Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
https://ift.tt/2yJenTU
Submitted June 27, 2018 at 02:57AM by EvanConover
via reddit https://ift.tt/2lDoOza
https://ift.tt/2yJenTU
Submitted June 27, 2018 at 02:57AM by EvanConover
via reddit https://ift.tt/2lDoOza
Talosintelligence
Files Cannot Be Decrypted? Challenge Accepted. Talos Releases ThanatosDecryptor
A blog from the world class Intelligence Group, Talos, Cisco's Intelligence Group
My experience leading purple teaming in the enterprise
https://ift.tt/2K9gIgp
Submitted June 27, 2018 at 10:42AM by webappsec4lyfe
via reddit https://ift.tt/2KnKIB6
https://ift.tt/2K9gIgp
Submitted June 27, 2018 at 10:42AM by webappsec4lyfe
via reddit https://ift.tt/2KnKIB6
Patching DoublePulsar to Exploit Windows Embedded Machines
https://ift.tt/2N08Mvv
Submitted June 26, 2018 at 04:47PM by CaptMeelo
via reddit https://ift.tt/2IsXM6A
https://ift.tt/2N08Mvv
Submitted June 26, 2018 at 04:47PM by CaptMeelo
via reddit https://ift.tt/2IsXM6A
Hack.Learn.Share
Patching DoublePulsar to Exploit Windows Embedded Machines
This blog contains write-ups of the things that I researched, learned, and wanted to share to others.
Another critical remote vulnerability in HP iLO 4 and 5
https://ift.tt/2IvCntn
Submitted June 27, 2018 at 02:18PM by alain_proviste
via reddit https://ift.tt/2KfMUil
https://ift.tt/2IvCntn
Submitted June 27, 2018 at 02:18PM by alain_proviste
via reddit https://ift.tt/2KfMUil
New malware using custom UDP protocol for C2
https://ift.tt/2MpLUEQ
Submitted June 27, 2018 at 04:19PM by MrSnowflake75
via reddit https://ift.tt/2tIf6zf
https://ift.tt/2MpLUEQ
Submitted June 27, 2018 at 04:19PM by MrSnowflake75
via reddit https://ift.tt/2tIf6zf
Palo Alto Networks Blog
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
Unit 42 investigates the RANCOR group’s use of DDKONG and PLAINTEE malware families to deliver targeted espionage attacks in South East Asia
Cisco ASA and Firepower flaw exploited in the wild - Help Net Security
https://ift.tt/2Kt51AF
Submitted June 27, 2018 at 07:19PM by arcspin
via reddit https://ift.tt/2IvCuVG
https://ift.tt/2Kt51AF
Submitted June 27, 2018 at 07:19PM by arcspin
via reddit https://ift.tt/2IvCuVG
Help Net Security
Cisco ASA and Firepower flaw exploited in the wild - Help Net Security
A high-severity vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after an exploit has been releasedA DoS vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after…
Wordpress <= 4.9.6 Arbitrary File Deletion Vulnerability Exploit
https://ift.tt/2Kt5aUo
Submitted June 27, 2018 at 07:11PM by Ambulong
via reddit https://ift.tt/2N4AxmQ
https://ift.tt/2Kt5aUo
Submitted June 27, 2018 at 07:11PM by Ambulong
via reddit https://ift.tt/2N4AxmQ
Vulnspy Blog
Wordpress <= 4.9.6 Arbitrary File Deletion Vulnerability Exploit
Author: @Ambulong WordPress is the most popular CMS on the web. According to w3tech, it is used by approximately 30% of all websites. This wide adoption makes it an interesting target for cyber crimin
WordPress File Delete to Code Execution
https://ift.tt/2It4Wb0
Submitted June 27, 2018 at 05:20PM by GiraffeandBear
via reddit https://ift.tt/2tGTlj7
https://ift.tt/2It4Wb0
Submitted June 27, 2018 at 05:20PM by GiraffeandBear
via reddit https://ift.tt/2tGTlj7
reddit
r/netsec - WordPress File Delete to Code Execution
3 votes and 3 so far on reddit
ASLR Protection for Statically Linked Executables
https://ift.tt/2tHdfL2
Submitted June 27, 2018 at 07:54PM by LeviathanSecurity
via reddit https://ift.tt/2tAEmIh
https://ift.tt/2tHdfL2
Submitted June 27, 2018 at 07:54PM by LeviathanSecurity
via reddit https://ift.tt/2tAEmIh
Leviathan Security
ASLR Protection for Statically Linked Executables
We present new research that details crucial security weaknesses in Linux software that has been statically linked. We also provide a solution to temporarily resolve these security issues. Finally, we conclude by demonstrating how to have both RELRO [1] and…
Subdomain Takeover: Basics
https://ift.tt/2IAHnx6
Submitted June 27, 2018 at 10:07PM by patrikhudak
via reddit https://ift.tt/2KoLqkZ
https://ift.tt/2IAHnx6
Submitted June 27, 2018 at 10:07PM by patrikhudak
via reddit https://ift.tt/2KoLqkZ
Playing with Relayed Credentials
https://ift.tt/2twaFIy
Submitted June 28, 2018 at 12:36AM by mgalloar
via reddit https://ift.tt/2lERaca
https://ift.tt/2twaFIy
Submitted June 28, 2018 at 12:36AM by mgalloar
via reddit https://ift.tt/2lERaca
Core Security
Playing with Relayed Credentials
During penetration testing exercises, the ability to make a victim connect to an attacker’s controlled host provides an interesting approach for compromising systems.
Security Research: Opening the Black Box of Payment Terminal Security
https://ift.tt/2lBnGvI
Submitted June 28, 2018 at 01:18AM by marketingversprite
via reddit https://ift.tt/2tJC9cZ
https://ift.tt/2lBnGvI
Submitted June 28, 2018 at 01:18AM by marketingversprite
via reddit https://ift.tt/2tJC9cZ
VerSprite | Integrated Security Services and Consulting
Opening the Black Box of Payment Terminal Security | VerSprite Blog
The proliferation of credit card skimming is evidence enough that many fraudsters’ target of choice is the payment terminal.
Ticketmaster breach, end users are affected
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
security.ticketmaster.se
INFORMATION ABOUT DATA SECURITY INCIDENT BY THIRD-PARTY SUPPLIER
Ticketmaster has created this website for customers whose personal information may have been compromised in the Inbenta incident. Ensuring the safety and security of the personal data of customers is very important to Ticketmaster. As soon as it was determined…
Ticketmaster breach, end users are affected
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
security.ticketmaster.se
INFORMATION ABOUT DATA SECURITY INCIDENT BY THIRD-PARTY SUPPLIER
Ticketmaster has created this website for customers whose personal information may have been compromised in the Inbenta incident. Ensuring the safety and security of the personal data of customers is very important to Ticketmaster. As soon as it was determined…
Quick write-up on the usage of O365's undocumented "Activities" API
https://ift.tt/2KgQ7ht
Submitted June 28, 2018 at 07:12AM by BeanBagKing
via reddit https://ift.tt/2IvAVHn
https://ift.tt/2KgQ7ht
Submitted June 28, 2018 at 07:12AM by BeanBagKing
via reddit https://ift.tt/2IvAVHn
ØSecurity
Office 365's Secret "Activities" API
The TL;DR up front, because I hate buried leads. Microsoft created an undocumented API that gave incident handlers, forensic teams, and blue teams a tool that they have long wished for and that Microsoft denied having. This API was known to five major forensics…
JSgen.py – bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings
https://ift.tt/2N5RVYq
Submitted June 28, 2018 at 10:55AM by 0x4ndr3
via reddit https://ift.tt/2tJr63f
https://ift.tt/2N5RVYq
Submitted June 28, 2018 at 10:55AM by 0x4ndr3
via reddit https://ift.tt/2tJr63f
Pentester's life
JSgen.py – bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings
I wrote a Python noscript (JSgen.py) to generate javanoscript code to be injected in case you find a Server Side Javanoscript Injection (SSJI). It supports both bind and reverse shells, and also two well…
Overcoming (some) Spectre browser mitigations with PoC (See Comment)
https://ift.tt/2tEeP01
Submitted June 28, 2018 at 12:10PM by TechLord2
via reddit https://ift.tt/2Ms4V9E
https://ift.tt/2tEeP01
Submitted June 28, 2018 at 12:10PM by TechLord2
via reddit https://ift.tt/2Ms4V9E
Alephsecurity
Overcoming (some) Spectre browser mitigations
evilSSDP (tool & technical overview): Abusing SSDP/UPNP on Windows networks to phish inside Windows Explorer. How to spawn spoofed devices on machines across the LAN, tricking users into visiting a phishing page and capturing the NTLM hash.
https://ift.tt/2Iy9GMi
Submitted June 28, 2018 at 04:20AM by initstring
via reddit https://ift.tt/2KiLHXy
https://ift.tt/2Iy9GMi
Submitted June 28, 2018 at 04:20AM by initstring
via reddit https://ift.tt/2KiLHXy
GitLab
InitString / evil-ssdp
Spoof SSDP replies to phish for NTLM hashes on a network. Creates a fake UPNP device, tricking users into visiting a malicious phishing page.
Double-free vulnerability in OpenSLP 2.0.0 (Proof-of-concept exploit available)
https://ift.tt/2IzuOSy
Submitted June 28, 2018 at 02:34PM by magnusstubman
via reddit https://ift.tt/2IzlL3Q
https://ift.tt/2IzuOSy
Submitted June 28, 2018 at 02:34PM by magnusstubman
via reddit https://ift.tt/2IzlL3Q
SSL/TLS for dummies part 3 - Understanding Certificate Authority | WST
https://ift.tt/2KsSTMA
Submitted June 28, 2018 at 02:21PM by silentsniffer
via reddit https://ift.tt/2KuuF7Q
https://ift.tt/2KsSTMA
Submitted June 28, 2018 at 02:21PM by silentsniffer
via reddit https://ift.tt/2KuuF7Q
WST
SSL/TLS for dummies part 3 - Understanding Certificate Authority | WST
What is a Certificate Authority?Digital signature.What if the attacker tampered the certificate?Root CA.Chain of Trust.Browser verify the server certificate
Overcoming (some) Spectre Browser Mitigations (long read)
https://ift.tt/2Mu9XCo
Submitted June 28, 2018 at 05:35PM by ericnyamu
via reddit https://ift.tt/2KvaMum
https://ift.tt/2Mu9XCo
Submitted June 28, 2018 at 05:35PM by ericnyamu
via reddit https://ift.tt/2KvaMum