Cisco ASA and Firepower flaw exploited in the wild - Help Net Security
https://ift.tt/2Kt51AF
Submitted June 27, 2018 at 07:19PM by arcspin
via reddit https://ift.tt/2IvCuVG
https://ift.tt/2Kt51AF
Submitted June 27, 2018 at 07:19PM by arcspin
via reddit https://ift.tt/2IvCuVG
Help Net Security
Cisco ASA and Firepower flaw exploited in the wild - Help Net Security
A high-severity vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after an exploit has been releasedA DoS vulnerability affecting Cisco ASA and Firepower security appliances is being exploited in the wild after…
Wordpress <= 4.9.6 Arbitrary File Deletion Vulnerability Exploit
https://ift.tt/2Kt5aUo
Submitted June 27, 2018 at 07:11PM by Ambulong
via reddit https://ift.tt/2N4AxmQ
https://ift.tt/2Kt5aUo
Submitted June 27, 2018 at 07:11PM by Ambulong
via reddit https://ift.tt/2N4AxmQ
Vulnspy Blog
Wordpress <= 4.9.6 Arbitrary File Deletion Vulnerability Exploit
Author: @Ambulong WordPress is the most popular CMS on the web. According to w3tech, it is used by approximately 30% of all websites. This wide adoption makes it an interesting target for cyber crimin
WordPress File Delete to Code Execution
https://ift.tt/2It4Wb0
Submitted June 27, 2018 at 05:20PM by GiraffeandBear
via reddit https://ift.tt/2tGTlj7
https://ift.tt/2It4Wb0
Submitted June 27, 2018 at 05:20PM by GiraffeandBear
via reddit https://ift.tt/2tGTlj7
reddit
r/netsec - WordPress File Delete to Code Execution
3 votes and 3 so far on reddit
ASLR Protection for Statically Linked Executables
https://ift.tt/2tHdfL2
Submitted June 27, 2018 at 07:54PM by LeviathanSecurity
via reddit https://ift.tt/2tAEmIh
https://ift.tt/2tHdfL2
Submitted June 27, 2018 at 07:54PM by LeviathanSecurity
via reddit https://ift.tt/2tAEmIh
Leviathan Security
ASLR Protection for Statically Linked Executables
We present new research that details crucial security weaknesses in Linux software that has been statically linked. We also provide a solution to temporarily resolve these security issues. Finally, we conclude by demonstrating how to have both RELRO [1] and…
Subdomain Takeover: Basics
https://ift.tt/2IAHnx6
Submitted June 27, 2018 at 10:07PM by patrikhudak
via reddit https://ift.tt/2KoLqkZ
https://ift.tt/2IAHnx6
Submitted June 27, 2018 at 10:07PM by patrikhudak
via reddit https://ift.tt/2KoLqkZ
Playing with Relayed Credentials
https://ift.tt/2twaFIy
Submitted June 28, 2018 at 12:36AM by mgalloar
via reddit https://ift.tt/2lERaca
https://ift.tt/2twaFIy
Submitted June 28, 2018 at 12:36AM by mgalloar
via reddit https://ift.tt/2lERaca
Core Security
Playing with Relayed Credentials
During penetration testing exercises, the ability to make a victim connect to an attacker’s controlled host provides an interesting approach for compromising systems.
Security Research: Opening the Black Box of Payment Terminal Security
https://ift.tt/2lBnGvI
Submitted June 28, 2018 at 01:18AM by marketingversprite
via reddit https://ift.tt/2tJC9cZ
https://ift.tt/2lBnGvI
Submitted June 28, 2018 at 01:18AM by marketingversprite
via reddit https://ift.tt/2tJC9cZ
VerSprite | Integrated Security Services and Consulting
Opening the Black Box of Payment Terminal Security | VerSprite Blog
The proliferation of credit card skimming is evidence enough that many fraudsters’ target of choice is the payment terminal.
Ticketmaster breach, end users are affected
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
security.ticketmaster.se
INFORMATION ABOUT DATA SECURITY INCIDENT BY THIRD-PARTY SUPPLIER
Ticketmaster has created this website for customers whose personal information may have been compromised in the Inbenta incident. Ensuring the safety and security of the personal data of customers is very important to Ticketmaster. As soon as it was determined…
Ticketmaster breach, end users are affected
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
https://ift.tt/2yNiw9v
Submitted June 28, 2018 at 01:56AM by pause1
via reddit https://ift.tt/2Kq8aOg
security.ticketmaster.se
INFORMATION ABOUT DATA SECURITY INCIDENT BY THIRD-PARTY SUPPLIER
Ticketmaster has created this website for customers whose personal information may have been compromised in the Inbenta incident. Ensuring the safety and security of the personal data of customers is very important to Ticketmaster. As soon as it was determined…
Quick write-up on the usage of O365's undocumented "Activities" API
https://ift.tt/2KgQ7ht
Submitted June 28, 2018 at 07:12AM by BeanBagKing
via reddit https://ift.tt/2IvAVHn
https://ift.tt/2KgQ7ht
Submitted June 28, 2018 at 07:12AM by BeanBagKing
via reddit https://ift.tt/2IvAVHn
ØSecurity
Office 365's Secret "Activities" API
The TL;DR up front, because I hate buried leads. Microsoft created an undocumented API that gave incident handlers, forensic teams, and blue teams a tool that they have long wished for and that Microsoft denied having. This API was known to five major forensics…
JSgen.py – bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings
https://ift.tt/2N5RVYq
Submitted June 28, 2018 at 10:55AM by 0x4ndr3
via reddit https://ift.tt/2tJr63f
https://ift.tt/2N5RVYq
Submitted June 28, 2018 at 10:55AM by 0x4ndr3
via reddit https://ift.tt/2tJr63f
Pentester's life
JSgen.py – bind and reverse shell JS code generator for SSJI in Node.js with filter bypass encodings
I wrote a Python noscript (JSgen.py) to generate javanoscript code to be injected in case you find a Server Side Javanoscript Injection (SSJI). It supports both bind and reverse shells, and also two well…
Overcoming (some) Spectre browser mitigations with PoC (See Comment)
https://ift.tt/2tEeP01
Submitted June 28, 2018 at 12:10PM by TechLord2
via reddit https://ift.tt/2Ms4V9E
https://ift.tt/2tEeP01
Submitted June 28, 2018 at 12:10PM by TechLord2
via reddit https://ift.tt/2Ms4V9E
Alephsecurity
Overcoming (some) Spectre browser mitigations
evilSSDP (tool & technical overview): Abusing SSDP/UPNP on Windows networks to phish inside Windows Explorer. How to spawn spoofed devices on machines across the LAN, tricking users into visiting a phishing page and capturing the NTLM hash.
https://ift.tt/2Iy9GMi
Submitted June 28, 2018 at 04:20AM by initstring
via reddit https://ift.tt/2KiLHXy
https://ift.tt/2Iy9GMi
Submitted June 28, 2018 at 04:20AM by initstring
via reddit https://ift.tt/2KiLHXy
GitLab
InitString / evil-ssdp
Spoof SSDP replies to phish for NTLM hashes on a network. Creates a fake UPNP device, tricking users into visiting a malicious phishing page.
Double-free vulnerability in OpenSLP 2.0.0 (Proof-of-concept exploit available)
https://ift.tt/2IzuOSy
Submitted June 28, 2018 at 02:34PM by magnusstubman
via reddit https://ift.tt/2IzlL3Q
https://ift.tt/2IzuOSy
Submitted June 28, 2018 at 02:34PM by magnusstubman
via reddit https://ift.tt/2IzlL3Q
SSL/TLS for dummies part 3 - Understanding Certificate Authority | WST
https://ift.tt/2KsSTMA
Submitted June 28, 2018 at 02:21PM by silentsniffer
via reddit https://ift.tt/2KuuF7Q
https://ift.tt/2KsSTMA
Submitted June 28, 2018 at 02:21PM by silentsniffer
via reddit https://ift.tt/2KuuF7Q
WST
SSL/TLS for dummies part 3 - Understanding Certificate Authority | WST
What is a Certificate Authority?Digital signature.What if the attacker tampered the certificate?Root CA.Chain of Trust.Browser verify the server certificate
Overcoming (some) Spectre Browser Mitigations (long read)
https://ift.tt/2Mu9XCo
Submitted June 28, 2018 at 05:35PM by ericnyamu
via reddit https://ift.tt/2KvaMum
https://ift.tt/2Mu9XCo
Submitted June 28, 2018 at 05:35PM by ericnyamu
via reddit https://ift.tt/2KvaMum
Using the Office 365 Activities API to Investigate Business Email Compromises
https://ift.tt/2K8tpHC
Submitted June 28, 2018 at 06:47PM by BeanBagKing
via reddit https://ift.tt/2IzzMii
https://ift.tt/2K8tpHC
Submitted June 28, 2018 at 06:47PM by BeanBagKing
via reddit https://ift.tt/2IzzMii
Crowdstrike
Using the Office 365 Activities API to Investigate Business Email Compromises
Learn how CrowdStrike Services used the Office 365 Activities API to investigate Business Email Compromises (BECs) involving cyber fraud and theft.
This popular Facebook app publicly exposed your data for years
https://ift.tt/2KtH2hh
Submitted June 28, 2018 at 07:37PM by albinowax
via reddit https://ift.tt/2KeI0lr
https://ift.tt/2KtH2hh
Submitted June 28, 2018 at 07:37PM by albinowax
via reddit https://ift.tt/2KeI0lr
Medium
This popular Facebook app publicly exposed your data for years
Ever took a personality test on Facebook? For years, anyone could have accessed your private information, friends, posts and photos.
The ultimate honeypot
https://ift.tt/2IA2e3r
Submitted June 28, 2018 at 07:32PM by Captain_Zurich
via reddit https://ift.tt/2KvOBE6
https://ift.tt/2IA2e3r
Submitted June 28, 2018 at 07:32PM by Captain_Zurich
via reddit https://ift.tt/2KvOBE6
Telegraph.co.uk
CIA plot led to huge blast in Siberian gas pipeline
A CIA operation to sabotage Soviet industry by duping Moscow into stealing booby-trapped software was spectacularly successful when it triggered a huge explosion in a Siberian gas pipeline.
Frida Engage: Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida
https://ift.tt/2lHUGTo
Submitted June 28, 2018 at 08:28PM by marketingversprite
via reddit https://ift.tt/2KopFlp
https://ift.tt/2lHUGTo
Submitted June 28, 2018 at 08:28PM by marketingversprite
via reddit https://ift.tt/2KopFlp
VerSprite | Integrated Security Services and Consulting
Shellcoding an Arm64 In-Memory Reverse TCP Shell with Frida | VerSprite
In part two of the series we are going to explore and leverage Frida's new Arm64Writer API to build an in-memory reverse TCP shell.
Reverse Engineering WebAssembly Applications
https://ift.tt/2MxcLPn
Submitted June 28, 2018 at 07:15PM by CyberBullets
via reddit https://ift.tt/2Ki3YUP
https://ift.tt/2MxcLPn
Submitted June 28, 2018 at 07:15PM by CyberBullets
via reddit https://ift.tt/2Ki3YUP
Forcepoint
Analyzing WebAssembly binaries
We recently published a blog post on security issues and fundamental concepts of WebAssembly (Wasm). As a follow-up, this post will give an introduction to reverse engineering of Wasm applications. Think about a scenario where you come across an unknown Wasm…