Frida 12.1 is out with a brand new Chrome Inspector-compatible debugger integration for V8-powered noscripts
https://ift.tt/2BMg6JB
Submitted August 26, 2018 at 03:10AM by oleavr
via reddit https://ift.tt/2o9KPqr
https://ift.tt/2BMg6JB
Submitted August 26, 2018 at 03:10AM by oleavr
via reddit https://ift.tt/2o9KPqr
Frida • A world-class dynamic instrumentation framework
Frida 12.1 Released
Inject JavaScript to explore native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX
A reliable exploit for CVE-2018-11776 (Struts st2-057) is released
https://ift.tt/2BNtspc
Submitted August 26, 2018 at 08:15AM by mazen160
via reddit https://ift.tt/2o7ChAi
https://ift.tt/2BNtspc
Submitted August 26, 2018 at 08:15AM by mazen160
via reddit https://ift.tt/2o7ChAi
GitHub
mazen160/struts-pwn_CVE-2018-11776
struts-pwn_CVE-2018-11776 - An exploit for Apache Struts CVE-2018-11776
Why and How Use a Password Manager
https://ift.tt/2wpafEh
Submitted August 26, 2018 at 06:05PM by Icognito289
via reddit https://ift.tt/2P6jSPM
https://ift.tt/2wpafEh
Submitted August 26, 2018 at 06:05PM by Icognito289
via reddit https://ift.tt/2P6jSPM
Minute Cyber
Why and How Use a Password Manager
Even though nothing is foolproof, password managers are still by far the most reliable method of safe keeping your passwords but, that is only when you use them properly. We are going to tell you w…
CVE-2018-11776 Exploit and explanation
https://ift.tt/2BNtspc
Submitted August 26, 2018 at 10:14PM by digicat
via reddit https://ift.tt/2PFV0PY
https://ift.tt/2BNtspc
Submitted August 26, 2018 at 10:14PM by digicat
via reddit https://ift.tt/2PFV0PY
GitHub
mazen160/struts-pwn_CVE-2018-11776
struts-pwn_CVE-2018-11776 - An exploit for Apache Struts CVE-2018-11776
A Universal Windows Bootkit
https://ift.tt/1YHhMVx
Submitted August 27, 2018 at 02:11AM by PeterG45
via reddit https://ift.tt/2odD5E0
https://ift.tt/1YHhMVx
Submitted August 27, 2018 at 02:11AM by PeterG45
via reddit https://ift.tt/2odD5E0
William Showalter
A Universal Windows Bootkit
An analysis of the MBR bootkit referred to as “HDRoot”
CVE-2018-0953: A particularly elegant type confusion bug in Microsoft Chakra.
https://ift.tt/2MLwiz2
Submitted August 27, 2018 at 02:10AM by PeterG45
via reddit https://ift.tt/2PFwY80
https://ift.tt/2MLwiz2
Submitted August 27, 2018 at 02:10AM by PeterG45
via reddit https://ift.tt/2PFwY80
Zero Day Initiative
Floating-Poison Math in Chakra
This post is an installment in my series of posts on security in Chakra, Microsoft’s JavaScript engine. In this installment, I present a particularly elegant type confusion bug in Chakra. This vulnerability was discovered by multiple researchers, including…
Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware
https://ift.tt/2w6u2Ju
Submitted August 27, 2018 at 02:07AM by PeterG45
via reddit https://ift.tt/2PFwZsA
https://ift.tt/2w6u2Ju
Submitted August 27, 2018 at 02:07AM by PeterG45
via reddit https://ift.tt/2PFwZsA
Check Point Research
Labeless Part 3: How to Dump and Auto-Resolve WinAPI Calls in LockPos Point-of-Sale Malware - Check Point Research
In this part we show how to automatically resolve all WinAPI calls in malicious code dump of LockPoS Point-of-Sale malware. Instead of manually reconstructing a corrupted Import Address Table we simply extract a target portion of code in the research database…
ATT&CK-Tools - Utilities for MITRE ATT&CK (Updated 25 Aug)
https://ift.tt/2MAqSrC
Submitted August 27, 2018 at 02:05AM by PeterG45
via reddit https://ift.tt/2oj8EMR
https://ift.tt/2MAqSrC
Submitted August 27, 2018 at 02:05AM by PeterG45
via reddit https://ift.tt/2oj8EMR
GitHub
nshalabi/ATTACK-Tools
Utilities for MITRE™ ATT&CK. Contribute to nshalabi/ATTACK-Tools development by creating an account on GitHub.
Crack authKey from SNMPv3 packet
https://ift.tt/2obC5jB
Submitted August 27, 2018 at 02:02AM by Ch3mFl0
via reddit https://ift.tt/2BQ8FS1
https://ift.tt/2obC5jB
Submitted August 27, 2018 at 02:02AM by Ch3mFl0
via reddit https://ift.tt/2BQ8FS1
nmap-parse-output: A tool for analyzing Nmap scans
https://ift.tt/2BLrkOH
Submitted August 27, 2018 at 02:26AM by RuckelBob
via reddit https://ift.tt/2wfC2Yr
https://ift.tt/2BLrkOH
Submitted August 27, 2018 at 02:26AM by RuckelBob
via reddit https://ift.tt/2wfC2Yr
Insinuator.net
nmap-parse-output: A tool for analyzing Nmap scans
tl;dr: With the tool nmap-parse-output you can convert, manipulate or extract data from a Nmap/masscan scan output. This allows you to get the information you're looking for by just entering a straightforward command.
Preamble
A while ago, we had to scan…
Preamble
A while ago, we had to scan…
CVE-2018-11776 (Struts) Exploit with Detailed Explanation
https://ift.tt/2Mq9WUu
Submitted August 27, 2018 at 02:51AM by Prav123
via reddit https://ift.tt/2Nj5ByQ
https://ift.tt/2Mq9WUu
Submitted August 27, 2018 at 02:51AM by Prav123
via reddit https://ift.tt/2Nj5ByQ
GitHub
jas502n/St2-057
St2-057 Poc Example. Contribute to jas502n/St2-057 development by creating an account on GitHub.
I created a youtube video stream (with chat) for users of r/netsec.
https://ift.tt/2MUEhKk
Submitted August 27, 2018 at 05:04PM by ivonodi
via reddit https://ift.tt/2LtWCJF
https://ift.tt/2MUEhKk
Submitted August 27, 2018 at 05:04PM by ivonodi
via reddit https://ift.tt/2LtWCJF
vidstreams.tv
netsec
Currently playing: NetSec I - 04. WiFi basics and security
Reverse Engineering iOS Apps - iOS 11 Edition (Part 2)
https://ift.tt/2Lt6brW
Submitted August 27, 2018 at 03:17PM by Prav123
via reddit https://ift.tt/2NmVw3Z
https://ift.tt/2Lt6brW
Submitted August 27, 2018 at 03:17PM by Prav123
via reddit https://ift.tt/2NmVw3Z
Ivan R Blog
Reverse Engineering iOS Apps - iOS 11 Edition (Part 2)
This is the second part of the "Reverse Engineering iOS Apps - iOS 11 Edition" series. In the first part of the series we learned how to setup your phone on iOS 11 and how to decrypt an iOS app. In this second and final part we'll learn how to:
Apache Struts2 CVE-2018-11776 POC
https://ift.tt/2BK09DL
Submitted August 27, 2018 at 08:23PM by theMiddleBlue
via reddit https://ift.tt/2BS2Y5O
https://ift.tt/2BK09DL
Submitted August 27, 2018 at 08:23PM by theMiddleBlue
via reddit https://ift.tt/2BS2Y5O
Secjuice.com
Apache Struts2 CVE-2018-11776
Learn about the Struts2 Remote Code Execution vulnerability CVE-2018-11776, how to exploit and how to create a Proof of Concept (POC) with docker.
Helping Nonprofits and Other Growing Businesses Understand Security Risks - Security Exploits & News
https://ift.tt/2LwTn3Q
Submitted August 27, 2018 at 08:36PM by bonniek4t
via reddit https://ift.tt/2PJkMmP
https://ift.tt/2LwTn3Q
Submitted August 27, 2018 at 08:36PM by bonniek4t
via reddit https://ift.tt/2PJkMmP
Security Exploits & News
Helping Nonprofits and Other Growing Businesses Understand Security Risks - Security Exploits & News
Raxis COO, Bonnie Smyre, wrote a guest blog post on "What Nonprofits Need to Know about Assessing Security Risk" for the NTEN Nonprofit Technology Network.
threatfeeds.io - free and open-source threat intelligence feeds and sources
https://threatfeeds.io
Submitted August 27, 2018 at 10:31PM by netbroom
via reddit https://ift.tt/2PaMwj4
https://threatfeeds.io
Submitted August 27, 2018 at 10:31PM by netbroom
via reddit https://ift.tt/2PaMwj4
threatfeeds.io
Free threat intelligence feeds - threatfeeds.io
Search and download free and open-source threat intelligence feeds with threatfeeds.io.
API interface for kali tools
https://ift.tt/2PCka22
Submitted August 28, 2018 at 01:35AM by knsankar
via reddit https://ift.tt/2LATdsA
https://ift.tt/2PCka22
Submitted August 28, 2018 at 01:35AM by knsankar
via reddit https://ift.tt/2LATdsA
reddit
r/Information_Security - API interface for kali tools
0 votes and 0 comments so far on Reddit
Microsoft.Workflow.Compiler.exe, Veil, and Cobalt Strike
https://ift.tt/2wn2s9S
Submitted August 28, 2018 at 01:25AM by SonOfFlynnn
via reddit https://ift.tt/2MZUcaw
https://ift.tt/2wn2s9S
Submitted August 28, 2018 at 01:25AM by SonOfFlynnn
via reddit https://ift.tt/2MZUcaw
FortyNorth Security
Microsoft.Workflow.Compiler.exe, Veil, and Cobalt Strike - FortyNorth Security
This blog post documents how to use Microsoft.Workflow.Compiler.exe and the Veil Framework's output to receive a Cobalt Strike beacon.
I made a push notification feed (desktop/mobile) for posts of r/netsec that have a minimum of 200 Karma.
https://ift.tt/2ofGv96
Submitted August 28, 2018 at 06:36AM by soeindohuwabohu
via reddit https://ift.tt/2BTzEvU
https://ift.tt/2ofGv96
Submitted August 28, 2018 at 06:36AM by soeindohuwabohu
via reddit https://ift.tt/2BTzEvU
Traversing the Path to RCE (Bug Bounty)
https://ift.tt/2wnfzYE
Submitted August 28, 2018 at 04:38AM by chocoluvin
via reddit https://ift.tt/2MAbU4P
https://ift.tt/2wnfzYE
Submitted August 28, 2018 at 04:38AM by chocoluvin
via reddit https://ift.tt/2MAbU4P
∞ Growing Web Security Blog
Traversing the Path to RCE
This post will detail the steps I took to find a path traversal vulnerability, and how I paired the vulnerability with the logic of the application to achieve Remote Code Execution through a shell …
Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC interface
https://ift.tt/2PJxVvN
Submitted August 28, 2018 at 11:38AM by 0xdea
via reddit https://ift.tt/2BOFqil
https://ift.tt/2PJxVvN
Submitted August 28, 2018 at 11:38AM by 0xdea
via reddit https://ift.tt/2BOFqil
www.kb.cert.org
Vulnerability Note VU#906424 - Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the ALPC…
Microsoft Windows task scheduler contains a local privilege escalation vulnerability in the Advanced Local Procedure Call (ALPC) interface, which can allow a local user to obtain SYSTEM privileges.