A raspberry pi with kali linux as intercepting router
http://ift.tt/2xqWLGS
Submitted August 25, 2017 at 01:50AM by koentje987
via reddit http://ift.tt/2wCu3qm
http://ift.tt/2xqWLGS
Submitted August 25, 2017 at 01:50AM by koentje987
via reddit http://ift.tt/2wCu3qm
GitHub
koenbuyens/kalirouter
kalirouter - intercepting kali router
Researcher Releases Fully Working Exploit Code for iOS Kernel Vulnerability
http://ift.tt/2itn7Wh
Submitted August 25, 2017 at 02:37AM by RingZeroLabs
via reddit http://ift.tt/2wK7AHa
http://ift.tt/2itn7Wh
Submitted August 25, 2017 at 02:37AM by RingZeroLabs
via reddit http://ift.tt/2wK7AHa
BleepingComputer
Researcher Releases Fully Working Exploit Code for iOS Kernel Vulnerability
Adam Donenfeld, a researcher with mobile security firm Zimperium, has published today proof-of-concept code for zIVA — a kernel exploit that affects iOS 10.3.1 and previous versions.
0patching Foxit Reader's saveAs "0day" (CVE-2017-10952)
http://ift.tt/2wCUpZn
Submitted August 24, 2017 at 08:29PM by dielel
via reddit http://ift.tt/2xxlvgK
http://ift.tt/2wCUpZn
Submitted August 24, 2017 at 08:29PM by dielel
via reddit http://ift.tt/2xxlvgK
0patch.blogspot.co.uk
0patching Foxit Reader's saveAs "0day" (CVE-2017-10952)
3rd-Party Patching a Logical Bug By Mitja Kolsek, the 0patch team A bit of introduction: last week we could all witness a familiar "It'...
Hacking a Herb Vaporizer to Set Its Temperature Limit From 190C to 6553.5C Remotely
http://ift.tt/2wtjyoG
Submitted August 25, 2017 at 08:11AM by evilsocket
via reddit http://ift.tt/2wsU5M4
http://ift.tt/2wtjyoG
Submitted August 25, 2017 at 08:11AM by evilsocket
via reddit http://ift.tt/2wsU5M4
evilsocket / Simone
Hacking a Herb Vaporizer to Set Its Temperature Limit From 190C to 6553.5C Remotely
Tonight my brain decided, instead of sleeping (why even bother trying, right?), to start a new short adventure in the Bluetooth Low Energy world. I’m a happy Crafty vaporizer owner and as I discovered
Memory Forensics and Reverse Engineering with Thick Client Applications
http://ift.tt/2wLJUCd
Submitted August 25, 2017 at 01:30PM by sandeep1337
via reddit http://ift.tt/2iuAuW6
http://ift.tt/2wLJUCd
Submitted August 25, 2017 at 01:30PM by sandeep1337
via reddit http://ift.tt/2iuAuW6
SecureLayer7
Memory Forensics & Reverse Engineering : Thick Client Penetration Testing – Part 4 - SecureLayer7
Static Analysis/ Reverse Engineering for Thick Clients Penetration Testing 4 Hi Readers, let’s take a look into static analysis. The advantage which thick clients offer over web applications are the ability to inspect the code and perform code level fuzzing…
Frida 10.5 is out with user-defined machine code transformations on a per-thread basis
http://ift.tt/2xiwJX4
Submitted August 25, 2017 at 05:22PM by oleavr
via reddit http://ift.tt/2wuwaw1
http://ift.tt/2xiwJX4
Submitted August 25, 2017 at 05:22PM by oleavr
via reddit http://ift.tt/2wuwaw1
reddit
Frida 10.5 is out with user-defined machine code... • r/netsec
2 points and 0 comments so far on reddit
How Embedi Was Able to Hack Computers With Intel AMT
http://ift.tt/2w3SX0C
Submitted August 25, 2017 at 05:05PM by Embedi
via reddit http://ift.tt/2waA1LV
http://ift.tt/2w3SX0C
Submitted August 25, 2017 at 05:05PM by Embedi
via reddit http://ift.tt/2waA1LV
Embedi
The Adventure of the Final Intel AMT Problem
It's high time to learn how cunning cyber criminals can use Intel AMT powerful capabilities to achieve their malicious goals. See the captivating story of hacking Intel AMT with all its twists and turns and awe-inspiring details with your own eyes. The freshest…
Hackers buy a laptop for $1 by exploiting a POS vulnerability
http://ift.tt/2vcfrxu
Submitted August 25, 2017 at 04:39PM by alexander_polyakov
via reddit http://ift.tt/2iuOPSk
http://ift.tt/2vcfrxu
Submitted August 25, 2017 at 04:39PM by alexander_polyakov
via reddit http://ift.tt/2iuOPSk
Erpscan
How to buy MacBook for $1, or hacking SAP POS | SAP Cyber Security Solutions
SAP POS Xpress Server does not perform any authentication checks for critical functions that require user identity. As a result, administrative and other privileged functions can be accessed without any authentication.
Shining a spotlight on re-identification – Danvers Baillieu – Medium
http://ift.tt/2w3KAlB
Submitted August 25, 2017 at 04:27PM by milly1993
via reddit http://ift.tt/2xiMKfY
http://ift.tt/2w3KAlB
Submitted August 25, 2017 at 04:27PM by milly1993
via reddit http://ift.tt/2xiMKfY
Medium
Shining a spotlight on re-identification
The announcement earlier this month by the UK government of an overhaul of data protection laws sparked headlines heralding the new rights…
Analysis of New Webserver Ronggolawe Ransomware and How to Block It.
http://ift.tt/2v9ZXKA
Submitted August 25, 2017 at 06:01PM by buildops
via reddit http://ift.tt/2wacpXT
http://ift.tt/2v9ZXKA
Submitted August 25, 2017 at 06:01PM by buildops
via reddit http://ift.tt/2wacpXT
Blog | Imperva
Analysis of Ronggolawe Ransomware and How to Block It – Blog | Imperva
Learn about a new ransomware targeted at web servers called Ronggolawe, the code name for AwesomeWare.
New EMPTY CryptoMix Ransomware Variant Released
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
http://ift.tt/2xizJ5W
Submitted August 25, 2017 at 06:01PM by majorllama
via reddit http://ift.tt/2wuEXhg
BleepingComputer
New EMPTY CryptoMix Ransomware Variant Released
Today, MalwareHunterTeam discovered a new variant of the CryptoMix ransomware that is appending the .EMPTY extension to encrypted file names. Considering that the previous variant used ERROR as the previous extension and now uses EMPTY, it is clear that the…
Leveraging Duo Security's Default Configuration to Bypass Two-Factor Authentication
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
http://ift.tt/2wMK4Jr
Submitted August 25, 2017 at 07:25PM by averagesecurityguy
via reddit http://ift.tt/2iwWD6p
Appsecconsulting
Leveraging Duo Security’s Default Configuration to Bypass Two-Factor Authentication | AppSec Consulting
AppSec Consulting provides world-class web application security services, penetration testing, PCI compliance services, and web application security training.
ZDI Researcher Details a Safari Webkit Bug Submitted at Pwn2Own
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
http://ift.tt/2w47Z6A
Submitted August 25, 2017 at 07:44PM by RedmondSecGnome
via reddit http://ift.tt/2vcRYwk
Zero Day Initiative
Deconstructing a Winning Webkit Pwn2Own Entry
When Simon blogged about the risks of JavaScript a few weeks back, he
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
mentioned that we've begun to see JIT vulnerabilities in submissions to the
ZDI program and as part of Pwn2Own. Today, I'll expand on his blog post by
covering a vulnerability in…
Abusing Token Privileges For Windows Local Privilege Escalation
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
http://ift.tt/2xjmkdI
Submitted August 25, 2017 at 10:08PM by breen-machine
via reddit http://ift.tt/2w4ymcz
Foxglovesecurity
Abusing Token Privileges For Windows Local Privilege Escalation
By @dronesec and @breenmachine This a project my friend drone and I have been poking at for quite some time and are glad to finally be releasing. As the noscript implies, we&#…
Kali Intercepting-Router in Raspberry pi and VM
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
http://ift.tt/2vpSgvH
Submitted August 26, 2017 at 05:17PM by vaika-varma
via reddit http://ift.tt/2vq3QHf
Password Cracking 201: Beyond the Basics
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
http://ift.tt/2wyW55w
Submitted August 27, 2017 at 03:43AM by 0xdea
via reddit http://ift.tt/2wIpCKq
Techsolvency
Tech Solvency: Talk(s)
Public talks by Royce Williams, with references and errata.
Hack In The Box GSEC 2017 - Talks and materials
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
http://ift.tt/2v7YFzz
Submitted August 27, 2017 at 07:02PM by bigbottlequorn
via reddit http://ift.tt/2wAddI0
Hacking things by touching them
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:24PM by knoy
via reddit http://ift.tt/2wTHj98
Hacking things by touching them: A guide to physical security
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
http://ift.tt/2vtGHDF
Submitted August 27, 2017 at 11:48PM by knoy
via reddit http://ift.tt/2viC4jW
reddit
Hacking things by touching them: A guide to physical... • r/netsec
0 points and 0 comments so far on reddit
Cross-Site Scripting #3 Bad JavaScript Imports Vulnerability
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
http://ift.tt/2giF0Xh
Submitted August 28, 2017 at 01:02PM by sandeep1337
via reddit http://ift.tt/2xpEuul
SecureLayer7
OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports
Demonstrating the OWASP Top 10 : Cross-Site Scripting #3 Bad JavaScript Imports and with example of the code. To learn about XSS
Just Because a Hacker is Requesting a WordPress Plugin’s File Doesn’t Mean There is a Vulnerability in It
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA
http://ift.tt/2g54SWe
Submitted August 28, 2017 at 03:05PM by campuscodi
via reddit http://ift.tt/2wLv0wA