New Hacking Book – No Certifications, No Corporate BS. Just Real-World Hacking Knowledge.
https://ift.tt/A8Hjx6L
Submitted February 09, 2025 at 09:10AM by Efficient-Ad-953
via reddit https://ift.tt/Eu0nrPA
https://ift.tt/A8Hjx6L
Submitted February 09, 2025 at 09:10AM by Efficient-Ad-953
via reddit https://ift.tt/Eu0nrPA
Leanpub
Ghost in the Wires: The Making of a Modern Hacker
A raw, no-bullshit guide to hacking—from anonymity to exploitation. Learn how real hackers think, break systems, and stay untouchable. Are you ready?
NanoCore RAT Malware Analysis
https://ift.tt/xWE763N
Submitted February 10, 2025 at 01:11AM by anuraggawande
via reddit https://ift.tt/H4y2kfC
https://ift.tt/xWE763N
Submitted February 10, 2025 at 01:11AM by anuraggawande
via reddit https://ift.tt/H4y2kfC
Malware Analysis, Phishing, and Email Scams
NanoCore RAT Malware Analysis
NanoCore is a well-known Remote Access Trojan (RAT) used by threat actors for espionage, data theft, and system control. In this post, I will analyze a NanoCore RAT sample with the hash 18B476D3724…
Jooki - Taking Control of a Forgotten Device
https://ift.tt/3bCYQaf
Submitted February 10, 2025 at 03:58AM by nv1t
via reddit https://ift.tt/WJad2iA
https://ift.tt/3bCYQaf
Submitted February 10, 2025 at 03:58AM by nv1t
via reddit https://ift.tt/WJad2iA
Blog
Jooki - Taking Control of a Forgotten Device
Jooki was a dream come true for parents—an intuitive, screen-free audio player that let kids enjoy music and stories with the tap of a token. But that dream turned into frustration when the company behind Jooki went bankrupt, leaving countless devices bricked…
NVIDIA/Mellanox ConnectX-5: iRISC reverse engineering, finding SHA256
https://ift.tt/MGYzZRW
Submitted February 10, 2025 at 06:44PM by jonasrudloff
via reddit https://ift.tt/n1C094w
https://ift.tt/MGYzZRW
Submitted February 10, 2025 at 06:44PM by jonasrudloff
via reddit https://ift.tt/n1C094w
PLZ HELP ME SECURITY PPL
http://Google.com
Submitted February 11, 2025 at 08:54AM by RandomReema
via reddit https://ift.tt/V8pL7At
http://Google.com
Submitted February 11, 2025 at 08:54AM by RandomReema
via reddit https://ift.tt/V8pL7At
Reddit
From the netsec community on Reddit: PLZ HELP ME SECURITY PPL
Posted by RandomReema - 0 votes and 6 comments
Evil Crow RF: A Portable Radio Frequency Device compatible with Flipper Zero Sub-GHz file format
https://ift.tt/NZneulU
Submitted February 11, 2025 at 01:06PM by barakadua131
via reddit https://ift.tt/OBrzwQe
https://ift.tt/NZneulU
Submitted February 11, 2025 at 01:06PM by barakadua131
via reddit https://ift.tt/OBrzwQe
Mobile Hacker
Evil Crow RF: A Portable Radio Frequency Device
This tool expands your smartphone’s capabilities, allowing you to dive into RF analysis, penetration testing, and signal manipulation—bringing mobile hacking to a whole new level.
Build Your Own Offensive Security Lab A Step-by-Step Guide with Ludus
https://ift.tt/KNFd2eM
Submitted February 11, 2025 at 12:46PM by xkarezma
via reddit https://ift.tt/tGFkweo
https://ift.tt/KNFd2eM
Submitted February 11, 2025 at 12:46PM by xkarezma
via reddit https://ift.tt/tGFkweo
Ahmed Sherif
Build Your Own Offensive Security Lab A Step-by-Step Guide with Ludus
TL;DR:
Fault Injection – Looking for a Unicorn
https://ift.tt/vuTBinH
Submitted February 11, 2025 at 01:48PM by 0xdea
via reddit https://ift.tt/oUrIhE4
https://ift.tt/vuTBinH
Submitted February 11, 2025 at 01:48PM by 0xdea
via reddit https://ift.tt/oUrIhE4
hn security
Fault Injection – Looking for a Unicorn - hn security
Intro In our previous article Fault […]
Exploring a VPN Appliance: A Researcher’s Journey
https://ift.tt/4OTbNjt
Submitted February 11, 2025 at 09:29PM by Narrow_Rooster_630
via reddit https://ift.tt/kgKH3mY
https://ift.tt/4OTbNjt
Submitted February 11, 2025 at 09:29PM by Narrow_Rooster_630
via reddit https://ift.tt/kgKH3mY
Akamai
Exploring a VPN Appliance: A Researcher’s Journey | Akamai
Akamai researchers explore Fortinet FortiOS and discover multiple vulnerabilities that can lead to denial-of-service and remote code execution attacks.
PsExec’ing the right way and why zero trust is mandatory
https://ift.tt/Qwgln4I
Submitted February 11, 2025 at 09:19PM by AlmondOffSec
via reddit https://ift.tt/ph5TBIG
https://ift.tt/Qwgln4I
Submitted February 11, 2025 at 09:19PM by AlmondOffSec
via reddit https://ift.tt/ph5TBIG
Sensepost
SensePost | Psexec’ing the right way and why zero trust is mandatory
Leaders in Information Security
Tenda AC15 CVE-2020-13393 Exploit (!exploitable episode one)
https://ift.tt/opOYCBN
Submitted February 11, 2025 at 08:58PM by nibblesec
via reddit https://ift.tt/fx5eAJw
https://ift.tt/opOYCBN
Submitted February 11, 2025 at 08:58PM by nibblesec
via reddit https://ift.tt/fx5eAJw
CVE-2025-0693: AWS IAM User Enumeration
https://ift.tt/eWytRGd
Submitted February 11, 2025 at 11:40PM by hackers_and_builders
via reddit https://ift.tt/G2hTpr8
https://ift.tt/eWytRGd
Submitted February 11, 2025 at 11:40PM by hackers_and_builders
via reddit https://ift.tt/G2hTpr8
Rhino Security Labs
CVE-2025-0693: AWS IAM User Enumeration
Rhino Security Labs discovered two username enumeration vulnerabilities in the AWS Web Console.
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202
https://ift.tt/2IHDB9v
Submitted February 12, 2025 at 02:16AM by ivxrehc
via reddit https://ift.tt/g2Ei7kP
https://ift.tt/2IHDB9v
Submitted February 12, 2025 at 02:16AM by ivxrehc
via reddit https://ift.tt/g2Ei7kP
Shelltrail - Swedish offensive security experts
How auto-generated passwords in Sitevision leads to signing key leakage - CVE-2022-35202 | Shelltrail - Swedish offensive security…
A security issue in Sitevision version 10.3.1 and older allows remote attacker, in certain scenarios, to gain access signing keys used for Authn SAML requests.
How We Hacked a Software Supply Chain for $50K
https://ift.tt/UVjtxHl
Submitted February 12, 2025 at 02:03PM by albinowax
via reddit https://ift.tt/DMfpmuw
https://ift.tt/UVjtxHl
Submitted February 12, 2025 at 02:03PM by albinowax
via reddit https://ift.tt/DMfpmuw
www.landh.tech
How We Hacked a Software Supply Chain for $50K - Lupin & Holmes
Leaking the email of any YouTube user for $10,000
https://ift.tt/7yDAWK2
Submitted February 12, 2025 at 05:59PM by AlmondOffSec
via reddit https://ift.tt/sMWrZxD
https://ift.tt/7yDAWK2
Submitted February 12, 2025 at 05:59PM by AlmondOffSec
via reddit https://ift.tt/sMWrZxD
brutecat.com
Leaking the email of any YouTube user for $10,000
What could've been the largest data breach in the world - an attack chain on Google services to leak the email address of any YouTube channel
From Convenience to Contagion: The Half-Day Threat and Libarchive Vulnerabilities Lurking in Windows 11
https://ift.tt/g8R0nEv
Submitted February 12, 2025 at 08:49PM by AlmondOffSec
via reddit https://ift.tt/CnRIkrz
https://ift.tt/g8R0nEv
Submitted February 12, 2025 at 08:49PM by AlmondOffSec
via reddit https://ift.tt/CnRIkrz
DEVCORE 戴夫寇爾
From Convenience to Contagion: The Half-Day Threat and Libarchive Vulnerabilities Lurking in Windows 11 | DEVCORE 戴夫寇爾
Windows 11's KB5031455 update adds RAR and 7z support via libarchive, but DEVCORE discovered multiple vulnerabilities, including Heap Buffer Overflow and arbitrary file operations. Delayed patching also enables “Half-day” attacks, putting projects like ClickHouse…
whoAMI: A cloud image name confusion attack | Datadog Security Labs
https://ift.tt/9Isvc8R
Submitted February 13, 2025 at 12:43AM by sethsec
via reddit https://ift.tt/AItvBYl
https://ift.tt/9Isvc8R
Submitted February 13, 2025 at 12:43AM by sethsec
via reddit https://ift.tt/AItvBYl
Datadoghq
whoAMI: A cloud image name confusion attack
Detailing the discovery and impact of the whoAMI cloud image name confusion attack, which could allow attackers to execute code within AWS accounts due to a vulnerable pattern in AMI retrieval.
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108)
https://ift.tt/JbAQ2Ns
Submitted February 13, 2025 at 04:15AM by Mempodipper
via reddit https://ift.tt/LaFhmXN
https://ift.tt/JbAQ2Ns
Submitted February 13, 2025 at 04:15AM by Mempodipper
via reddit https://ift.tt/LaFhmXN
Searchlight Cyber
Nginx/Apache Path Confusion to Auth Bypass in PAN-OS (CVE-2025-0108) › Searchlight Cyber
Assetnote, now a searchlight cyber company, has uncovered a zero day auth bypass in the pan-os management interface new palo alto vulnerabilities discovered A few months ago, the news broke that CVE-2024-0012 and CVE-2024-9474 were under active exploitation…
55 Security Flaws Detected by Microsoft: 2 were Exploited by Hackers
https://ift.tt/EfQmjNH
Submitted February 13, 2025 at 10:21AM by Fabulous_Bluebird931
via reddit https://ift.tt/fMtaZTy
https://ift.tt/EfQmjNH
Submitted February 13, 2025 at 10:21AM by Fabulous_Bluebird931
via reddit https://ift.tt/fMtaZTy
Verdaily
55 Security Flaws Detected by Microsoft: 2 were Exploited by Hackers
Microsoft has patched 55 Windows security flaws in its latest security update, including four zero-day vulnerabilities—two of which were actively exploited by hackers in cyberattacks.
Curious case of AD CS ESC15 vulnerable instance and its manual exploitation
https://ift.tt/adFyxDP
Submitted February 13, 2025 at 07:53PM by 1046ica
via reddit https://ift.tt/pyH6O0g
https://ift.tt/adFyxDP
Submitted February 13, 2025 at 07:53PM by 1046ica
via reddit https://ift.tt/pyH6O0g
www.mannulinux.org
Curious case of AD CS ESC15 vulnerable instance and its manual exploitation
Learn Basic Concepts of Linux. Best site to learn Linux from beginner to Advanced.
Consider joining the OSTIF meetup about Nym's recent audit ennoscriptd "Unmasking Cryptographic Risks: A Deep Dive into the Nym Audit” w/ Nadim Kobeissi
https://lu.ma/o2dasp0m
Submitted February 14, 2025 at 04:26PM by carrotcypher
via reddit https://ift.tt/vIZGyDa
https://lu.ma/o2dasp0m
Submitted February 14, 2025 at 04:26PM by carrotcypher
via reddit https://ift.tt/vIZGyDa
lu.ma
Unmasking Cryptographic Risks: A Deep Dive into the Nym Audit w/ Nadim Kobeissi · Zoom · Luma
Join us for a presentation and meetup with Nadim Kobeissi, Senior Applied Cryptography Auditor of Cure53.
Denoscription
Privacy networks and cryptographic…
Denoscription
Privacy networks and cryptographic…