Devil's Ivy Vulnerability
http://ift.tt/2uFbel8
Submitted July 18, 2017 at 09:13PM by ncrmn
via reddit http://ift.tt/2tmJilS
http://ift.tt/2uFbel8
Submitted July 18, 2017 at 09:13PM by ncrmn
via reddit http://ift.tt/2tmJilS
Senrio
Devil's Ivy: The Technical Details
Devil's Ivy is a vulnerability deep in the communication layer. When we began a security analysis of an Axis security camera, we had no idea we would find a vulnerability that affects so many devices. Read on for the technical writeup.
Formal verification of the WireGuard protocol using Tamarin Prover
http://ift.tt/2urREbS
Submitted July 18, 2017 at 08:47PM by zx2c4
via reddit http://ift.tt/2vy9RkP
http://ift.tt/2urREbS
Submitted July 18, 2017 at 08:47PM by zx2c4
via reddit http://ift.tt/2vy9RkP
Wireguard
Formal Verification - WireGuard
Real-World Rubber Ducky Attacks with Empire Stagers
http://ift.tt/2vylTuH
Submitted July 18, 2017 at 09:46PM by sc0tfree
via reddit http://ift.tt/2u6G30L
http://ift.tt/2vylTuH
Submitted July 18, 2017 at 09:46PM by sc0tfree
via reddit http://ift.tt/2u6G30L
sc0tfree
Real-World Rubber Ducky Attacks with Empire Stagers
Nine times out of ten, my goal when using a Rubber Ducky on pentests is to
launch an Empire or Meterpreter session. However, for the Ducky to type out
an entire stager often takes too much time to be practical for most
real-world USB attacks. This article…
launch an Empire or Meterpreter session. However, for the Ducky to type out
an entire stager often takes too much time to be practical for most
real-world USB attacks. This article…
Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains
http://ift.tt/2tn0gRf
Submitted July 18, 2017 at 10:05PM by jat0369
via reddit http://ift.tt/2u5b97i
http://ift.tt/2tn0gRf
Submitted July 18, 2017 at 10:05PM by jat0369
via reddit http://ift.tt/2u5b97i
CyberArk
Implementing Malware Command and Control Using Major CDNs and High-Traffic Domains - CyberArk
Technical research from CyberArk Labs and Red Team security experts to help you think like an attacker by keeping you ahead of the latest threats.
Vendor-exclusive DDNS - is it a security risk?
http://ift.tt/2tn7p46
Submitted July 17, 2017 at 09:54PM by kilgotrout
via reddit http://ift.tt/2vyKEXp
http://ift.tt/2tn7p46
Submitted July 17, 2017 at 09:54PM by kilgotrout
via reddit http://ift.tt/2vyKEXp
Medium
Vendor-exclusive DDNS — is it a security risk?
Opinions expressed are solely my own and do not express the views or opinions of my employer. Information is provided for educational…
Six Security Vulnerabilities from a Year of HackerOne
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
Flexport Engineering
Six Security Vulnerabilities from a Year of HackerOne
We launched our HackerOne program a year ago to increase the security of Flexport.
A Security Audit of Firefox Accounts
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
Mozilla Security Blog
A Security Audit of Firefox Accounts
To provide transparency into our ongoing efforts to protect your privacy and security on the Internet, we are releasing a security audit of Firefox Accounts ...
Setting up a burner phone number using Twilio and 9 lines of code
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
Making and breaking things.
Quickly setting up a burner phone number using Twilio
Firstly the advice in this article is not designed for people who are trying to evade spying or some other stuff, it's just to avoid marketers or avoid giving your number to someone you don't want to. So I'm going over to the states at the end of this week
How to Create the Ultimate Fake Access Point [Walkthrough]
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
rootsh3ll
The Ultimate Fake Access Point [Walkthrough] - rootsh3ll
Overview Assuming that you are capable of setting up a fake access point and setup Apache configuration accordingly to fool victim(s) I am beginning this walk-through. In this scenario, we are using one wireless adapter and an Ethernet connection (under VM)…
New cache architecture on Intel I9 and Skylake server: An initial assessment
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
cyber.wtf
New cache architecture on Intel I9 and Skylake server: An initial assessment
Intel has introduced the new I9 CPU which is seen as HEDT (High-End-DeskTop) product. The micro architecture is in many respects shared with the new Skylake server micro architecture.I f his…
VBScript Injection via GNOME Thumbnailer
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
reddit
VBScript Injection via GNOME Thumbnailer • r/netsec
1 points and 0 comments so far on reddit
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
Ioactive
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
By Thomas Kilbride Not that long ago, motorized hoverboards were in the news – according to widespread reports, they had a tendency to c...
Red Teaming Tips by Vincent Yiu
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
Tilting at windmills
Red Teaming Tips by Vincent Yiu
Vincent Yiu has tweeted some really useful red teaming tips. Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook. Red t…
'Atomic fingerprinting' tech could end counterfeit goods
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
Live Science
'Atomic Fingerprinting' Tech Could End Counterfeit Goods
Scientists have developed a new method that can stamp things with "atomic fingerprints" to keep counterfeit goods at bay.
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
Troy Hunt
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
Last week I wrote about how Life Is About to Get a Whole Lot Harder for Websites Without HTTPS. Somewhere in the comments there, the discussion went off on a tangent about commercial CAs, the threat Let's Encrypt poses to them and subsequently, the value…
NuCypher KMS whitepaper: decentralized key management system. Call for comments and suggestions
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
Medium
NuCypher KMS: Decentralized key management system
We’re excited to share NuCypher KMS, a decentralized key management system (KMS) for public blockchains.
ARM Exploit Development beginners: "Process Memory and Memory Corruptions (Stack and Heap)"
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
Azeria-Labs
Process Memory and Memory Corruption
Anatomy of Ransomware Part 1: Chimera
http://ift.tt/2qb289N
Submitted July 20, 2017 at 04:28AM by NeedsMoreCarryHandle
via reddit http://ift.tt/2gLHTj6
http://ift.tt/2qb289N
Submitted July 20, 2017 at 04:28AM by NeedsMoreCarryHandle
via reddit http://ift.tt/2gLHTj6
hackers-arise
Anatomy of Ransomware, Part 1: Chimera | hackers-arise
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware around the world. Afte...
Remote code execution in Source games via player fragging
http://ift.tt/2uKyRsN
Submitted July 20, 2017 at 06:46AM by OneUpSecurity
via reddit http://ift.tt/2tIEl2l
http://ift.tt/2uKyRsN
Submitted July 20, 2017 at 06:46AM by OneUpSecurity
via reddit http://ift.tt/2tIEl2l
Oneupsecurity
Ever get remote code execution by fragging a player?
Valve's Source SDK contained a buffer overflow vulnerability which allowed remote code execution on clients and servers. The vulnerability was exploited by fragging a player, which casued a specially crafted ragdoll model to be loaded. Multiple Source games…
Authenticating Email Using DKIM and ARC
http://ift.tt/2uzTWFZ
Submitted July 20, 2017 at 08:04AM by danwin
via reddit http://ift.tt/2u9RWRT
http://ift.tt/2uzTWFZ
Submitted July 20, 2017 at 08:04AM by danwin
via reddit http://ift.tt/2u9RWRT
ProPublica
Authenticating Email Using DKIM and ARC, or How We Analyzed the Kasowitz Emails
Last week we needed to authenticate some emails sent by the President’s lawyer, Marc Kasowitz. Here’s how we did it.
How to Pwn one of the CREST exam Postgres boxes
https://medium.com/@panagiotis84/a-penetration-testers-guide-to-postgresql-e0eafd1a1028?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BkQdiQJgtRUy3YVAgXSIn1g%3D%3D
Submitted July 20, 2017 at 12:20PM by johnsmithe99
via reddit https://www.reddit.com/r/netsec/comments/6oektf/how_to_pwn_one_of_the_crest_exam_postgres_boxes/?utm_source=ifttt
https://medium.com/@panagiotis84/a-penetration-testers-guide-to-postgresql-e0eafd1a1028?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BkQdiQJgtRUy3YVAgXSIn1g%3D%3D
Submitted July 20, 2017 at 12:20PM by johnsmithe99
via reddit https://www.reddit.com/r/netsec/comments/6oektf/how_to_pwn_one_of_the_crest_exam_postgres_boxes/?utm_source=ifttt
Medium
A Penetration Tester’s Guide to PostgreSQL
PostgreSQL is an open source database which can be found mostly in Linux operating systems. However it has great compatibility with…