt/Lt1uIzg
Submitted November 14, 2024 at 09:08PM by oridavid1231
via reddit https://ift.tt/qSvznYi
Akamai
The Definitive Guide to Linux Process Injection | Akamai
In this blog post, we document Linux process injection techniques, and explain how to detect and mitigate them.
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575 - watchTowr Labs
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
https://ift.tt/WrcavYC
Submitted November 14, 2024 at 10:04PM by dx7r__
via reddit https://ift.tt/6MWiDOh
watchTowr Labs
Hop-Skip-FortiJump-FortiJump-Higher - Fortinet FortiManager CVE-2024-47575
It’s been a tricky time for Fortinet (and their customers) lately - arguably, even more so than usual. Adding to the steady flow of vulnerabilities in appliances recently was a nasty CVSS 9.8 vulnerability in FortiManager, their tool for central management…
PAN-SA-2024-0015 Critical Security Bulletin: Ensure Access to Management Interface is Secured
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
https://ift.tt/8iXbUeB
Submitted November 15, 2024 at 05:21AM by SigmaSixShooter
via reddit https://ift.tt/XIjn8bK
Palo Alto Networks Product Security Assurance
CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perfor...
Reproducing CVE-2024-10979: A Step-by-Step Guide
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
https://ift.tt/K1NtRwU
Submitted November 15, 2024 at 05:14PM by vah_13
via reddit https://ift.tt/JjfzZPU
RedRays - Your SAP Security Solution
Reproducing CVE-2024-10979: A Step-by-Step Guide
Discover how to reproduce CVE-2024-10979, a vulnerability in PostgreSQL's trusted PL/Perl, through this detailed step-by-step guide. Learn about the security implications and the importance of applying patches to safeguard your database systems.
TCL substitution of global parameter values in Gaia Portal
https://ift.tt/kibXSAW
Submitted November 15, 2024 at 06:37PM by Mission_Detail_8153
via reddit https://ift.tt/PK8bGIX
https://ift.tt/kibXSAW
Submitted November 15, 2024 at 06:37PM by Mission_Detail_8153
via reddit https://ift.tt/PK8bGIX
Zeronvll
TCL substitution of global parameter values in Gaia Portal
Authenticated Gaia users, at least read-only privilege, can inject code or commands by global variables through HTTP requests.
Open-Source PowerHuntShares.v2 - Find Shares, Extract Passwords, and Fingerprint with LLM
https://ift.tt/StzhCbp
Submitted November 15, 2024 at 07:46PM by Nullbind
via reddit https://ift.tt/7ZiDszW
https://ift.tt/StzhCbp
Submitted November 15, 2024 at 07:46PM by Nullbind
via reddit https://ift.tt/7ZiDszW
NetSPI
Hunting SMB Shares, Again! Charts, Graphs, Passwords & LLM Magic for PowerHuntShares 2.0
Learn how to identify, understand, attack, and remediate SMB shares configured with excessive privilege in active directory environments with the help of new charts, graphs, and LLM capabilities.
Unpatched Remote Code Execution in Gogs
https://ift.tt/ESRy9xD
Submitted November 16, 2024 at 02:15AM by fysac2
via reddit https://ift.tt/OFqrZL5
https://ift.tt/ESRy9xD
Submitted November 16, 2024 at 02:15AM by fysac2
via reddit https://ift.tt/OFqrZL5
Vulnerability research and more
Unpatched Remote Code Execution in Gogs
The Gogs self-hosted Git service is vulnerable to symbolic link path traversal that enables remote code execution (CVE-2024-44625). The latest version at the time of writing (0.13.0) is affected. This vulnerability is exploitable against a default install…
🌪️Heads up trainers: TyphoonCon 2025 Call for Training is now open!
https://ift.tt/uCWxaps
Submitted November 17, 2024 at 04:20PM by Straight-Zombie-646
via reddit https://ift.tt/UcBHOqd
https://ift.tt/uCWxaps
Submitted November 17, 2024 at 04:20PM by Straight-Zombie-646
via reddit https://ift.tt/UcBHOqd
Exploring the DOMPurify library: Bypasses and Fixes
https://ift.tt/dI0ToO2
Submitted November 17, 2024 at 09:36PM by albinowax
via reddit https://ift.tt/JRBNOsI
https://ift.tt/dI0ToO2
Submitted November 17, 2024 at 09:36PM by albinowax
via reddit https://ift.tt/JRBNOsI
mizu.re
Exploring the DOMPurify library: Bypasses and Fixes (1/2). Tags:Article - Article - Web - mXSS