Netsec – Telegram
Netsec
7.46K subscribers
22.4K links
This channel posts the feed from r/netsec.
For any suggestions dm @streaak
Donate to keep the bot running https://www.paypal.me/akhilgv
Download Telegram
Not Your Ordinary OSCP Review
https://ift.tt/2MR9Gtf

Submitted October 22, 2018 at 09:33PM by m4v3r1ck-
via reddit https://ift.tt/2q3jXt4
Chromium Asking for Feedback on trivial subdomains: 883038 - Feedback: Eliding www/m subdomains - chromium
https://ift.tt/2MrckFM

Submitted October 23, 2018 at 04:15AM by nightkhaos
via reddit https://ift.tt/2D0eZpK
Here is a blog post showing some example uses of the tool I recently wrote, JTB Investigator. I added a lot of functionality since I posted the tool on here thanks to help from the awesome community. Check it out!
https://ift.tt/2Sb3Qqs

Submitted October 23, 2018 at 10:05AM by jbob133
via reddit https://ift.tt/2PeOUc8
RCE Cornucopia - AppSec USA 2018 CTF Writeup and Challenge Download
https://ift.tt/2NYLBRM

Submitted October 23, 2018 at 09:09AM by Dejanz
via reddit https://ift.tt/2OG5QZv
Multiple 0days used by Magecart
https://ift.tt/2q6EnS5

Submitted October 24, 2018 at 03:01PM by dtdn
via reddit https://ift.tt/2EECzty
HoneyProcs: Going beyond honeyfiles for Deception on Endpoints
Deploying detection solutions on an endpoint host comes with constraints - limited availability of CPU, memory, disk and other resources, stability constraints, policy adherence and restrictions, the need to be non-intrusive to the user, the host OS and other applications on the host.In response to this, we present HoneyProcs, a new deception methodology (patent pending) and an all user space method that extends existing deception honeypot technology on endpoint hosts. HoneyProcs complements existing deception technology by using forged, controlled decoy processes to catch info stealers, Banking Trojans, rootkits and other generic malware, and it does so by exploiting a common trait exhibited by these malwares - code injection.By limiting its inspection footprint to only these decoy processes, HoneyProcs effectively addresses efficacy and performance concerns that otherwise constrain endpoint deployments.  Throughout this article, we further explain how the reduced and targeted inspection footprint can be leveraged to turn HoneyProcs into an intelligence gathering toolkit that can be used to write automated signatures for other antivirus and detection solutions to remediate infections on the system.​https://forums.juniper.net/t5/Threat-Research/HoneyProcs-Going-Beyond-Honeyfiles-for-Deception-on-Endpoints/ba-p/385830

Submitted October 24, 2018 at 03:28PM by anoopsaldanha
via reddit https://ift.tt/2yZ0A8U
Reverse Engineering ESP8266 Firmware (Part 1)
https://ift.tt/2PgAnNa

Submitted October 24, 2018 at 05:22PM by BoredPentester
via reddit https://ift.tt/2SconLc