Tool for exploiting unauthenticated RCE over T3 protocol on Weblogic servers (i.e. version 12.2.1.1, 12.1.3.0), CVE-2017-3248
https://ift.tt/2u4FmEI
Submitted July 07, 2018 at 06:54PM by HeadProfessional
via reddit https://ift.tt/2u9u2Xe
https://ift.tt/2u4FmEI
Submitted July 07, 2018 at 06:54PM by HeadProfessional
via reddit https://ift.tt/2u9u2Xe
GitHub
quentinhardy/noscriptsAndExploits
noscriptsAndExploits - Some noscripts and exploits
How to search for Open Amazon s3 Buckets and their contents - New free online tool
https://ift.tt/2MSIVVw
Submitted July 08, 2018 at 12:05AM by grayhatwarfare
via reddit https://ift.tt/2J3cmlk
https://ift.tt/2MSIVVw
Submitted July 08, 2018 at 12:05AM by grayhatwarfare
via reddit https://ift.tt/2J3cmlk
Medium
How to search for Open Amazon s3 Buckets and their contents — https://buckets.grayhatwarfare.com
Intro
Hacking With AWS Lambda
https://ift.tt/2ucL8U5
Submitted July 08, 2018 at 01:54AM by lmaohtp
via reddit https://ift.tt/2lZX1ZS
https://ift.tt/2ucL8U5
Submitted July 08, 2018 at 01:54AM by lmaohtp
via reddit https://ift.tt/2lZX1ZS
Hacking a game to learn FRIDA basics
https://ift.tt/2udNp19
Submitted July 08, 2018 at 02:21AM by gid0rah
via reddit https://ift.tt/2ziLZrZ
https://ift.tt/2udNp19
Submitted July 08, 2018 at 02:21AM by gid0rah
via reddit https://ift.tt/2ziLZrZ
x-c3ll.github.io
Hacking a game to learn FRIDA basics (Pwn Adventure 3) ::
DoomsDay Vault
DoomsDay Vault
Learn the basic usage of Frida with this tutorial. Build your own cheat with Frida.
Getting started with Firmware emulation
https://ift.tt/2rGdqrW
Submitted July 08, 2018 at 03:42PM by adi0x90
via reddit https://ift.tt/2m34FCY
https://ift.tt/2rGdqrW
Submitted July 08, 2018 at 03:42PM by adi0x90
via reddit https://ift.tt/2m34FCY
Attify Blog - IoT Security, Pentesting and Exploitation
Getting started with Firmware Emulation for IoT Devices
Learn how to emulate firmware meant for different architectures to be able to exploit them better.
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
https://ift.tt/2m11GL6
Submitted July 08, 2018 at 07:11PM by QWieke
via reddit https://ift.tt/2MXmvm1
https://ift.tt/2m11GL6
Submitted July 08, 2018 at 07:11PM by QWieke
via reddit https://ift.tt/2MXmvm1
De Correspondent
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
How can a simple running app let you identify military personnel, intelligence operatives, and other users – and even pinpoint their home address? In this piece, we explain step by step how we were able to do it.
How Dutch investigative journalists found the names and addresses of soldiers and secret agents using a simple fitness app
https://ift.tt/2m5jWmp
Submitted July 09, 2018 at 02:31AM by alexanderpas
via reddit https://ift.tt/2KSUb73
https://ift.tt/2m5jWmp
Submitted July 09, 2018 at 02:31AM by alexanderpas
via reddit https://ift.tt/2KSUb73
De Correspondent
Here’s how we found the names and addresses of soldiers and secret agents using a simple fitness app
How can a simple running app let you identify military personnel, intelligence operatives, and other users – and even pinpoint their home address? In this piece, we explain step by step how we were able to do it.
Timehop Security Incident
https://ift.tt/2uiJOyY
Submitted July 09, 2018 at 01:08PM by ShermheadRyder
via reddit https://ift.tt/2KWUNoZ
https://ift.tt/2uiJOyY
Submitted July 09, 2018 at 01:08PM by ShermheadRyder
via reddit https://ift.tt/2KWUNoZ
Timehop
Security - Technical
Timehop helps you celebrate the best moments of the past with your friends.
It's like #tbt every day! Download for free today for iOS and Android.
It's like #tbt every day! Download for free today for iOS and Android.
CVE-2017-10271: Oracle WebLogic Server RCE – Sleep detection payload
https://ift.tt/2m3DIyM
Submitted July 09, 2018 at 07:46PM by 0xdea
via reddit https://ift.tt/2KYypvo
https://ift.tt/2m3DIyM
Submitted July 09, 2018 at 07:46PM by 0xdea
via reddit https://ift.tt/2KYypvo
Timehop disclosure of security incident
https://ift.tt/2NzHmNq
Submitted July 09, 2018 at 09:17PM by Natanael_L
via reddit https://ift.tt/2udIMUQ
https://ift.tt/2NzHmNq
Submitted July 09, 2018 at 09:17PM by Natanael_L
via reddit https://ift.tt/2udIMUQ
Timehop
Security
Timehop helps you celebrate the best moments of the past with your friends.
It's like #tbt every day! Download for free today for iOS and Android.
It's like #tbt every day! Download for free today for iOS and Android.
Improving the Tastic Thief Long-Range RFID Reader
https://ift.tt/2J4HqRX
Submitted July 09, 2018 at 11:07PM by TastyHoneyBadger
via reddit https://ift.tt/2KVxLCi
https://ift.tt/2J4HqRX
Submitted July 09, 2018 at 11:07PM by TastyHoneyBadger
via reddit https://ift.tt/2KVxLCi
Silent Break Security
ESPKey + Long Range RFID Reader = A New Tastic Thief | Silent Break Security
There have been plenty of blog posts, and security conference talks about building long-range RFID badge readers. Bishop Fox (RFID Hacking Tools) and Inguardians (Make your tastic fun tastic) both...
Security Firm Sued for Failing to Detect Malware That Caused a 2009 Breach
https://ift.tt/2u7blEc
Submitted July 10, 2018 at 02:15AM by MisterCBax
via reddit https://ift.tt/2L00t4P
https://ift.tt/2u7blEc
Submitted July 10, 2018 at 02:15AM by MisterCBax
via reddit https://ift.tt/2L00t4P
BleepingComputer
Security Firm Sued for Failing to Detect Malware That Caused a 2009 Breach
Two insurance companies are suing a cyber-security firm to recover insurance fees paid to a customer after the security firm failed to detect malware on the client's network for months, an issue that led to one of the biggest security breaches of the 2000s.…
Finding Phishing: Tools and Techniques
https://ift.tt/2zqHWKy
Submitted July 10, 2018 at 02:32AM by patrikhudak
via reddit https://ift.tt/2J77HPF
https://ift.tt/2zqHWKy
Submitted July 10, 2018 at 02:32AM by patrikhudak
via reddit https://ift.tt/2J77HPF
reddit
r/netsec - Finding Phishing: Tools and Techniques
5 votes and 0 so far on reddit
Microsoft has finally provided a service that mitigates the single most critical password-related security risk in the enterprise today: common passwords. You should kick the tires on this new Active Directory capability today, so you can deploy it as soon as it reaches general availability.
https://ift.tt/2L40cuk
Submitted July 10, 2018 at 05:24AM by longevitytech
via reddit https://ift.tt/2m4AxqE
https://ift.tt/2L40cuk
Submitted July 10, 2018 at 05:24AM by longevitytech
via reddit https://ift.tt/2m4AxqE
Longevity Technology
Azure AD Password Protection: The Cloud Security Service your Active Directory Needs Now | Longevity Technology
Microsoft has finally provided a service that mitigates the single most critical password-related security risk in the enterprise today: common passwords. You should kick the tires on this new Active Directory capability today, so you can deploy it as soon…
/r/netsec's Q3 2018 Information Security Hiring Thread
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 10, 2018 at 05:09AM by ranok
via reddit https://ift.tt/2ui9qMp
OverviewIf you have open positions at your company for information security professionals and would like to hire from the /r/netsec user base, please leave a comment detailing any open job listings at your company.We would also like to encourage you to post internship positions as well. Many of our readers are currently in school or are just finishing their education.Please reserve top level comments for those posting open positions.Rules & GuidelinesInclude the company name in the post. If you want to be topsykret, go recruit elsewhere.Include the geographic location of the position along with the availability of relocation assistance.If you are a third party recruiter, you must disclose this in your posting.Please be thorough and upfront with the position details.Use of non-hr'd (realistic) requirements is encouraged.While it's fine to link to the position on your companies website, provide the important details in the comment.Mention if applicants should apply officially through HR, or directly through you.Please clearly list citizenship, visa, and security clearance requirements.You can see an example of acceptable posts by perusing past hiring threads.FeedbackFeedback and suggestions are welcome, but please don't hijack this thread (use moderator mail instead.)
Submitted July 10, 2018 at 05:09AM by ranok
via reddit https://ift.tt/2ui9qMp
Troy Hunt: The 111 Million Record Pemiblanc Credential Stuffing List
https://ift.tt/2u7iLYk
Submitted July 10, 2018 at 10:41AM by Royal_SeaLion
via reddit https://ift.tt/2m4jHIl
https://ift.tt/2u7iLYk
Submitted July 10, 2018 at 10:41AM by Royal_SeaLion
via reddit https://ift.tt/2m4jHIl
Troy Hunt
The 111 Million Record Pemiblanc Credential Stuffing List
One of the most alarming trends I've seen in the world of data breaches since starting Have I Been Pwned (HIBP) back in 2013 is the rapid rise of credential stuffing attacks. Per the definition in that link, it simply means this: Credential stuffing is the…
This $39 Device Can Defeat iOS USB Restricted Mode
https://ift.tt/2Jaf5cP
Submitted July 10, 2018 at 10:28AM by numberbuzy
via reddit https://ift.tt/2zs2iD6
https://ift.tt/2Jaf5cP
Submitted July 10, 2018 at 10:28AM by numberbuzy
via reddit https://ift.tt/2zs2iD6
Patching & Unsupported Software Websites by Vendor
https://ift.tt/2J8OcGr
Submitted July 10, 2018 at 04:20PM by bonniek4t
via reddit https://ift.tt/2JeuOaO
https://ift.tt/2J8OcGr
Submitted July 10, 2018 at 04:20PM by bonniek4t
via reddit https://ift.tt/2JeuOaO
Security Exploits & News
Patching & Unsupported Software - Security Exploits & News
Looking to keep your systems up-to-date by patching and replacing unsupported software? Use this list of master links to multiple vendor sites as a guide.
Synner—A TCP SYN Client written in Rust
https://ift.tt/2ukYU7g
Submitted July 10, 2018 at 05:59PM by JDBHub
via reddit https://ift.tt/2usDMfx
https://ift.tt/2ukYU7g
Submitted July 10, 2018 at 05:59PM by JDBHub
via reddit https://ift.tt/2usDMfx
Digital Horror
Synner—A TCP SYN Client written in Rust
Synner—a TCP SYN client written in Rust.
AT&T acquires threat intelligence company AlienVault
https://ift.tt/2ugo1b6
Submitted July 10, 2018 at 07:24PM by rickyboone
via reddit https://ift.tt/2m5lD3p
https://ift.tt/2ugo1b6
Submitted July 10, 2018 at 07:24PM by rickyboone
via reddit https://ift.tt/2m5lD3p
VentureBeat
AT&T acquires threat intelligence company AlienVault
AT&T has announced plans to acquire cybersecurity company AlienVault. Terms of the deal were not disclosed. Founded in 2007, AlienVault offers a number of tools for detecting and responding to …
Beyond LLMNR/NBNS Spoofing
https://ift.tt/2J9wq5V
Submitted July 10, 2018 at 08:51PM by _pdp_
via reddit https://ift.tt/2L4itLg
https://ift.tt/2J9wq5V
Submitted July 10, 2018 at 08:51PM by _pdp_
via reddit https://ift.tt/2L4itLg
NetSPI Blog
Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS
Exploiting weaknesses in name resolution protocols is a common technique for performing man-in-the-middle (MITM) attacks. Two particularly vulnerable name resolution protocols are Link-Local Multicast Name Resolution (LLMNR) and NetBIOS Name Service (NBNS).…