Threat intelligence analysis on onion websites
https://ift.tt/2xAdDxE
Submitted September 25, 2018 at 01:26PM by ragupal
via reddit https://ift.tt/2QZekZx
https://ift.tt/2xAdDxE
Submitted September 25, 2018 at 01:26PM by ragupal
via reddit https://ift.tt/2QZekZx
Deep Dot Web
Using keywords and links to perform threat intelligence analysis on onion websites - Deep Dot Web
With rapid advancement of technologies on the dark web, cybercrimes are skyrocketing. Onion websites represent the main source of illegal activities across the dark web. Cyber threat intelligence (CTI) aims at pinpointing onion websites that represent the…
From Kekeo to Rubeus
https://ift.tt/2MZK9hp
Submitted September 25, 2018 at 01:58PM by FireFart
via reddit https://ift.tt/2xBHs0G
https://ift.tt/2MZK9hp
Submitted September 25, 2018 at 01:58PM by FireFart
via reddit https://ift.tt/2xBHs0G
Posts By SpecterOps Team Members
From Kekeo to Rubeus
Kekeo, the other big project from Benjamin Delpy after Mimikatz, is an awesome code base with a set of great features. As Benjamin states, it’s external to the Mimikatz codebase because, “I hate to…
Juicy Potato: new Windows local privilege escalation tool
https://ift.tt/2QX5QC4
Submitted September 25, 2018 at 03:06PM by 0xdea
via reddit https://ift.tt/2xOZcoJ
https://ift.tt/2QX5QC4
Submitted September 25, 2018 at 03:06PM by 0xdea
via reddit https://ift.tt/2xOZcoJ
juicy-potato
Juicy Potato (abusing the golden privileges)
A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts to NT AUTHORITY\SYSTEM.
Deep Analysis of a Driver-Based MITM Malware: iTranslator
https://ift.tt/2Nv0xM0
Submitted September 25, 2018 at 05:34PM by glimpsed
via reddit https://ift.tt/2xBr8x5
https://ift.tt/2Nv0xM0
Submitted September 25, 2018 at 05:34PM by glimpsed
via reddit https://ift.tt/2xBr8x5
Fortinet Blog
Deep Analysis of a Driver-Based MITM Malware: iTranslator
The FortiGuard Labs research team recently captured a malware sample, an EXE file, which was signed by an invalid certificate. Once a victim opens the exe file, it installs two drivers to control t…
New Twist to Doing Cold Boot Attacks
https://ift.tt/2MqBfJJ
Submitted September 25, 2018 at 07:11PM by CyberBullets
via reddit https://ift.tt/2QWf69q
https://ift.tt/2MqBfJJ
Submitted September 25, 2018 at 07:11PM by CyberBullets
via reddit https://ift.tt/2QWf69q
F-Secure Blog
The Chilling Reality of Cold Boot Attacks - F-Secure Blog
What do you do when you finish working with your laptop? Do you turn it off? Put it to sleep? Just close the lid and walk away? Many people might not realize that what they do when leaving their laptop unattended, even a laptop with full disk encryption,…
Disarm a Home Security System (No rolling encryption)
https://ift.tt/2ztCynO
Submitted September 26, 2018 at 09:04AM by nullze
via reddit https://ift.tt/2ONTJWw
https://ift.tt/2ztCynO
Submitted September 26, 2018 at 09:04AM by nullze
via reddit https://ift.tt/2ONTJWw
Authentication bypass vulnerability in Western Digital My Cloud allows escalation to admin privileges
https://ift.tt/2D6qEEh
Submitted September 26, 2018 at 02:40PM by CyberBullets
via reddit https://ift.tt/2QaBrPv
https://ift.tt/2D6qEEh
Submitted September 26, 2018 at 02:40PM by CyberBullets
via reddit https://ift.tt/2QaBrPv
www.securify.nl
Authentication bypass vulnerability in Western Digital My Cloud allows escalation to admin privileges
Securify provides reality checks to lower security risks and build up resilience against threats. Agile Security, Pentesting (scenario-based) and Red Teaming.
Linux kernel universal heap spray userfaultfd+setxattr
https://ift.tt/2IjABNA
Submitted September 26, 2018 at 04:06PM by vnik5287
via reddit https://ift.tt/2DxZ96M
https://ift.tt/2IjABNA
Submitted September 26, 2018 at 04:06PM by vnik5287
via reddit https://ift.tt/2DxZ96M
Cyseclabs
Linux Kernel universal heap spray - Vitaly Nikolenko
Universal Linux kernel heap spray
Effortless security feature detection with Winchecksec
https://ift.tt/2N1BcEh
Submitted September 26, 2018 at 05:48PM by yossarian_flew_away
via reddit https://ift.tt/2xG2jzZ
https://ift.tt/2N1BcEh
Submitted September 26, 2018 at 05:48PM by yossarian_flew_away
via reddit https://ift.tt/2xG2jzZ
Trail of Bits Blog
Effortless security feature detection with Winchecksec
We’re proud to announce the release of Winchecksec, a new open-source tool that detects security features in Windows binaries. Developed to satisfy our analysis and research needs, Wincheckse…
cspparse: A tool to evaluate Content Security Policies.
https://ift.tt/2R1SOTD
Submitted September 26, 2018 at 09:58PM by sxcurity
via reddit https://ift.tt/2IhUvZo
https://ift.tt/2R1SOTD
Submitted September 26, 2018 at 09:58PM by sxcurity
via reddit https://ift.tt/2IhUvZo
GitHub
GitHub - lc/cspparse: A tool to evaluate Content Security Policies.
A tool to evaluate Content Security Policies. Contribute to lc/cspparse development by creating an account on GitHub.
BYOB (Build Your Own Botnet)
https://ift.tt/2o2lJKj
Submitted September 26, 2018 at 09:35PM by PoonSafari
via reddit https://ift.tt/2zw9H21
https://ift.tt/2o2lJKj
Submitted September 26, 2018 at 09:35PM by PoonSafari
via reddit https://ift.tt/2zw9H21
GitHub
GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
An open-source post-exploitation framework for students, researchers and developers. - GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
windows-ntfs-tricks-collection/
https://ift.tt/2LNNfoB
Submitted September 26, 2018 at 10:26PM by ericnyamu
via reddit https://ift.tt/2Dz9Ohp
https://ift.tt/2LNNfoB
Submitted September 26, 2018 at 10:26PM by ericnyamu
via reddit https://ift.tt/2Dz9Ohp
Siaberry’s Command Injection Vulnerability
https://ift.tt/2sUq7g8
Submitted September 26, 2018 at 10:25PM by ericnyamu
via reddit https://ift.tt/2xEmfmU
https://ift.tt/2sUq7g8
Submitted September 26, 2018 at 10:25PM by ericnyamu
via reddit https://ift.tt/2xEmfmU
Space Duck
Siaberry’s Command Injection Vulnerability
A write up of several security vulnerabilities I discovered in Siaberry, including command-injection, clickjacking, and more.
SQL injection, Oracle and full-width characters – Tomas Lažauninkas – Medium
https://ift.tt/2qQ399O
Submitted September 26, 2018 at 10:24PM by ericnyamu
via reddit https://ift.tt/2DwnoCr
https://ift.tt/2qQ399O
Submitted September 26, 2018 at 10:24PM by ericnyamu
via reddit https://ift.tt/2DwnoCr
Medium
SQL injection, Oracle and full-width characters
Despite the fact that SQL injection is relatively old and solved problem, it is still commonly found in web applications.
Bypassing NGFW/WAFs using data format obfuscations – Ivan Novikov – Medium
https://ift.tt/2rlWRA4
Submitted September 26, 2018 at 10:23PM by ericnyamu
via reddit https://ift.tt/2xEmpuw
https://ift.tt/2rlWRA4
Submitted September 26, 2018 at 10:23PM by ericnyamu
via reddit https://ift.tt/2xEmpuw
Medium
Bypassing NGFW/WAFs using data format obfuscations
A lot of network security solutions today supports a lot data format inside HTTP and other protocols. The main question here is…
Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus
https://ift.tt/2xQK1P4
Submitted September 26, 2018 at 10:23PM by ericnyamu
via reddit https://ift.tt/2Dz9O0T
https://ift.tt/2xQK1P4
Submitted September 26, 2018 at 10:23PM by ericnyamu
via reddit https://ift.tt/2Dz9O0T
www.n00py.io
Executing Meterpreter in Memory on Windows 10 and Bypassing AntiVirus
Recently I read the article on the Coalfire Blog about executing an obfuscated PowerShell payload using Invoke-CradleCrafter. This was very useful, as Windows Defender has upped its game lately and is now blocking Metasploit's Web Delivery module. I wanted…
SQLi Without Quotes
https://ift.tt/2wkhH3o
Submitted September 26, 2018 at 10:20PM by ericnyamu
via reddit https://ift.tt/2xF5A2u
https://ift.tt/2wkhH3o
Submitted September 26, 2018 at 10:20PM by ericnyamu
via reddit https://ift.tt/2xF5A2u
SSD Advisory – VirtualBox VRDP Guest-to-Host Escape
https://ift.tt/2Q8Tllv
Submitted September 26, 2018 at 10:19PM by ericnyamu
via reddit https://ift.tt/2DxyVkG
https://ift.tt/2Q8Tllv
Submitted September 26, 2018 at 10:19PM by ericnyamu
via reddit https://ift.tt/2DxyVkG
Bypassing Duo Two-Factor Authentication (Fail Open)
https://ift.tt/2LYtTAU
Submitted September 26, 2018 at 10:18PM by ericnyamu
via reddit https://ift.tt/2xEq9vN
https://ift.tt/2LYtTAU
Submitted September 26, 2018 at 10:18PM by ericnyamu
via reddit https://ift.tt/2xEq9vN
www.n00py.io
Bypassing Duo Two-Factor Authentication (Fail Open)
Often times while performing penetration tests it may be helpful to connect to a system via the Remote Desktop Protocol (RDP). I typically use rdesktop or xfreerdp to connect to host once I have obtained credentials to do all sorts of things such as use Active…
Using “magic” DNS-resolutions to track suspicious domains
https://ift.tt/2Q8yEpS
Submitted September 26, 2018 at 10:18PM by ericnyamu
via reddit https://ift.tt/2DzkwEK
https://ift.tt/2Q8yEpS
Submitted September 26, 2018 at 10:18PM by ericnyamu
via reddit https://ift.tt/2DzkwEK
Gaining Shell using Server Side Template Injection (SSTI)
https://ift.tt/2LkNarY
Submitted September 26, 2018 at 10:16PM by ericnyamu
via reddit https://ift.tt/2xI29rK
https://ift.tt/2LkNarY
Submitted September 26, 2018 at 10:16PM by ericnyamu
via reddit https://ift.tt/2xI29rK
Medium
Gaining Shell using Server Side Template Injection (SSTI)
This post is about Server Side Template Injection (SSTI) and a brief walkthrough of how it can be leverage to get a shell on the server…