Netsec – Telegram
Netsec
7.41K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
macOS High Sierra Kernel Heap Overflow
https://ift.tt/2Eqj9Dt

Submitted April 06, 2018 at 11:57PM by pocorgtfoftw
via reddit https://ift.tt/2H26ls9
Use ltrace with pwnlib.tubes.process instances, useful for heap exploitation.
https://ift.tt/2IyKYfq

Submitted April 07, 2018 at 12:43AM by malweisse
via reddit https://ift.tt/2q9b8hY
T-Mobile Stores Part of Customers' Passwords In Plaintext, Says It Has 'Amazingly Good' Security | A T-Mobile Austria customer representative made a shocking admission in a Twitter thread
https://ift.tt/2qc6BdM

Submitted April 07, 2018 at 04:07AM by Ebadd
via reddit https://ift.tt/2qbH04Q
Keys for ESET NOD32, Kaspersky, Avast, Dr.Web, Avira
https://ift.tt/2JsKqZS

Submitted April 07, 2018 at 04:31AM by brastagi
via reddit https://ift.tt/2IzA2ya
BRACE YOURSELF - Cisco Vulnerabilities are Coming (Read: Reminder to Check Cisco CVEs for recent announcements, hardcoded passwords, etc)
https://ift.tt/20R8XZ4

Submitted April 07, 2018 at 03:53AM by russellvt
via reddit https://ift.tt/2q8JUHs
T-Mobile digs their own grave
https://ift.tt/2qe2ldV

Submitted April 07, 2018 at 11:38AM by fr34k83
via reddit https://ift.tt/2GFkxIn
130,000 Finnish user data exposed in third largest data breach ever happened in the country
https://ift.tt/2qeEbkf

Submitted April 07, 2018 at 08:12PM by Horus_Sirius
via reddit https://ift.tt/2GGx0rd
New variant of the Mirai Botnet targets the financial industry
https://ift.tt/2GJeVwQ

Submitted April 07, 2018 at 08:17PM by Horus_Sirius
via reddit https://ift.tt/2qhElqq
the beep command can be used to probe for existence of files owned by other users including root
https://ift.tt/2IAAADS

Submitted April 07, 2018 at 10:09PM by rain5
via reddit https://ift.tt/2GKsurP
LineageOS 14.1 Blueborne Remote Code Execution
https://ift.tt/2qcF8bW

Submitted April 07, 2018 at 10:48PM by Horus_Sirius
via reddit https://ift.tt/2GELJam
Phishing emails: how to fight back?
Hello, Typically when I receive phishing emails I try and do a few things for the greater good. What else does everyone else do when they receive phishing emails?I block the email domain. They usually spoof the domain and almost never re use but it's a good best practice. If they actually legitimately used someone's email, sometimes based on the SPF/DKIM records, I'll try and email the company to let them know they've been compromised.I click the link in a sandboxed environment to inspect the attack. If it's a password phishing type email, I'll fill it up with a bunch of junk data. This is for fun and usually futile, I just like to see what they are attempting. Like, have they updated their scam to include the new Office365 page finally? I'll also block that URL on the firewall.I'll look up the domain registration and IP address of the server and then reach out to both hosting companies with the information. That usually is pretty effective in having the site shut down. Sometimes when I click the link, the page is already offline meaning either someone else reported it or the hosting company figured it out.I send out some reminders to staff with some examples periodically.note: I am not interested in prevention strategies such as Email filters, Multifactor, Simulated campaigns, etc.

Submitted April 08, 2018 at 02:38AM by mactalker
via reddit https://ift.tt/2ErgMAo