Dissecting JA4H for improved Sliver C2 detections
https://ift.tt/oethDJH
Submitted November 29, 2024 at 02:57PM by zynth-
via reddit https://ift.tt/3RBZ8e4
https://ift.tt/oethDJH
Submitted November 29, 2024 at 02:57PM by zynth-
via reddit https://ift.tt/3RBZ8e4
Webscout Tech Blog
Dissecting JA4H for improved Sliver C2 detections
Background
On November 18, 2024, Palo Alto Networks announced the discovery of two critical vulnerabilities, CVE-2024-0012 and CVE-2024-9474, in the operating system that powers their firewall devices. The following day, watchTowr published a report detailing…
On November 18, 2024, Palo Alto Networks announced the discovery of two critical vulnerabilities, CVE-2024-0012 and CVE-2024-9474, in the operating system that powers their firewall devices. The following day, watchTowr published a report detailing…
Lights Out: software control of the webcam LED on ThinkPad X230 without physical access to the laptop
https://ift.tt/xY7w3GP
Submitted November 28, 2024 at 06:21PM by AlmondOffSec
via reddit https://ift.tt/HTu6ne2
https://ift.tt/xY7w3GP
Submitted November 28, 2024 at 06:21PM by AlmondOffSec
via reddit https://ift.tt/HTu6ne2
GitHub
GitHub - xairy/lights-out: Tools for controlling webcam LED on ThinkPad X230
Tools for controlling webcam LED on ThinkPad X230. Contribute to xairy/lights-out development by creating an account on GitHub.
MSSQL Identified as Vulnerable to Emoji String Exploitation
https://ift.tt/jhdJWX6
Submitted November 29, 2024 at 10:36PM by PacketsForward
via reddit https://ift.tt/19mdHS2
https://ift.tt/jhdJWX6
Submitted November 29, 2024 at 10:36PM by PacketsForward
via reddit https://ift.tt/19mdHS2
Decrypt LOL
MSSQL Identified as Vulnerable to Emoji String Exploitation
Microsoft SQL Server has been found to treat a goblin emoji as equivalent to an empty string, potentially leading to security vulnerabilities in applications that utilize it.
New TryHackMe Room: AI Security Fundamentals – Learn AI Security and Pentesting
https://ift.tt/2MV6D7q
Submitted November 30, 2024 at 12:08AM by Educational-Duck9827
via reddit https://ift.tt/KAyNxcs
https://ift.tt/2MV6D7q
Submitted November 30, 2024 at 12:08AM by Educational-Duck9827
via reddit https://ift.tt/KAyNxcs
TryHackMe
TryHackMe | Cyber Security Training
TryHackMe is a free online platform for learning cyber security, using hands-on exercises and labs, all through your browser!
The fascinating security model of dark web marketplaces
https://ift.tt/ZOP4Sre
Submitted December 01, 2024 at 10:34PM by upofadown
via reddit https://ift.tt/wYl10rZ
https://ift.tt/ZOP4Sre
Submitted December 01, 2024 at 10:34PM by upofadown
via reddit https://ift.tt/wYl10rZ
boehs.org
The Fascinating Security Model of Dark Web Marketplaces
Captchas, Monero, Scams and absolutely no JavaScript
Mystery google.com certificate issued by Brazilian CA
https://ift.tt/NVRTPfZ
Submitted December 02, 2024 at 05:09AM by riking27
via reddit https://ift.tt/8XJHjMd
https://ift.tt/NVRTPfZ
Submitted December 02, 2024 at 05:09AM by riking27
via reddit https://ift.tt/8XJHjMd
bugzilla.mozilla.org
1934361 - ICP-Brasil: Mis-issued certificate
UNCONFIRMED (nobody) in CA Program - CA Certificate Compliance. Last updated 2024-12-01.
Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN
https://ift.tt/thmEVyg
Submitted December 02, 2024 at 05:26PM by barakadua131
via reddit https://ift.tt/XJBaf0r
https://ift.tt/thmEVyg
Submitted December 02, 2024 at 05:26PM by barakadua131
via reddit https://ift.tt/XJBaf0r
Mobile Hacker
Cybercriminals Use NFC Relay to Turn Stolen Credit Cards into Cash without a PIN Mobile Hacker
ThreatFabric has identified a new cash-out tactic that wasn’t seen before called “Ghost Tap”, which cybercriminals use to exploit stolen credit card details linked to mobile payment services like Google Pay and Apple Pay. This method involves relaying NFC…
Research: Automated attacks defeats secrets rotation
https://go.clut.ch/m7t
Submitted December 02, 2024 at 07:37PM by galchock
via reddit https://ift.tt/OcVmCK0
https://go.clut.ch/m7t
Submitted December 02, 2024 at 07:37PM by galchock
via reddit https://ift.tt/OcVmCK0
Clutch Security
Clutch - The Day We Unveiled the Secret Rotation Illusion
Learn how Clutch Security debunked the myth of secret rotation with evidence-based research, revealing how attackers exploit exposed Non-Human Identities in seconds. Discover why traditional practices fall short and how Zero Trust and ephemeral identities…
Breaking Down Adversarial Machine Learning Attacks Through Red Team Challenges
https://ift.tt/rc1FmBP
Submitted December 03, 2024 at 02:29AM by WiseTuna
via reddit https://ift.tt/E5scOKW
https://ift.tt/rc1FmBP
Submitted December 03, 2024 at 02:29AM by WiseTuna
via reddit https://ift.tt/E5scOKW
Boschko Security Blog
Breaking Down Adversarial Machine Learning Attacks Through AI/ML Red Team Challenges
Explore adversarial attacks on AI/ML models through hands-on challenges on Dreadnode’s Crucible CTF platform.
Pentesting Salesforce Communities
https://ift.tt/g4qth2n
Submitted December 03, 2024 at 03:47AM by smaury
via reddit https://ift.tt/yrIHY8f
https://ift.tt/g4qth2n
Submitted December 03, 2024 at 03:47AM by smaury
via reddit https://ift.tt/yrIHY8f
0xbro
Pentesting Salesforce Communities
This blog post shows a recent penetration test I performed for some customers’ Salesforce applications (also called Salesforce Communities), in which I exploited some common and other lesser-known flaws, which eventually led to an account takeover vulnerability.…
OAuth Labs: OAuth 2.0 Vulnerabilites
https://ift.tt/17asXdp
Submitted December 03, 2024 at 08:12PM by cyllective
via reddit https://ift.tt/rKutWBv
https://ift.tt/17asXdp
Submitted December 03, 2024 at 08:12PM by cyllective
via reddit https://ift.tt/rKutWBv
Cyllective
OAuth Labs: OAuth 2.0 Vulnerabilites
Introducing our latest project: the OAuth Labs. A hands-on approach to OAuth 2.0 vulnerabilities
A step-by-step intro to Client Side Path-Traversal with Eval Villain
https://ift.tt/fhQzvcm
Submitted December 03, 2024 at 09:38PM by nibblesec
via reddit https://ift.tt/ADgCFme
https://ift.tt/fhQzvcm
Submitted December 03, 2024 at 09:38PM by nibblesec
via reddit https://ift.tt/ADgCFme
CloudGoat Official Walkthrough Series: ‘sqs_flag_shop’
https://ift.tt/0EKdHWz
Submitted December 03, 2024 at 11:14PM by hackers_and_builders
via reddit https://ift.tt/ZbL7NwM
https://ift.tt/0EKdHWz
Submitted December 03, 2024 at 11:14PM by hackers_and_builders
via reddit https://ift.tt/ZbL7NwM
Rhino Security Labs
CloudGoat Official Walkthrough Series: ‘sqs_flag_shop’ - Rhino Security Labs
This post walks through a new CloudGoat scenario, sqs_flag_shop in AWS.
XS-Leaks through Speculation Rules
https://ift.tt/BRoaLKg
Submitted December 04, 2024 at 09:42AM by ffyns
via reddit https://ift.tt/dQN1opL
https://ift.tt/BRoaLKg
Submitted December 04, 2024 at 09:42AM by ffyns
via reddit https://ift.tt/dQN1opL
Satoooonの物置
XS-Leaks through Speculation-Rules - SECCON CTF 13 Author's Writeup ( Tanuki Udon ) - Satoooonの物置
JP (Translated by ChatGPT) In this article, I'll explain the intended solution for the "Tanuki Udon" challenge presented in SECCON CTF 13. TL;DR An XS-Leaks att…
Gem::SafeMarshal escape / nastystereo.com
https://ift.tt/ciWkxFS
Submitted December 04, 2024 at 10:55AM by ffyns
via reddit https://ift.tt/XMibjgU
https://ift.tt/ciWkxFS
Submitted December 04, 2024 at 10:55AM by ffyns
via reddit https://ift.tt/XMibjgU
DroidBot: Insights from a new Turkish MaaS fraud operation | Cleafy Labs
https://ift.tt/JnKu5zi
Submitted December 04, 2024 at 08:36PM by f3d_0x0
via reddit https://ift.tt/LPFOzoB
https://ift.tt/JnKu5zi
Submitted December 04, 2024 at 08:36PM by f3d_0x0
via reddit https://ift.tt/LPFOzoB
Cleafy
DroidBot: Insights from a new Turkish MaaS fraud operation | Cleafy Labs
Cleafy Labs reveals DroidBot, a new Android Remote Access Trojan targeting banks, crypto exchanges, and national organisations in Europe and beyond. Learn how it operates with dual-channel communication and evolving tactics. Read here the full report.
Bypassing WAFs with the phantom $Version cookie
https://ift.tt/SviFzk8
Submitted December 04, 2024 at 09:09PM by albinowax
via reddit https://ift.tt/Y6TtnQ5
https://ift.tt/SviFzk8
Submitted December 04, 2024 at 09:09PM by albinowax
via reddit https://ift.tt/Y6TtnQ5
An open-source tool to find technologies through multiple internet search engine platforms using a unified, user-friendly syntax.
https://ift.tt/TEeUoxa
Submitted December 04, 2024 at 04:55PM by SilverProgram6449
via reddit https://ift.tt/tyYgerD
https://ift.tt/TEeUoxa
Submitted December 04, 2024 at 04:55PM by SilverProgram6449
via reddit https://ift.tt/tyYgerD
GitHub
GitHub - abuyv/exposor: Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.
Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax. - abuyv/exposor
Packetstorm "reboot".... uhhh....no... just NO!
https://ift.tt/dhHjXsC
Submitted December 05, 2024 at 04:32PM by VeNoMouSNZ
via reddit https://ift.tt/OkJMDaz
https://ift.tt/dhHjXsC
Submitted December 05, 2024 at 04:32PM by VeNoMouSNZ
via reddit https://ift.tt/OkJMDaz
packetstorm.news
Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories, and Whitepapers
Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day - watchTowr Labs
https://ift.tt/ZgqCiGo
Submitted December 05, 2024 at 05:12PM by dx7r__
via reddit https://ift.tt/8MCuEQ7
https://ift.tt/ZgqCiGo
Submitted December 05, 2024 at 05:12PM by dx7r__
via reddit https://ift.tt/8MCuEQ7
watchTowr Labs
Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day
It is not just APTs that like to target telephone systems, but ourselves at watchTowr too.
We can't overstate the consequences of an attacker crossing the boundary from the 'computer system' to the 'telephone system'. We've seen attackers realise this in…
We can't overstate the consequences of an attacker crossing the boundary from the 'computer system' to the 'telephone system'. We've seen attackers realise this in…
How cybercriminals are outpacing macOS security in 2024
https://ift.tt/oRe6nf3
Submitted December 06, 2024 at 04:20AM by Individual-Gas5276
via reddit https://ift.tt/bx03mTk
https://ift.tt/oRe6nf3
Submitted December 06, 2024 at 04:20AM by Individual-Gas5276
via reddit https://ift.tt/bx03mTk
Moonlock
Moonlock's 2024 macOS threat report
A deep dive into macOS malware this year.