Announcing the External Penetration Testing Program Pack
https://ift.tt/5ZhYzLs
Submitted December 28, 2024 at 05:44AM by SecTemplates
via reddit https://ift.tt/RMtyIqs
https://ift.tt/5ZhYzLs
Submitted December 28, 2024 at 05:44AM by SecTemplates
via reddit https://ift.tt/RMtyIqs
SecTemplates.com
Announcing the External Penetration Testing Program Pack v1.1
This release contains everything you need to scope your first pentest, work with a vendor, execute, and get the types of reports you need from an external tester. This will enable you to perform your first product or infrastructure level penetration test…
Performing AD LDAP Queries Like a Ninja | CravateRouge Ltd
https://ift.tt/UO0FHSt
Submitted December 28, 2024 at 11:01AM by CravateRouge
via reddit https://ift.tt/uyLvjcb
https://ift.tt/UO0FHSt
Submitted December 28, 2024 at 11:01AM by CravateRouge
via reddit https://ift.tt/uyLvjcb
CravateRouge Ltd
Performing AD LDAP Queries Like a Ninja | CravateRouge Ltd
Strategies to minimize logging generation, and methods to enhance logging efficiency
Volkswagen's bad streak: They know where your car is, Chaos Computer Club says – and they don't know how to secure it properly.
https://ift.tt/K31jQsm
Submitted December 29, 2024 at 07:12PM by ReynardSec
via reddit https://ift.tt/fHLh6BN
https://ift.tt/K31jQsm
Submitted December 29, 2024 at 07:12PM by ReynardSec
via reddit https://ift.tt/fHLh6BN
ReynardSec
Home
ReynardSec - Cybersecurity Advisor
NFS Security: Identifying and Exploiting Misconfigurations
https://ift.tt/XoK1Yim
Submitted December 30, 2024 at 01:39AM by edermi
via reddit https://ift.tt/gFUjyb7
https://ift.tt/XoK1Yim
Submitted December 30, 2024 at 01:39AM by edermi
via reddit https://ift.tt/gFUjyb7
HvS-Consulting
NFS Security: Identifying and Exploiting Misconfigurations | HvS-Consulting
Understand security features, misconfigurations and technical attacks on NFS shares.
Simple Prompts to get the System Prompts
https://ift.tt/ZRPIyfb
Submitted December 30, 2024 at 09:25AM by 0xcrypto
via reddit https://ift.tt/vLSldhs
https://ift.tt/ZRPIyfb
Submitted December 30, 2024 at 09:25AM by 0xcrypto
via reddit https://ift.tt/vLSldhs
eval.blog
Simple Prompts to get the System Prompts
This site contains research, technical papers, projects, and insights on systems programming, security, artificial intelligence, and game development by Vikrant aka 0xcrypto.
From Arbitrary File Write to RCE in Restricted Rails apps
https://ift.tt/RP52iU7
Submitted December 30, 2024 at 07:33PM by sercurity
via reddit https://ift.tt/iT0V9vo
https://ift.tt/RP52iU7
Submitted December 30, 2024 at 07:33PM by sercurity
via reddit https://ift.tt/iT0V9vo
Conviso AppSec
From Arbitrary File Write to RCE in Restricted Rails apps
We describe a technique that can be used to achieve remote code execution (RCE) from an arbitrary file write vulnerability by abusing the cache mechanism of Bootsnap.
Dumping Memory to Bypass BitLocker on Windows 11
https://ift.tt/0rvIpwo
Submitted December 30, 2024 at 11:17PM by NoInitialRamdisk
via reddit https://ift.tt/hwmMN9p
https://ift.tt/0rvIpwo
Submitted December 30, 2024 at 11:17PM by NoInitialRamdisk
via reddit https://ift.tt/hwmMN9p
Dumping Memory to Bypass BitLocker on Windows 11
Intro
A UEFI application for dumping the contents of RAM.
Bypassing Google's Magika AI
https://ift.tt/QqvZUJN
Submitted December 31, 2024 at 01:07AM by s0md3v
via reddit https://ift.tt/K6P4tf5
https://ift.tt/QqvZUJN
Submitted December 31, 2024 at 01:07AM by s0md3v
via reddit https://ift.tt/K6P4tf5
Somdev Sangwan - blog
Bypassing Google's Magika & Bullying AI
Somdev Sangwan - Security & Automatation Researcher
Userland Exec bypassing bypassing SELinux's execmem, mprotect, and W^X
https://ift.tt/p82eBTX
Submitted December 31, 2024 at 09:46AM by hardenedvault
via reddit https://ift.tt/T5RgJaK
https://ift.tt/p82eBTX
Submitted December 31, 2024 at 09:46AM by hardenedvault
via reddit https://ift.tt/T5RgJaK
GitHub
GitHub - hardenedlinux/userland-exec: Userland exec PoC to be used as attack vector technique
Userland exec PoC to be used as attack vector technique - hardenedlinux/userland-exec
Baby level guide to path-traversal
https://ift.tt/KPtiMrc
Submitted January 01, 2025 at 03:50PM by p0rkan0xff
via reddit https://ift.tt/SIL5Uap
https://ift.tt/KPtiMrc
Submitted January 01, 2025 at 03:50PM by p0rkan0xff
via reddit https://ift.tt/SIL5Uap
How a Malicious Update Brought Crypto Mining to Lottie Player Users
https://ift.tt/2N8ouy7
Submitted January 01, 2025 at 07:02PM by alodiasaradith07
via reddit https://ift.tt/QmCvpaY
https://ift.tt/2N8ouy7
Submitted January 01, 2025 at 07:02PM by alodiasaradith07
via reddit https://ift.tt/QmCvpaY
Clutch Security
Token Trouble: How a Malicious Update Brought Crypto Mining to Lottie Player Users
A malicious npm token update triggered a crypto-mining attack via Lottie-player. Learn how to prevent NHI breaches with Zero Trust and proa…
CVE-2024-54819 - I Librarian SSRF
https://ift.tt/zpwPXQK
Submitted January 02, 2025 at 12:36AM by AlbatrossMaximum4489
via reddit https://ift.tt/PdrOMR6
https://ift.tt/zpwPXQK
Submitted January 02, 2025 at 12:36AM by AlbatrossMaximum4489
via reddit https://ift.tt/PdrOMR6
www.partywave.site
cve-2024-54819-i-librarian-server-side-request-forgery
Discover cve-2024-54819-i-librarian-server-side-request-forgery article on partywave.
/r/netsec's Q1 2025 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 02, 2025 at 03:13AM by netsec_burn
via reddit https://ift.tt/PoK4iSU
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere. Include the geographic location of the position along with the availability of relocation assistance or remote work.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted January 02, 2025 at 03:13AM by netsec_burn
via reddit https://ift.tt/PoK4iSU
Reddit
From the netsec community on Reddit
Explore this post and more from the netsec community
GitHub - musana/CF-Hero: CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications. The tool can also distinguish between domains that are protected by Cloudflare and those that are not.
https://ift.tt/uTivDnc
Submitted January 02, 2025 at 01:54PM by 0xmusana
via reddit https://ift.tt/Az7ncCx
https://ift.tt/uTivDnc
Submitted January 02, 2025 at 01:54PM by 0xmusana
via reddit https://ift.tt/Az7ncCx
GitHub
GitHub - musana/CF-Hero: CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of…
CF-Hero is a reconnaissance tool that uses multiple data sources to discover the origin IP addresses of Cloudflare-protected web applications - musana/CF-Hero
AWS introduced same RCE vulnerability three times in four years
https://ift.tt/NV2eIkT
Submitted January 04, 2025 at 04:47PM by ranker_
via reddit https://ift.tt/KT7orWz
https://ift.tt/NV2eIkT
Submitted January 04, 2025 at 04:47PM by ranker_
via reddit https://ift.tt/KT7orWz
Remote Code Execution (RCE) Exploits | CVE-2024-6782 | Ocsaly Academy
https://ift.tt/xOo8tAI
Submitted January 05, 2025 at 08:07AM by ocsaly
via reddit https://ift.tt/B0oeiYH
https://ift.tt/xOo8tAI
Submitted January 05, 2025 at 08:07AM by ocsaly
via reddit https://ift.tt/B0oeiYH
Software Defined Radio Training (Online 9+Hours) - CSDR+ - Ocsaly Academy
https://ift.tt/Di30cwm
Submitted January 05, 2025 at 08:06AM by ocsaly
via reddit https://ift.tt/QjefSma
https://ift.tt/Di30cwm
Submitted January 05, 2025 at 08:06AM by ocsaly
via reddit https://ift.tt/QjefSma
Metasploitable 3 Walkthrough
https://ift.tt/lp2mwvV
Submitted January 06, 2025 at 04:27AM by SL7reach
via reddit https://ift.tt/XGDSdT2
https://ift.tt/lp2mwvV
Submitted January 06, 2025 at 04:27AM by SL7reach
via reddit https://ift.tt/XGDSdT2
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
Metasploitable3 Walkthrough: Penetration Testing (Part 1)
Metasploitable3 is an updated version of Metasploitable2, developed to provide a more realistic environment for practicing advanced penetration testing techniques. This version introduces new...
Argo Workflows - Uncovering the Hidden Misconfigurations
https://ift.tt/O8YMW0Q
Submitted January 06, 2025 at 04:43PM by eranvak
via reddit https://ift.tt/q7jLEYx
https://ift.tt/O8YMW0Q
Submitted January 06, 2025 at 04:43PM by eranvak
via reddit https://ift.tt/q7jLEYx
www.evasec.io
Argo Workflows - Uncovering the Hidden Misconfigurations | E.V.A
Misconfigured Argo Workflows may result in a massive supply chain attack
The less you reveal the better! A short overview of frequently overlooked User Enumeration Vulnerability
https://ift.tt/EmDXIZh
Submitted January 07, 2025 at 01:45AM by 42-is-the-number
via reddit https://ift.tt/2KyiXY4
https://ift.tt/EmDXIZh
Submitted January 07, 2025 at 01:45AM by 42-is-the-number
via reddit https://ift.tt/2KyiXY4
Medium
TMI — Too Much Information. The less you reveal the better!
A short overview of frequently overlooked vulnerability with real world examples
SMB3 Kernel Server (ksmbd) fuzzing and vulns
https://ift.tt/60sF7cH
Submitted January 07, 2025 at 09:15PM by nibblesec
via reddit https://ift.tt/jJcKe7T
https://ift.tt/60sF7cH
Submitted January 07, 2025 at 09:15PM by nibblesec
via reddit https://ift.tt/jJcKe7T