Follow up to the container scanning comparison blog
https://ift.tt/2PdjxLG
Submitted October 05, 2018 at 04:55PM by stevenacreman
via reddit https://ift.tt/2yhrdWa
https://ift.tt/2PdjxLG
Submitted October 05, 2018 at 04:55PM by stevenacreman
via reddit https://ift.tt/2yhrdWa
kubedex.com
Follow Up: Container Scanning Comparison - kubedex.com
Come and read Follow Up: Container Scanning Comparison on Kubedex.com. The number one site to Discover, Compare and Share Kubernetes Applications.
"Supposely" GRU using a Pineapple nano (see slide 26)
https://ift.tt/2PcemvB
Submitted October 05, 2018 at 05:21PM by Noth-Noth
via reddit https://ift.tt/2Pf0cKc
https://ift.tt/2PcemvB
Submitted October 05, 2018 at 05:21PM by Noth-Noth
via reddit https://ift.tt/2Pf0cKc
english.defensie.nl
GRU close access cyber operation against OPCW
Press conference cyber, 4 October 2018.
GoogleMeetRoulette: Joining random Google Meet meetings
https://ift.tt/2yf8v1f
Submitted October 05, 2018 at 06:00PM by _yowie_
via reddit https://ift.tt/2y11d1I
https://ift.tt/2yf8v1f
Submitted October 05, 2018 at 06:00PM by _yowie_
via reddit https://ift.tt/2y11d1I
Martin Vigo
GoogleMeetRoulette: Joining random meetings - Martin Vigo
Finding Google Meet phone numbers and bruteforcing PINs to join random meetings
How to Spot Good Fuzzing Research
https://ift.tt/2OIJXbu
Submitted October 05, 2018 at 07:51PM by yossarian_flew_away
via reddit https://ift.tt/2y2ymKK
https://ift.tt/2OIJXbu
Submitted October 05, 2018 at 07:51PM by yossarian_flew_away
via reddit https://ift.tt/2y2ymKK
Trail of Bits Blog
How to Spot Good Fuzzing Research
Of the nearly 200 papers on software fuzzing that have been published in the last three years, most of them—even some from high-impact conferences—are academic clamor. Fuzzing research suffers from…
Hiding malware in Windows – The basics of code injection
https://ift.tt/2DilSU5
Submitted October 05, 2018 at 06:56PM by CyberBullets
via reddit https://ift.tt/2zTOoI5
https://ift.tt/2DilSU5
Submitted October 05, 2018 at 06:56PM by CyberBullets
via reddit https://ift.tt/2zTOoI5
PRDeving
Hiding malware in Windows – The basics of code injection
There are hundreds of teams working professionally trying to break into any single digital device to compromise sensitive data leaving no fingerprint.Malware industry is bigger than you might think…
Bypassing Web Cache Poisoning Countermeasures
https://ift.tt/2RwvcHl
Submitted October 05, 2018 at 08:35PM by albinowax
via reddit https://ift.tt/2BWwBS6
https://ift.tt/2RwvcHl
Submitted October 05, 2018 at 08:35PM by albinowax
via reddit https://ift.tt/2BWwBS6
Web Security Blog | PortSwigger
Bypassing Web Cache Poisoning Countermeasures
Following my presentation and whitepaper on Web Cache Poisoning last month, various companies have deployed defences in an attempt to mitigate cache poisoning attacks. In this post I’ll take a look at
A Red Teamer's guide to pivoting
https://ift.tt/2mTWiaJ
Submitted October 05, 2018 at 10:40PM by LarryZCash
via reddit https://ift.tt/2CtVB4g
https://ift.tt/2mTWiaJ
Submitted October 05, 2018 at 10:40PM by LarryZCash
via reddit https://ift.tt/2CtVB4g
Artem Kondratenko
A Red Teamer's guide to pivoting
Pivoting guide for penetrations testers or red team members
Shellab - a Linux and Windows shellcode enrichment utility
https://ift.tt/2IIRC3M
Submitted October 06, 2018 at 09:48PM by _____WINTERMUTE_____
via reddit https://ift.tt/2yiTT16
https://ift.tt/2IIRC3M
Submitted October 06, 2018 at 09:48PM by _____WINTERMUTE_____
via reddit https://ift.tt/2yiTT16
GitHub
TheSecondSun/Shellab
Linux and Windows shellcode enrichment utility. Contribute to TheSecondSun/Shellab development by creating an account on GitHub.
Hack The Box – Fighter Walkthrough – VeteranSec
https://ift.tt/2E3V0rl
Submitted October 07, 2018 at 11:07AM by stripcheese20
via reddit https://ift.tt/2C0qhJ2
https://ift.tt/2E3V0rl
Submitted October 07, 2018 at 11:07AM by stripcheese20
via reddit https://ift.tt/2C0qhJ2
VeteranSec
Hack The Box – Fighter Walkthrough
Video Introduction This week’s retired box is Fighter, which brought a lot of pain into my life. Having just started my HTB journey over the past couple of weeks, I have challenged myself to…
Analysis of device data collected by Airbnb
https://ift.tt/2pGrD4D
Submitted October 07, 2018 at 08:29PM by kahunalu
via reddit https://ift.tt/2Oc5B8r
https://ift.tt/2pGrD4D
Submitted October 07, 2018 at 08:29PM by kahunalu
via reddit https://ift.tt/2Oc5B8r
Medium
Under the hood: Airbnb
This blog series focuses on examining the collection of device data by various popular mobile applications. This data is often collected…
DerbyCon 8 (2018) Presentations
https://ift.tt/2C13igY
Submitted October 07, 2018 at 10:05PM by jokinawa
via reddit https://ift.tt/2BYJXgB
https://ift.tt/2C13igY
Submitted October 07, 2018 at 10:05PM by jokinawa
via reddit https://ift.tt/2BYJXgB
Irongeek
Derbycon 2018 Videos (Hacking Illustrated Series InfoSec Tutorial Videos)
Irongeek's Information Security site with tutorials, articles and other information.
Git submodule remote code execution (CVE-2018-17456)
https://ift.tt/2BZuVaf
Submitted October 08, 2018 at 02:46AM by Plazmaz1
via reddit https://ift.tt/2O9j00Q
https://ift.tt/2BZuVaf
Submitted October 08, 2018 at 02:46AM by Plazmaz1
via reddit https://ift.tt/2O9j00Q
reddit
r/netsec - Git submodule remote code execution (CVE-2018-17456)
1 vote and 0 comments so far on Reddit
Statement from DHS Press Secretary on Recent Media Reports of Potential Supply Chain Compromise
https://ift.tt/2OGmaIT
Submitted October 08, 2018 at 04:33AM by jdrch
via reddit https://ift.tt/2NtGcSy
https://ift.tt/2OGmaIT
Submitted October 08, 2018 at 04:33AM by jdrch
via reddit https://ift.tt/2NtGcSy
Department of Homeland Security
Statement from DHS Press Secretary on Recent Media Reports of Potential Supply Chain Compromise
Statement from Press Secretary Tyler Houlton on recent media reports of a potential supply chain compromise.
365 Days Later: Finding and Exploiting Safari Bugs using Publicly Available Tools
https://ift.tt/2Nltl4E
Submitted October 08, 2018 at 02:20PM by albinowax
via reddit https://ift.tt/2QySXgl
https://ift.tt/2Nltl4E
Submitted October 08, 2018 at 02:20PM by albinowax
via reddit https://ift.tt/2QySXgl
Blogspot
365 Days Later: Finding and Exploiting Safari Bugs using Publicly Available Tools
Posted by Ivan Fratric, Google Project Zero Around a year ago, we published the results of research about the resilience of modern bro...
net-snmp 5.7.3 unauthenticated remote Denial of Service (exploit available)
https://ift.tt/2NuB8NM
Submitted October 08, 2018 at 04:27PM by magnusstubman
via reddit https://ift.tt/2zY5DrA
https://ift.tt/2NuB8NM
Submitted October 08, 2018 at 04:27PM by magnusstubman
via reddit https://ift.tt/2zY5DrA
reddit
r/netsec - net-snmp 5.7.3 unauthenticated remote Denial of Service (exploit available)
1 vote and 0 comments so far on Reddit
serviceFu – Harvesting Service Account Credentials Remotely
https://ift.tt/2Pk4pfz
Submitted October 08, 2018 at 05:22PM by securifera
via reddit https://ift.tt/2C5DnFg
https://ift.tt/2Pk4pfz
Submitted October 08, 2018 at 05:22PM by securifera
via reddit https://ift.tt/2C5DnFg
Securifera
serviceFu – Securifera
serviceFu
In a recent assessment our team found itself in a somewhat new situation that resulted in a useful tool we wanted to share with the community. The assessment started with us gaining initial access into a customer's network. This particular customer…
In a recent assessment our team found itself in a somewhat new situation that resulted in a useful tool we wanted to share with the community. The assessment started with us gaining initial access into a customer's network. This particular customer…
FlareOn Level 6 with symbolic execution and Binary Ninja
https://ift.tt/2O9pME1
Submitted October 08, 2018 at 06:50PM by thebarbershopper
via reddit https://ift.tt/2IIEZWB
https://ift.tt/2O9pME1
Submitted October 08, 2018 at 06:50PM by thebarbershopper
via reddit https://ift.tt/2IIEZWB
reddit
r/netsec - FlareOn Level 6 with symbolic execution and Binary Ninja
4 votes and 0 comments so far on Reddit
Build a dynamic firewall or how to add dynamically clients to iptables
https://ift.tt/2O9OMuX
Submitted October 08, 2018 at 10:40PM by sqall01
via reddit https://ift.tt/2ylEahN
https://ift.tt/2O9OMuX
Submitted October 08, 2018 at 10:40PM by sqall01
via reddit https://ift.tt/2ylEahN
Tenable Research has discovered several vulnerabilities in RouterOS, an operating system used in MikroTik routers, the most critical of which would allow attackers to potentially gain full system access.
https://ift.tt/2IJz03X
Submitted October 09, 2018 at 02:08AM by EvanConover
via reddit https://ift.tt/2Pl8W1j
https://ift.tt/2IJz03X
Submitted October 09, 2018 at 02:08AM by EvanConover
via reddit https://ift.tt/2Pl8W1j
Tenable™
Tenable Research Advisory: Multiple Vulnerabilities Discovered in
Tenable Research has discovered several vulnerabilities in RouterOS, an operating system used in MikroTik routers, the most critical of which would allow attackers to potentially gain full system a
Google Shutting Down Google+ After API Leaks 500k Account's Data/Lack Of Adoption
https://ift.tt/2yorSoR
Submitted October 09, 2018 at 03:21AM by g3xxg3xx
via reddit https://ift.tt/2OKUOBw
https://ift.tt/2yorSoR
Submitted October 09, 2018 at 03:21AM by g3xxg3xx
via reddit https://ift.tt/2OKUOBw
BleepingComputer
Google+ Shutting Down After Bug Leaks Info of 500k Accounts
Google has announced that they are closing the consumer functionality of Google+ due lack of adoption and an API bug that leaked the personal information of up to 500,000 Google+ accounts.
Length of an Antenna is relative to Wave Length
https://ift.tt/2CvMBLT
Submitted October 09, 2018 at 05:41AM by i_rsX
via reddit https://ift.tt/2NvMmRP
https://ift.tt/2CvMBLT
Submitted October 09, 2018 at 05:41AM by i_rsX
via reddit https://ift.tt/2NvMmRP
reddit
r/hacking - Length of an Antenna is relative to Wave Length
4 votes and 1 comment so far on Reddit