Mind the hackers: – PixelPin – Medium
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
https://ift.tt/2L11cCR
Submitted July 19, 2018 at 09:17PM by pixelpin
via reddit https://ift.tt/2LmuLiy
Medium
Mind the hackers:
Financial losses are reaching billions of dollars, and about 30-40% of attacks are conducted by schoolkids of 14–16 years.
Reverse engineering some Javanoscript malware
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
https://ift.tt/2LuWrOJ
Submitted July 20, 2018 at 02:47AM by veggiedefender
via reddit https://ift.tt/2msNpab
blog.jse.li
Reversing JS Malware From marveloptics.com | Jesse Li
The injected noscript steals checkout form data and sends it to a Chinese-owned domain. But the attackers are really bad at programming.
Rule Splitting in Hashtopolis to allow better distribution on Clusters (using Hashcat)
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
https://ift.tt/2uBbDU9
Submitted July 20, 2018 at 02:35AM by s3inlc
via reddit https://ift.tt/2Nrp4xa
Wordpress
Rule Splitting in Hashtopolis
When dealing with tasks that have rules and wordlists, Hashcat internally distributes the wordlist to the shaders on the GPUs but, gives all the rules to each shader. This means every shader has a …
How to instrument Electron-based applications for in-depth security testing
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
Basic intro on how to instrument Electron https://electronjs.org/ apps
Submitted July 20, 2018 at 02:18AM by nibblesec
via reddit https://ift.tt/2O4lQRp
reddit
r/netsec - How to instrument Electron-based applications for in-depth security testing
2 votes and 0 comments so far on Reddit
Bypassing Memory Scanners with Cobalt Strike and Gargoyle
https://ift.tt/2O22xYD
Submitted July 20, 2018 at 01:50AM by jalospinoso
via reddit https://ift.tt/2uMpxSU
https://ift.tt/2O22xYD
Submitted July 20, 2018 at 01:50AM by jalospinoso
via reddit https://ift.tt/2uMpxSU
How to instrument Electron-based applications for in-depth security testing.
https://ift.tt/2LbFoVO
Submitted July 20, 2018 at 01:27PM by nibblesec
via reddit https://ift.tt/2NuqB5m
https://ift.tt/2LbFoVO
Submitted July 20, 2018 at 01:27PM by nibblesec
via reddit https://ift.tt/2NuqB5m
Doyensec
Instrumenting Electron Apps for Security Testing · Doyensec's Blog
Doyensec's Blog :: Doyensec is an independent security research and development company focused on vulnerability discovery and remediation.
Top 10 Web Hacking Techniques of 2017 - Nominations Open
https://ift.tt/2Lqd9yU
Submitted July 20, 2018 at 02:28PM by 0xdea
via reddit https://ift.tt/2L6FjTo
https://ift.tt/2Lqd9yU
Submitted July 20, 2018 at 02:28PM by 0xdea
via reddit https://ift.tt/2L6FjTo
Web Security Blog | PortSwigger
Top 10 Web Hacking Techniques of 2017 - Nominations Open
Nominations are now open for the Top 10 Web Hacking Techniques of 2017. Every year, numerous security researchers choose to share their findings with the community through conference presentations, bl
Unbound DNS Server Tutorial @ Calomel.org
https://ift.tt/1wWoivv
Submitted July 20, 2018 at 03:09PM by unquietwiki
via reddit https://ift.tt/2Nsva02
https://ift.tt/1wWoivv
Submitted July 20, 2018 at 03:09PM by unquietwiki
via reddit https://ift.tt/2Nsva02
SSL/TLS for dummies part 4 - Understanding the TLS Handshake Protocol | First second of HTTPS
https://ift.tt/2LpecT6
Submitted July 20, 2018 at 05:38PM by silentsniffer
via reddit https://ift.tt/2zRD4hH
https://ift.tt/2LpecT6
Submitted July 20, 2018 at 05:38PM by silentsniffer
via reddit https://ift.tt/2zRD4hH
WST
SSL/TLS for dummies part 4 - Understanding the TLS Handshake Protocol | WST
First few milliseconds of ssl tls connection.TLS handshake protocol explained in depth with wireshark. RSA,Diffie Hellman.TLS records.CA cert
Into the Borg - SSRF inside Google production network
https://ift.tt/2uN8DU5
Submitted July 20, 2018 at 09:25PM by geekadi
via reddit https://ift.tt/2JF4c2U
https://ift.tt/2uN8DU5
Submitted July 20, 2018 at 09:25PM by geekadi
via reddit https://ift.tt/2JF4c2U
OpnSec
Into the Borg – SSRF inside Google production network | OpnSec
Intro - Testing Google Sites and Google Caja In March 2018, I reported an XSS in Google Caja, a tool to securely embed arbitrary html/javanoscript in a webpage. In May 2018, after the XSS was fixed, I realised that Google Sites was using an unpatched version…
Backdoors Keep Appearing In Cisco's Routers
https://ift.tt/2LcMFES
Submitted July 20, 2018 at 09:09PM by GoHomeGrandmaUrHigh
via reddit https://ift.tt/2zW7S0z
https://ift.tt/2LcMFES
Submitted July 20, 2018 at 09:09PM by GoHomeGrandmaUrHigh
via reddit https://ift.tt/2zW7S0z
Tom's Hardware
Backdoors Keep Appearing In Cisco's Routers
Five different backdoors were found in Cisco's software this year, and Cisco's history with backdoors goes back many years.
New Mirai and Gafgyt IoT/Linux Botnet Campaigns - Palo Alto Networks Blog
https://ift.tt/2uBjkdf
Submitted July 20, 2018 at 09:03PM by todhsals
via reddit https://ift.tt/2uCsw0U
https://ift.tt/2uBjkdf
Submitted July 20, 2018 at 09:03PM by todhsals
via reddit https://ift.tt/2uCsw0U
Palo Alto Networks Blog
Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns - Palo Alto Networks Blog
Unit 42 documents the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt malware families that incorporate multiple known exploits affecting Internet of Things (IoT) device.
Into the Borg – SSRF inside Google production network
https://ift.tt/2uN8DU5
Submitted July 21, 2018 at 01:46AM by PrimeMover17
via reddit https://ift.tt/2LwyZAL
https://ift.tt/2uN8DU5
Submitted July 21, 2018 at 01:46AM by PrimeMover17
via reddit https://ift.tt/2LwyZAL
OpnSec
Into the Borg – SSRF inside Google production network | OpnSec
Intro - Testing Google Sites and Google Caja In March 2018, I reported an XSS in Google Caja, a tool to securely embed arbitrary html/javanoscript in a webpage. In May 2018, after the XSS was fixed, I realised that Google Sites was using an unpatched version…
New Multi-Exploit Mirai and Gafgyt Campaigns
https://ift.tt/2uBjkdf
Submitted July 21, 2018 at 04:28AM by todhsals
via reddit https://ift.tt/2LnIZQ2
https://ift.tt/2uBjkdf
Submitted July 21, 2018 at 04:28AM by todhsals
via reddit https://ift.tt/2LnIZQ2
Palo Alto Networks Blog
Unit 42 Finds New Mirai and Gafgyt IoT/Linux Botnet Campaigns - Palo Alto Networks Blog
Unit 42 documents the emergence of three malware campaigns built on publicly available source code for the Mirai and Gafgyt malware families that incorporate multiple known exploits affecting Internet of Things (IoT) device.
XSS protection disappears from Microsoft Edge
https://ift.tt/2JCHAjI
Submitted July 19, 2018 at 08:32PM by albinowax
via reddit https://ift.tt/2uOg1i1
https://ift.tt/2JCHAjI
Submitted July 19, 2018 at 08:32PM by albinowax
via reddit https://ift.tt/2uOg1i1
The Daily Swig | Web security digest
XSS protection disappears from Microsoft Edge
#NoFilter
Gitleaks v1.0.0 -- Audit git repos for secrets. Updated with some performance gains, ui improvements, and new features.
https://ift.tt/2zULZPk
Submitted July 22, 2018 at 12:53AM by pr0tocol_7
via reddit https://ift.tt/2Lrbrk8
https://ift.tt/2zULZPk
Submitted July 22, 2018 at 12:53AM by pr0tocol_7
via reddit https://ift.tt/2Lrbrk8
GitHub
zricethezav/gitleaks
gitleaks - Audit git repos for secrets 🔑
RCE in Intel AMT for all current CPU's
https://ift.tt/2ubDJ8l
Submitted July 22, 2018 at 07:17PM by steak_and_icecream
via reddit https://ift.tt/2LspIwV
https://ift.tt/2ubDJ8l
Submitted July 22, 2018 at 07:17PM by steak_and_icecream
via reddit https://ift.tt/2LspIwV
Intel
Intel | Data Center Solutions, IoT, and PC Innovation
Intel's innovation in cloud computing, data center, Internet of Things, and PC solutions is powering the smart and connected digital world we live in.
"Bank Grade Security" - On Virgin Money and Authentication
https://ift.tt/2NDltw5
Submitted July 23, 2018 at 04:26PM by civicode
via reddit https://ift.tt/2JN57hN
https://ift.tt/2NDltw5
Submitted July 23, 2018 at 04:26PM by civicode
via reddit https://ift.tt/2JN57hN
Icyapril
"Bank Grade Security" - On Virgin Money and Authentication
The phrase “Bank Grade Security” usually provides little comfort for those of us in the information security world, but nevertheless, buzzword-driven markete...
Creating an Emojis PHP WebShell
https://ift.tt/2LvLsYI
Submitted July 23, 2018 at 06:41PM by mazen160
via reddit https://ift.tt/2uXSfQK
https://ift.tt/2LvLsYI
Submitted July 23, 2018 at 06:41PM by mazen160
via reddit https://ift.tt/2uXSfQK
blog.mazinahmed.net
Creating an Emojis PHP WebShell
I recently came across an interesting behaviour on PHP. Apparently, PHP permits the usage of Unicode characters as variable names. There...
Open ADB Ports Being Exploited to Spread Possible Satori Variant in Android Devices
https://ift.tt/2ObE8Af
Submitted July 23, 2018 at 08:33PM by EvanConover
via reddit https://ift.tt/2mFoG2C
https://ift.tt/2ObE8Af
Submitted July 23, 2018 at 08:33PM by EvanConover
via reddit https://ift.tt/2mFoG2C
Trendmicro
Open ADB Ports Being Exploited to Spread Possible Satori Variant in Android Devices - TrendLabs Security Intelligence Blog
Recently, we found a new exploit using port 5555 after detecting two suspicious spikes in activity on July 9-10 and July 15. In this scenario, the activity involves the command line utility called Android Debug Bridge (ADB), a part of the Android SDK that…
Blind XXE via Powerpoint files
https://ift.tt/2mBFF5S
Submitted July 23, 2018 at 08:54PM by albinowax
via reddit https://ift.tt/2NAucz6
https://ift.tt/2mBFF5S
Submitted July 23, 2018 at 08:54PM by albinowax
via reddit https://ift.tt/2NAucz6
HackerOne
Open-Xchange disclosed on HackerOne: Blind XXE via Powerpoint files
## Summary
During the parsing of Powerpoint files it seems that it is possible to include XXE payload which will be executed on the Open-XChange server. I was able to identify which files exist on...
During the parsing of Powerpoint files it seems that it is possible to include XXE payload which will be executed on the Open-XChange server. I was able to identify which files exist on...