A tale about Foxit Reader - Safe Reading mode and other vulnerabilities
http://ift.tt/2vR2ojI
Submitted August 20, 2017 at 08:15PM by SecABC
via reddit http://ift.tt/2ij2coP
http://ift.tt/2vR2ojI
Submitted August 20, 2017 at 08:15PM by SecABC
via reddit http://ift.tt/2ij2coP
insert-noscript.blogspot.co.uk
A tale about Foxit Reader - Safe Reading mode and other vulnerabilities
Some days ago someone send me the following link, which describes two vulnerabilities in Foxit Reader: http://thehackernews.com/2017/08/tw...
Revisiting SOHO Router Attacks by Álvaro Folgado Rueda and José Antonio Rodríguez García and Iván Sanz de Castro
http://ift.tt/2xk7rXP
Submitted August 21, 2017 at 05:31PM by 0xKaishakunin
via reddit http://ift.tt/2vRYG9x
http://ift.tt/2xk7rXP
Submitted August 21, 2017 at 05:31PM by 0xKaishakunin
via reddit http://ift.tt/2vRYG9x
SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation
http://ift.tt/2iilNoW
Submitted August 21, 2017 at 06:45PM by balajinm
via reddit http://ift.tt/2fYN0MW
http://ift.tt/2iilNoW
Submitted August 21, 2017 at 06:45PM by balajinm
via reddit http://ift.tt/2fYN0MW
GBHackers On Security
SQLMAP-Detecting and Exploiting SQL Injection- A Detailed Explanation
Sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws
How I Accidentally Framed Myself for a Hacking Frenzy
http://ift.tt/2wgZohu
Submitted August 21, 2017 at 06:42PM by albinowax
via reddit http://ift.tt/2iixJqS
http://ift.tt/2wgZohu
Submitted August 21, 2017 at 06:42PM by albinowax
via reddit http://ift.tt/2iixJqS
blog.portswigger.net
How I Accidentally Framed Myself for a Hacking Frenzy
It’s well known that some websites are vulnerable to IP address spoofing because they trust a user-supplied HTTP header like X-Forwarded-For...
CrackMe Solution - [A]dvanced Keygenme by sd333221
http://ift.tt/2fYHDND
Submitted August 21, 2017 at 07:26PM by khasaia
via reddit http://ift.tt/2wh8OJS
http://ift.tt/2fYHDND
Submitted August 21, 2017 at 07:26PM by khasaia
via reddit http://ift.tt/2wh8OJS
secrary[dot]com
[A]dvanced Keygenme by sd333221
Does it matter?
gOSINT - OSINT framework in golang
http://ift.tt/2ikgu8N
Submitted August 21, 2017 at 07:10PM by Nhoya
via reddit http://ift.tt/2wqyvbE
http://ift.tt/2ikgu8N
Submitted August 21, 2017 at 07:10PM by Nhoya
via reddit http://ift.tt/2wqyvbE
GitHub
Nhoya/gOSINT
OSINT Swiss Army Knife. Contribute to Nhoya/gOSINT development by creating an account on GitHub.
Firmware Exploitation with JEB: Part 1 (x-post from /r/reverseengineering)
http://ift.tt/2whaqDy
Submitted August 21, 2017 at 09:35PM by svieg
via reddit http://ift.tt/2vhzVQM
http://ift.tt/2whaqDy
Submitted August 21, 2017 at 09:35PM by svieg
via reddit http://ift.tt/2vhzVQM
Setup a $35 VPN hotspot in 5 minutes
http://ift.tt/2v7BDVH
Submitted August 21, 2017 at 11:48PM by audibleBLiNK
via reddit http://ift.tt/2vSK5e8
http://ift.tt/2v7BDVH
Submitted August 21, 2017 at 11:48PM by audibleBLiNK
via reddit http://ift.tt/2vSK5e8
GitHub
audibleblink/vpn_access_point
vpn_access_point - Script from VPN AP blog post
The Art of Becoming TrustedInstaller
http://ift.tt/2g0pUp0
Submitted August 21, 2017 at 07:08PM by bigshebang
via reddit http://ift.tt/2ilSims
http://ift.tt/2g0pUp0
Submitted August 21, 2017 at 07:08PM by bigshebang
via reddit http://ift.tt/2ilSims
tyranidslair.blogspot.co.uk
The Art of Becoming TrustedInstaller
If you’ve spent any time administering a Windows system post Vista you’ll have encountered the TrustedInstaller (TI) group which most syst...
Writeup on how I solved that Danish Intelligence CrackMe that was posted a while ago with Radare2 and Custom plugins.
http://ift.tt/2g0FxNg
Submitted August 22, 2017 at 05:08AM by safiire
via reddit http://ift.tt/2ikgjKv
http://ift.tt/2g0FxNg
Submitted August 22, 2017 at 05:08AM by safiire
via reddit http://ift.tt/2ikgjKv
safiire.github.io
Solving a Danish Defense Intelligence Puzzle - Irken Kitties
While I was browsing the Reverse Engineering sub on Reddit a few months ago, I came across a puzzle that the poster said came from a Danish newspaper …
[TUTORIAL] Custom x86 linux shellcode encoding
http://ift.tt/2winzMJ
Submitted August 22, 2017 at 04:51AM by _____WINTERMUTE_____
via reddit http://ift.tt/2x7eSCA
http://ift.tt/2winzMJ
Submitted August 22, 2017 at 04:51AM by _____WINTERMUTE_____
via reddit http://ift.tt/2x7eSCA
A Look at JS_POWMET, a Completely Fileless Malware
http://ift.tt/2uZlRyu
Submitted August 22, 2017 at 07:07AM by RingZeroLabs
via reddit http://ift.tt/2vYvEU7
http://ift.tt/2uZlRyu
Submitted August 22, 2017 at 07:07AM by RingZeroLabs
via reddit http://ift.tt/2vYvEU7
TrendLabs Security Intelligence Blog
A Look at JS_POWMET, a Completely Fileless Malware - TrendLabs Security Intelligence Blog
As cybercriminals start to focus on pulling off attacks without leaving a trace, fileless malware will become a more common attack method. However, many of these malware are fileless only while entering a user’s system, as they eventually reveal themselves…
Seamless Campaign Uses RIG EK to Drop Ramnit Trojan
http://ift.tt/2xmxkGx
Submitted August 22, 2017 at 07:04AM by majorllama
via reddit http://ift.tt/2vYy70Q
http://ift.tt/2xmxkGx
Submitted August 22, 2017 at 07:04AM by majorllama
via reddit http://ift.tt/2vYy70Q
MALWARE BREAKDOWN
Seamless Campaign Uses RIG EK to Drop Ramnit Trojan
Below is a partial and edited flowchart of the malvertising chain that I got during this infection: An edited image of the infection chain is shown below: You can see that the Ramnit sample seems t…
Awesome Security Gists : A curated list of cool GitHub gists related to security
http://ift.tt/2xmwABj
Submitted August 22, 2017 at 07:41AM by bnchandrapal
via reddit http://ift.tt/2xmcAPg
http://ift.tt/2xmwABj
Submitted August 22, 2017 at 07:41AM by bnchandrapal
via reddit http://ift.tt/2xmcAPg
GitHub
Hack-with-Github/Awesome-Security-Gists
Contribute to Awesome-Security-Gists development by creating an account on GitHub.
Return of WannaCry? LG Hit by Ransomware Attack
http://ift.tt/2x671VB
Submitted August 22, 2017 at 12:12PM by InfoSecCrazy
via reddit http://ift.tt/2wzkBTI
http://ift.tt/2x671VB
Submitted August 22, 2017 at 12:12PM by InfoSecCrazy
via reddit http://ift.tt/2wzkBTI
itsecuritycentral.teramind.co
Return of WannaCry? LG Hit by Ransomware Attack | IT Security Central
On Wednesday August 16th representatives for LG South Korea have confirmed they were the victim of a cyber attack, which hit them on Monday morning. The
Bitdefender Anti-Virus: Heap Buffer Overflow via 7z LZMA
http://ift.tt/2vZRXJ2
Submitted August 22, 2017 at 05:38PM by landave
via reddit http://ift.tt/2wjCJ4g
http://ift.tt/2vZRXJ2
Submitted August 22, 2017 at 05:38PM by landave
via reddit http://ift.tt/2wjCJ4g
landave's blog
Bitdefender: Heap Buffer Overflow via 7z LZMA
Blog about anti-virus software and its issues.
The Rise of Chinese DDoS Platforms
http://ift.tt/2wb7LuB
Submitted August 22, 2017 at 06:05PM by RingZeroLabs
via reddit http://ift.tt/2ilSVfy
http://ift.tt/2wb7LuB
Submitted August 22, 2017 at 06:05PM by RingZeroLabs
via reddit http://ift.tt/2ilSVfy
Talosintelligence
Booters with Chinese Characteristics: The Rise of Chinese Online DDoS Platforms
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
A Non-Interactive Zero-Knowledge Capture the Flag Platform
http://ift.tt/2vjHOoB
Submitted August 22, 2017 at 07:38PM by Kinost
via reddit http://ift.tt/2wv0FCd
http://ift.tt/2vjHOoB
Submitted August 22, 2017 at 07:38PM by Kinost
via reddit http://ift.tt/2wv0FCd
reddit
A Non-Interactive Zero-Knowledge Capture the Flag Platform • r/netsec
2 points and 0 comments so far on reddit
shadow v2 - jemalloc heap exploitation framework
http://ift.tt/2vViMjf
Submitted August 22, 2017 at 09:28PM by secaggr
via reddit http://ift.tt/2vWbn3j
http://ift.tt/2vViMjf
Submitted August 22, 2017 at 09:28PM by secaggr
via reddit http://ift.tt/2vWbn3j
Census-Labs
CENSUS | IT Security Works
About four months ago (April 2017), Vasilis Tsaousoglou and myself presented our work on exploiting Android's libc allocator at the 2017 INFILTRATE conference (Miami, Florida). Since version 5.0, Android has adopted the jemalloc allocator as its default libc…
Hijacking Control of Wireless Mice and Keyboards
http://ift.tt/2x9zESb
Submitted August 22, 2017 at 09:25PM by ForgottenWatchtower
via reddit http://ift.tt/2vbtrn4
http://ift.tt/2x9zESb
Submitted August 22, 2017 at 09:25PM by ForgottenWatchtower
via reddit http://ift.tt/2vbtrn4
Toshellandback
Peripheral Pwnage
On internal engagements, poisoning name resolution requests on the local network (à la Responder) is one of the tried and true methods of obtaining that coveted set of initial Domain credentials. While this approach has worked on many clients, what if Link…
Exploiting Industrial Collaborative Robots
http://ift.tt/2wAfl25
Submitted August 22, 2017 at 09:22PM by didnotseethatcoming
via reddit http://ift.tt/2wBcBSi
http://ift.tt/2wAfl25
Submitted August 22, 2017 at 09:22PM by didnotseethatcoming
via reddit http://ift.tt/2wBcBSi
Ioactive
Exploiting Industrial Collaborative Robots
By Lucas Apa (@lucasapa) Traditional industrial robots are boring. Typically, they are autonomous or operate with limited guidance and e...