Six Security Vulnerabilities from a Year of HackerOne
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
http://ift.tt/2sl3wfx
Submitted July 19, 2017 at 02:15AM by hash_salts
via reddit http://ift.tt/2u6X8HW
Flexport Engineering
Six Security Vulnerabilities from a Year of HackerOne
We launched our HackerOne program a year ago to increase the security of Flexport.
A Security Audit of Firefox Accounts
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
http://ift.tt/2uzXzLH
Submitted July 19, 2017 at 02:02AM by jvehent
via reddit http://ift.tt/2tDSayR
Mozilla Security Blog
A Security Audit of Firefox Accounts
To provide transparency into our ongoing efforts to protect your privacy and security on the Internet, we are releasing a security audit of Firefox Accounts ...
Setting up a burner phone number using Twilio and 9 lines of code
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
http://ift.tt/2vAyZaJ
Submitted July 19, 2017 at 10:15AM by xxdesmus
via reddit http://ift.tt/2to899f
Making and breaking things.
Quickly setting up a burner phone number using Twilio
Firstly the advice in this article is not designed for people who are trying to evade spying or some other stuff, it's just to avoid marketers or avoid giving your number to someone you don't want to. So I'm going over to the states at the end of this week
How to Create the Ultimate Fake Access Point [Walkthrough]
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
http://ift.tt/2vfY0IU
Submitted July 19, 2017 at 12:31PM by rootsh3ll
via reddit http://ift.tt/2te5731
rootsh3ll
The Ultimate Fake Access Point [Walkthrough] - rootsh3ll
Overview Assuming that you are capable of setting up a fake access point and setup Apache configuration accordingly to fool victim(s) I am beginning this walk-through. In this scenario, we are using one wireless adapter and an Ethernet connection (under VM)…
New cache architecture on Intel I9 and Skylake server: An initial assessment
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
http://ift.tt/2u7qOTL
Submitted July 19, 2017 at 04:09PM by maxxori
via reddit http://ift.tt/2uyIMkF
cyber.wtf
New cache architecture on Intel I9 and Skylake server: An initial assessment
Intel has introduced the new I9 CPU which is seen as HEDT (High-End-DeskTop) product. The micro architecture is in many respects shared with the new Skylake server micro architecture.I f his…
VBScript Injection via GNOME Thumbnailer
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
http://ift.tt/2tjkawh
Submitted July 19, 2017 at 04:52PM by campuscodi
via reddit http://ift.tt/2tpgpWo
reddit
VBScript Injection via GNOME Thumbnailer • r/netsec
1 points and 0 comments so far on reddit
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
http://ift.tt/2tFG3Bt
Submitted July 19, 2017 at 06:14PM by skeeto
via reddit http://ift.tt/2viNMrb
Ioactive
Multiple Critical Vulnerabilities Found in Popular Motorized Hoverboards
By Thomas Kilbride Not that long ago, motorized hoverboards were in the news – according to widespread reports, they had a tendency to c...
Red Teaming Tips by Vincent Yiu
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
http://ift.tt/2vC13dP
Submitted July 19, 2017 at 07:10PM by 14cmddr
via reddit http://ift.tt/2uIA2cm
Tilting at windmills
Red Teaming Tips by Vincent Yiu
Vincent Yiu has tweeted some really useful red teaming tips. Red Tip #1: Profile your victim and use their user agent to mask your traffic. Alternatively use UA from software such as Outlook. Red t…
'Atomic fingerprinting' tech could end counterfeit goods
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
http://ift.tt/2uC3wHV
Submitted July 19, 2017 at 07:40PM by severusssblackkk
via reddit http://ift.tt/2uaa3c9
Live Science
'Atomic Fingerprinting' Tech Could End Counterfeit Goods
Scientists have developed a new method that can stamp things with "atomic fingerprints" to keep counterfeit goods at bay.
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
http://ift.tt/2tedxr1
Submitted July 19, 2017 at 09:03PM by striata
via reddit http://ift.tt/2vj5wCH
Troy Hunt
On The (Perceived) Value of EV Certs, Commercial CAs, Phishing and Let's Encrypt
Last week I wrote about how Life Is About to Get a Whole Lot Harder for Websites Without HTTPS. Somewhere in the comments there, the discussion went off on a tangent about commercial CAs, the threat Let's Encrypt poses to them and subsequently, the value…
NuCypher KMS whitepaper: decentralized key management system. Call for comments and suggestions
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
http://ift.tt/2uzxqNi
Submitted July 19, 2017 at 10:41PM by michwill
via reddit http://ift.tt/2uD4vaM
Medium
NuCypher KMS: Decentralized key management system
We’re excited to share NuCypher KMS, a decentralized key management system (KMS) for public blockchains.
ARM Exploit Development beginners: "Process Memory and Memory Corruptions (Stack and Heap)"
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
http://ift.tt/2gLDVH0
Submitted July 20, 2017 at 03:40AM by maxxori
via reddit http://ift.tt/2trM3m7
Azeria-Labs
Process Memory and Memory Corruption
Anatomy of Ransomware Part 1: Chimera
http://ift.tt/2qb289N
Submitted July 20, 2017 at 04:28AM by NeedsMoreCarryHandle
via reddit http://ift.tt/2gLHTj6
http://ift.tt/2qb289N
Submitted July 20, 2017 at 04:28AM by NeedsMoreCarryHandle
via reddit http://ift.tt/2gLHTj6
hackers-arise
Anatomy of Ransomware, Part 1: Chimera | hackers-arise
Ransomware is a type of malware that has become almost epidemic in recent years. Consumers and businesses are being hit with this malware around the world. Afte...
Remote code execution in Source games via player fragging
http://ift.tt/2uKyRsN
Submitted July 20, 2017 at 06:46AM by OneUpSecurity
via reddit http://ift.tt/2tIEl2l
http://ift.tt/2uKyRsN
Submitted July 20, 2017 at 06:46AM by OneUpSecurity
via reddit http://ift.tt/2tIEl2l
Oneupsecurity
Ever get remote code execution by fragging a player?
Valve's Source SDK contained a buffer overflow vulnerability which allowed remote code execution on clients and servers. The vulnerability was exploited by fragging a player, which casued a specially crafted ragdoll model to be loaded. Multiple Source games…
Authenticating Email Using DKIM and ARC
http://ift.tt/2uzTWFZ
Submitted July 20, 2017 at 08:04AM by danwin
via reddit http://ift.tt/2u9RWRT
http://ift.tt/2uzTWFZ
Submitted July 20, 2017 at 08:04AM by danwin
via reddit http://ift.tt/2u9RWRT
ProPublica
Authenticating Email Using DKIM and ARC, or How We Analyzed the Kasowitz Emails
Last week we needed to authenticate some emails sent by the President’s lawyer, Marc Kasowitz. Here’s how we did it.
How to Pwn one of the CREST exam Postgres boxes
https://medium.com/@panagiotis84/a-penetration-testers-guide-to-postgresql-e0eafd1a1028?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BkQdiQJgtRUy3YVAgXSIn1g%3D%3D
Submitted July 20, 2017 at 12:20PM by johnsmithe99
via reddit https://www.reddit.com/r/netsec/comments/6oektf/how_to_pwn_one_of_the_crest_exam_postgres_boxes/?utm_source=ifttt
https://medium.com/@panagiotis84/a-penetration-testers-guide-to-postgresql-e0eafd1a1028?lipi=urn%3Ali%3Apage%3Ad_flagship3_feed%3BkQdiQJgtRUy3YVAgXSIn1g%3D%3D
Submitted July 20, 2017 at 12:20PM by johnsmithe99
via reddit https://www.reddit.com/r/netsec/comments/6oektf/how_to_pwn_one_of_the_crest_exam_postgres_boxes/?utm_source=ifttt
Medium
A Penetration Tester’s Guide to PostgreSQL
PostgreSQL is an open source database which can be found mostly in Linux operating systems. However it has great compatibility with…
Notes and Analysis for RE and Pwning tasks in CTFs
http://ift.tt/2udBIYe
Submitted July 20, 2017 at 10:00PM by Fuzz_Stati0n
via reddit http://ift.tt/2ttPIje
http://ift.tt/2udBIYe
Submitted July 20, 2017 at 10:00PM by Fuzz_Stati0n
via reddit http://ift.tt/2ttPIje
GitHub
jaybosamiya/security-notes
:notebook: Some security related notes. Contribute to jaybosamiya/security-notes development by creating an account on GitHub.
How I tricked Symantec with a Fake Private Key
http://ift.tt/2uCVWNo
Submitted July 20, 2017 at 10:49PM by pheedrus
via reddit http://ift.tt/2udhwFD
http://ift.tt/2uCVWNo
Submitted July 20, 2017 at 10:49PM by pheedrus
via reddit http://ift.tt/2udhwFD
reddit
How I tricked Symantec with a Fake Private Key • r/netsec
2 points and 0 comments so far on reddit
Disarming a home alarm using PandwaRF Rogue Pro – RF analysis tool for physical pentesters
https://www.youtube.com/watch?v=zKXKO7Zsa4Y
Submitted July 20, 2017 at 03:06PM by Tartopom06
via reddit http://ift.tt/2udtVtm
https://www.youtube.com/watch?v=zKXKO7Zsa4Y
Submitted July 20, 2017 at 03:06PM by Tartopom06
via reddit http://ift.tt/2udtVtm
YouTube
PandwaRF vs PandwaRF Rogue: Brute Force Attack
Are your alarm systems secure?
PandwaRF is a pocket-sized, portable RF analysis tool operating the sub-1 GHz range. It allows the capture, analysis and re-transmission of RF via an Android device or a Linux PC.
PandwaRF Rogue is an improved variant of the…
PandwaRF is a pocket-sized, portable RF analysis tool operating the sub-1 GHz range. It allows the capture, analysis and re-transmission of RF via an Android device or a Linux PC.
PandwaRF Rogue is an improved variant of the…
Limitations of Android AntiVirus Scanners
http://ift.tt/2uE11oW
Submitted July 21, 2017 at 12:20AM by _Z_
via reddit http://ift.tt/2udFzV8
http://ift.tt/2uE11oW
Submitted July 21, 2017 at 12:20AM by _Z_
via reddit http://ift.tt/2udFzV8
reddit
Limitations of Android AntiVirus Scanners • r/netsec
1 points and 0 comments so far on reddit
Building a Content Security Policy configuration with CSP Auditor
http://ift.tt/2voAjhI
Submitted July 21, 2017 at 12:47AM by becojo
via reddit http://ift.tt/2gO9QGQ
http://ift.tt/2voAjhI
Submitted July 21, 2017 at 12:47AM by becojo
via reddit http://ift.tt/2gO9QGQ
GoSecure
Building a Content Security Policy configuration with CSP Auditor - GoSecure
In this blog post, we discuss the basic strategy to integrate CSP into an existing website. It covers the theory and the new features of CSP Auditor.