Five Easy Steps To Bypass Analysis of Mails in Antivirus by Manipulating MIME
https://ift.tt/2J0Vv2y
Submitted July 07, 2018 at 01:32AM by maulwuff
via reddit https://ift.tt/2KP01q2
https://ift.tt/2J0Vv2y
Submitted July 07, 2018 at 01:32AM by maulwuff
via reddit https://ift.tt/2KP01q2
reddit
r/netsec - Five Easy Steps To Bypass Analysis of Mails in Antivirus by Manipulating MIME
3 votes and 0 so far on reddit
HTTPView - In-browser Web Application Security Testing Tool (client-side only)
https://ift.tt/2B9QyAz
Submitted July 07, 2018 at 03:01AM by _pdp_
via reddit https://ift.tt/2KUOgLw
https://ift.tt/2B9QyAz
Submitted July 07, 2018 at 03:01AM by _pdp_
via reddit https://ift.tt/2KUOgLw
enumerid - Enumerating valid ranges after initial compromise
https://ift.tt/2KYzvHp
Submitted July 07, 2018 at 12:35AM by krieger_0x00
via reddit https://ift.tt/2KRdDkr
https://ift.tt/2KYzvHp
Submitted July 07, 2018 at 12:35AM by krieger_0x00
via reddit https://ift.tt/2KRdDkr
Gitea RCE via fake JWT, race condition and git hooks chain
https://ift.tt/2KMLlHS
Submitted July 07, 2018 at 01:58PM by kszurek
via reddit https://ift.tt/2u2MZeX
https://ift.tt/2KMLlHS
Submitted July 07, 2018 at 01:58PM by kszurek
via reddit https://ift.tt/2u2MZeX
Msfenum: automation of MSF auxiliary modules
https://ift.tt/2ud26lc
Submitted July 07, 2018 at 02:46PM by rikvduijn
via reddit https://ift.tt/2zhoWOj
https://ift.tt/2ud26lc
Submitted July 07, 2018 at 02:46PM by rikvduijn
via reddit https://ift.tt/2zhoWOj
reddit
r/netsec - Msfenum: automation of MSF auxiliary modules
14 votes and 0 comments so far on Reddit
Tool for exploiting unauthenticated RCE over T3 protocol on Weblogic servers (i.e. version 12.2.1.1, 12.1.3.0), CVE-2017-3248
https://ift.tt/2u4FmEI
Submitted July 07, 2018 at 06:54PM by HeadProfessional
via reddit https://ift.tt/2u9u2Xe
https://ift.tt/2u4FmEI
Submitted July 07, 2018 at 06:54PM by HeadProfessional
via reddit https://ift.tt/2u9u2Xe
GitHub
quentinhardy/noscriptsAndExploits
noscriptsAndExploits - Some noscripts and exploits
How to search for Open Amazon s3 Buckets and their contents - New free online tool
https://ift.tt/2MSIVVw
Submitted July 08, 2018 at 12:05AM by grayhatwarfare
via reddit https://ift.tt/2J3cmlk
https://ift.tt/2MSIVVw
Submitted July 08, 2018 at 12:05AM by grayhatwarfare
via reddit https://ift.tt/2J3cmlk
Medium
How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com
Intro
Hacking With AWS Lambda
https://ift.tt/2ucL8U5
Submitted July 08, 2018 at 01:54AM by lmaohtp
via reddit https://ift.tt/2lZX1ZS
https://ift.tt/2ucL8U5
Submitted July 08, 2018 at 01:54AM by lmaohtp
via reddit https://ift.tt/2lZX1ZS
Hacking a game to learn FRIDA basics
https://ift.tt/2udNp19
Submitted July 08, 2018 at 02:21AM by gid0rah
via reddit https://ift.tt/2ziLZrZ
https://ift.tt/2udNp19
Submitted July 08, 2018 at 02:21AM by gid0rah
via reddit https://ift.tt/2ziLZrZ
x-c3ll.github.io
Hacking a game to learn FRIDA basics (Pwn Adventure 3) ::
DoomsDay Vault
DoomsDay Vault
Learn the basic usage of Frida with this tutorial. Build your own cheat with Frida.
Getting started with Firmware emulation
https://ift.tt/2rGdqrW
Submitted July 08, 2018 at 03:42PM by adi0x90
via reddit https://ift.tt/2m34FCY
https://ift.tt/2rGdqrW
Submitted July 08, 2018 at 03:42PM by adi0x90
via reddit https://ift.tt/2m34FCY
Attify Blog - IoT Security, Pentesting and Exploitation
Getting started with Firmware Emulation for IoT Devices
Learn how to emulate firmware meant for different architectures to be able to exploit them better.
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
https://ift.tt/2m11GL6
Submitted July 08, 2018 at 07:11PM by QWieke
via reddit https://ift.tt/2MXmvm1
https://ift.tt/2m11GL6
Submitted July 08, 2018 at 07:11PM by QWieke
via reddit https://ift.tt/2MXmvm1
De Correspondent
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
How can a simple running app let you identify military personnel, intelligence operatives, and other users – and even pinpoint their home address? In this piece, we explain step by step how we were able to do it.
How Dutch investigative journalists found the names and addresses of soldiers and secret agents using a simple fitness app
https://ift.tt/2m5jWmp
Submitted July 09, 2018 at 02:31AM by alexanderpas
via reddit https://ift.tt/2KSUb73
https://ift.tt/2m5jWmp
Submitted July 09, 2018 at 02:31AM by alexanderpas
via reddit https://ift.tt/2KSUb73
De Correspondent
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
How can a simple running app let you identify military personnel, intelligence operatives, and other users – and even pinpoint their home address? In this piece, we explain step by step how we were able to do it.
Timehop Security Incident
https://ift.tt/2uiJOyY
Submitted July 09, 2018 at 01:08PM by ShermheadRyder
via reddit https://ift.tt/2KWUNoZ
https://ift.tt/2uiJOyY
Submitted July 09, 2018 at 01:08PM by ShermheadRyder
via reddit https://ift.tt/2KWUNoZ
Timehop
Security - Technical
Timehop helps you celebrate the best moments of the past with your friends.
It's like #tbt every day! Download for free today for iOS and Android.
It's like #tbt every day! Download for free today for iOS and Android.
CVE-2017-10271: Oracle WebLogic Server RCE – Sleep detection payload
https://ift.tt/2m3DIyM
Submitted July 09, 2018 at 07:46PM by 0xdea
via reddit https://ift.tt/2KYypvo
https://ift.tt/2m3DIyM
Submitted July 09, 2018 at 07:46PM by 0xdea
via reddit https://ift.tt/2KYypvo
Timehop disclosure of security incident
https://ift.tt/2NzHmNq
Submitted July 09, 2018 at 09:17PM by Natanael_L
via reddit https://ift.tt/2udIMUQ
https://ift.tt/2NzHmNq
Submitted July 09, 2018 at 09:17PM by Natanael_L
via reddit https://ift.tt/2udIMUQ
Timehop
Security
Timehop helps you celebrate the best moments of the past with your friends.
It's like #tbt every day! Download for free today for iOS and Android.
It's like #tbt every day! Download for free today for iOS and Android.
Improving the Tastic Thief Long-Range RFID Reader
https://ift.tt/2J4HqRX
Submitted July 09, 2018 at 11:07PM by TastyHoneyBadger
via reddit https://ift.tt/2KVxLCi
https://ift.tt/2J4HqRX
Submitted July 09, 2018 at 11:07PM by TastyHoneyBadger
via reddit https://ift.tt/2KVxLCi
Silent Break Security
ESPKey + Long Range RFID Reader = A New Tastic Thief | Silent Break Security
There have been plenty of blog posts, and security conference talks about building long-range RFID badge readers. Bishop Fox (RFID Hacking Tools) and Inguardians (Make your tastic fun tastic) both...
Security Firm Sued for Failing to Detect Malware That Caused a 2009 Breach
https://ift.tt/2u7blEc
Submitted July 10, 2018 at 02:15AM by MisterCBax
via reddit https://ift.tt/2L00t4P
https://ift.tt/2u7blEc
Submitted July 10, 2018 at 02:15AM by MisterCBax
via reddit https://ift.tt/2L00t4P
BleepingComputer
Security Firm Sued for Failing to Detect Malware That Caused a 2009 Breach
Two insurance companies are suing a cyber-security firm to recover insurance fees paid to a customer after the security firm failed to detect malware on the client's network for months, an issue that led to one of the biggest security breaches of the 2000s.…
Finding Phishing: Tools and Techniques
https://ift.tt/2zqHWKy
Submitted July 10, 2018 at 02:32AM by patrikhudak
via reddit https://ift.tt/2J77HPF
https://ift.tt/2zqHWKy
Submitted July 10, 2018 at 02:32AM by patrikhudak
via reddit https://ift.tt/2J77HPF
reddit
r/netsec - Finding Phishing: Tools and Techniques
5 votes and 0 so far on reddit
Microsoft has finally provided a service that mitigates the single most critical password-related security risk in the enterprise today: common passwords. You should kick the tires on this new Active Directory capability today, so you can deploy it as soon as it reaches general availability.
https://ift.tt/2L40cuk
Submitted July 10, 2018 at 05:24AM by longevitytech
via reddit https://ift.tt/2m4AxqE
https://ift.tt/2L40cuk
Submitted July 10, 2018 at 05:24AM by longevitytech
via reddit https://ift.tt/2m4AxqE
Longevity Technology
Azure AD Password Protection: The Cloud Security Service your Active Directory Needs Now | Longevity Technology
Microsoft has finally provided a service that mitigates the single most critical password-related security risk in the enterprise today: common passwords. You should kick the tires on this new Active Directory capability today, so you can deploy it as soon…
/r/netsec's Q3 2018 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 10, 2018 at 05:09AM by ranok
via reddit https://ift.tt/2ui9qMp
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 10, 2018 at 05:09AM by ranok
via reddit https://ift.tt/2ui9qMp
Troy Hunt: The 111 Million Record Pemiblanc Credential Stuffing List
https://ift.tt/2u7iLYk
Submitted July 10, 2018 at 10:41AM by Royal_SeaLion
via reddit https://ift.tt/2m4jHIl
https://ift.tt/2u7iLYk
Submitted July 10, 2018 at 10:41AM by Royal_SeaLion
via reddit https://ift.tt/2m4jHIl
Troy Hunt
The 111 Million Record Pemiblanc Credential Stuffing List
One of the most alarming trends I've seen in the world of data breaches since starting Have I Been Pwned (HIBP) back in 2013 is the rapid rise of credential stuffing attacks. Per the definition in that link, it simply means this: Credential stuffing is the…