CERT Keyfinder: A tool for analyzing private (and public) key files, including support for Android APK files.
https://ift.tt/2mkFQlT
Submitted July 16, 2018 at 11:49PM by certcc
via reddit https://ift.tt/2NWlGuX
https://ift.tt/2mkFQlT
Submitted July 16, 2018 at 11:49PM by certcc
via reddit https://ift.tt/2NWlGuX
GitHub
CERTCC/keyfinder
keyfinder - Tool for analyzing private (and public) key files, including support for Android APK files.
PrestaShop 1.6 Privilege Escalation (CVE-2018-13784)
https://ift.tt/2LibNJy
Submitted July 17, 2018 at 03:27PM by cfambionics
via reddit https://ift.tt/2LfWbWZ
https://ift.tt/2LibNJy
Submitted July 17, 2018 at 03:27PM by cfambionics
via reddit https://ift.tt/2LfWbWZ
Ambionics
PrestaShop 1.6 Privilege Escalation
Prestashop 1.6.1.19 sessions can be read and written by an attacker, resulting in a range of vulnerabilities including privilege escalation and remote code execution.
Modelling APT32 in CALDERA
https://ift.tt/2zW3HSP
Submitted July 17, 2018 at 09:17PM by Wietze-
via reddit https://ift.tt/2uDp7y0
https://ift.tt/2zW3HSP
Submitted July 17, 2018 at 09:17PM by Wietze-
via reddit https://ift.tt/2uDp7y0
PwC
Signal the ATT&CK: Part 1
In the first of a two part series, Paul Bottomley and Wietze Beukema explore our Tanium Signal development and testing, using one particular threat group, APT32 (also known as Ocean Lotus).
(Not OP) I built a screenshot API and some guy was mining cryptocurrencies with it.
https://ift.tt/2r3yC7T
Submitted July 17, 2018 at 09:06PM by OogieFrenchieBoogie
via reddit https://ift.tt/2mozzpd
https://ift.tt/2r3yC7T
Submitted July 17, 2018 at 09:06PM by OogieFrenchieBoogie
via reddit https://ift.tt/2mozzpd
Medium
I built a screenshot API and some guy was mining cryptocurrencies with it.
Hey folks, just wanted to share this story. Yes, I could have been better prepared for what happend, I know. :)
Introduction to IDAPython for Vulnerability Hunting
https://ift.tt/2NqyYPB
Submitted July 17, 2018 at 11:20PM by KonpyutaNinjutsu
via reddit https://ift.tt/2L2WZiH
https://ift.tt/2NqyYPB
Submitted July 17, 2018 at 11:20PM by KonpyutaNinjutsu
via reddit https://ift.tt/2L2WZiH
Somerset Recon
Introduction to IDAPython for Vulnerability Hunting
Overview IDAPython is a powerful tool that can be used to automate tedious or complicated reverse engineering tasks. While much has been written about using IDAPython to simplify basic reversing tasks, little has been written about using IDAPython to assist…
Medical laboratory testing firm LabCorp. is investigating a weekend cyberattack on its IT network, which was resulted in the company taking certain of its systems offline, temporarily impacting its test processing and client access to lab results.
https://ift.tt/2uHjf6Q
Submitted July 18, 2018 at 05:25AM by longevitytech
via reddit https://ift.tt/2NrpPX1
https://ift.tt/2uHjf6Q
Submitted July 18, 2018 at 05:25AM by longevitytech
via reddit https://ift.tt/2NrpPX1
Longevity Technology
LabCorp. Cyberattack Impacts Testing Processes
Medical laboratory testing firm LabCorp. is investigating a weekend cyberattack on its IT network, which was resulted in the company taking certain of its syste
Updates to Windows Command Line on the Way
https://ift.tt/2I8DAqk
Submitted July 18, 2018 at 11:20AM by mexiblues
via reddit https://ift.tt/2LsmPsA
https://ift.tt/2I8DAqk
Submitted July 18, 2018 at 11:20AM by mexiblues
via reddit https://ift.tt/2LsmPsA
reddit
r/netsec - Updates to Windows Command Line on the Way
0 votes and 3 comments so far on Reddit
Second Order SQL Injection Explained with Example
https://ift.tt/2O0A5Gv
Submitted July 18, 2018 at 03:08PM by InformationSecurity
via reddit https://ift.tt/2NqsfVF
https://ift.tt/2O0A5Gv
Submitted July 18, 2018 at 03:08PM by InformationSecurity
via reddit https://ift.tt/2NqsfVF
Haider Mahmood Infosec Blog
Second Order SQL Injection Explained with Example
Second order SQL Injection Explained with Example, 2nd order SQL injection example, 2nd order injection web application, webapp second order sql injection
BSidesLisbon 2018 - Call For Presentations and Workshops open until 31/Aug
https://ift.tt/2LMlkGm
Submitted July 18, 2018 at 04:38PM by m0risson
via reddit https://ift.tt/2NpTQX7
https://ift.tt/2LMlkGm
Submitted July 18, 2018 at 04:38PM by m0risson
via reddit https://ift.tt/2NpTQX7
cfp.bsideslisbon.org
BSidesLisbon2018
Schedule, talks and talk submissions for BSidesLisbon2018
Mind the hackers: Tips to maximise the security of your user data.
https://ift.tt/2Nnid7H
Submitted July 18, 2018 at 04:25PM by iHatePasswordz
via reddit https://ift.tt/2O0ZMqz
https://ift.tt/2Nnid7H
Submitted July 18, 2018 at 04:25PM by iHatePasswordz
via reddit https://ift.tt/2O0ZMqz
Medium
Mind the hackers: Tips to maximise the security of your user data.
By Angelina Liparteliani, Marketing Assistant for PixelPin Ltd
The SIM Hijackers
https://ift.tt/2uEqc8D
Submitted July 18, 2018 at 06:38PM by username3
via reddit https://ift.tt/2L3KC6j
https://ift.tt/2uEqc8D
Submitted July 18, 2018 at 06:38PM by username3
via reddit https://ift.tt/2L3KC6j
Motherboard
The SIM Hijackers
Meet the hackers who flip seized Instagram handles and cryptocurrency in a shady, buzzing underground market for stolen accounts and usernames. Their victims' weakness? Phone numbers.
Evading CSP with DOM-based dangling markup
https://ift.tt/2ux6gWe
Submitted July 18, 2018 at 07:43PM by albinowax
via reddit https://ift.tt/2zPo6Zl
https://ift.tt/2ux6gWe
Submitted July 18, 2018 at 07:43PM by albinowax
via reddit https://ift.tt/2zPo6Zl
Web Security Blog | PortSwigger
Evading CSP with DOM-based dangling markup
Dangling markup is a technique to steal the contents of the page without noscript by using resources such as images to send the data to a remote location that an attacker controls. It is useful when ref
Noise protocol matrix
https://ift.tt/2LtxpQ8
Submitted July 19, 2018 at 05:25AM by disclosure5
via reddit https://ift.tt/2LqZ7gt
https://ift.tt/2LtxpQ8
Submitted July 19, 2018 at 05:25AM by disclosure5
via reddit https://ift.tt/2LqZ7gt
reddit
r/netsec - Noise protocol matrix
2 votes and 0 comments so far on Reddit
Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) [xpost /r/WindowsSecurity]
https://ift.tt/2Ns4VXw
Submitted July 19, 2018 at 07:13AM by m8urn
via reddit https://ift.tt/2LuDpbw
https://ift.tt/2Ns4VXw
Submitted July 19, 2018 at 07:13AM by m8urn
via reddit https://ift.tt/2LuDpbw
j00ru//vx tech blog
Exploiting a Windows 10 PagedPool off-by-one overflow (WCTF 2018) | j00ru//vx tech blog
During the weekend of 6-8th of July, our CTF team – Dragon Sector – played in an invite-only competition called WCTF, held in Beijing. The other participants were top-tier groups from around the world (e.g. Shellphish, ESPR, LC↯BC or Tokyo Westerns), and…
IBM reports 424% increase in breaches related to security misconfiguration in 2017. Here is the solution how to treat it.
https://ift.tt/2Nvck8P
Submitted July 19, 2018 at 05:50PM by hightechbridge
via reddit https://ift.tt/2LyV6GH
https://ift.tt/2Nvck8P
Submitted July 19, 2018 at 05:50PM by hightechbridge
via reddit https://ift.tt/2LyV6GH
Htbridge
Security Misconfiguration, a conscious element of OWASP Top 10, the risks and solutions
Security Misconfiguration is #6 in the current OWASP Top Ten Most Critical Web Application Security Risks. Misconfiguration can include both errors in the installation of security, and the complete failure to install available security controls.
How I was able to delete 13k+ Microsoft Translator Projects
https://ift.tt/2L97hhp
Submitted July 19, 2018 at 06:40PM by InformationSecurity
via reddit https://ift.tt/2O3hzgL
https://ift.tt/2L97hhp
Submitted July 19, 2018 at 06:40PM by InformationSecurity
via reddit https://ift.tt/2O3hzgL
Haider Mahmood Infosec Blog
How I was able to delete 13k+ Microsoft Translator Projects
Critical vulnerability found in Microsoft Translator Hub where all of its 13000 projects could be deleted using indirect object reference vulnerability
Many infosec professionals reuse passwords across multiple accounts - Help Net Security
https://ift.tt/2L1oY2d
Submitted July 19, 2018 at 06:33PM by iHatePasswordz
via reddit https://ift.tt/2Npt80L
https://ift.tt/2L1oY2d
Submitted July 19, 2018 at 06:33PM by iHatePasswordz
via reddit https://ift.tt/2Npt80L
Help Net Security
Many infosec professionals reuse passwords across multiple accounts - Help Net Security
A Lastline survey from June 2018 revealed that 45 percent of infosec professionals reuse passwords across multiple accounts.
Mind the hackers: – PixelPin – Medium
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
Medium
Mind the hackers:
Financial losses are reaching billions of dollars, and about 30-40% of attacks are conducted by schoolkids of 14–16 years.
Reverse engineering some Javanoscript malware
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
blog.jse.li
Reversing JS Malware From marveloptics.com | Jesse Li
The injected noscript steals checkout form data and sends it to a Chinese-owned domain. But the attackers are really bad at programming.
Rule Splitting in Hashtopolis to allow better distribution on Clusters (using Hashcat)
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
Wordpress
Rule Splitting in Hashtopolis
When dealing with tasks that have rules and wordlists, Hashcat internally distributes the wordlist to the shaders on the GPUs but, gives all the rules to each shader. This means every shader has a …
How to instrument Electron-based applications for in-depth security testing
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
reddit
r/netsec - How to instrument Electron-based applications for in-depth security testing
2 votes and 0 comments so far on Reddit