Abusing Microsoft Office Online Video
https://ift.tt/2q9pkXJ
Submitted October 25, 2018 at 08:25PM by dorsis
via reddit https://ift.tt/2CELMj2
https://ift.tt/2q9pkXJ
Submitted October 25, 2018 at 08:25PM by dorsis
via reddit https://ift.tt/2CELMj2
Cymulate
Abusing Microsoft Office Online Video
Cymulate’s research team has discovered a way to abuse the Online Video feature on Microsoft Word to execute malicious code. Attackers could use this for malicious purposes such as phishing, as the document will show the embedded online video with a link…
How malicious mobile apps can abuse paired Bluetooth Low Energy peripherals
https://ift.tt/2PZXFUN
Submitted October 26, 2018 at 03:19AM by mmmds
via reddit https://ift.tt/2AsCwgt
https://ift.tt/2PZXFUN
Submitted October 26, 2018 at 03:19AM by mmmds
via reddit https://ift.tt/2AsCwgt
logicaltrust.github.io
[EN] BLE mobile application independent access
Bluetooth Low Energy (BLE) is a wireless standard, widely used to communicate Android and iOS mobile applications with devices of many kinds. These include home security, medical and other which may exchange sensitive data or perform sensitive operations.…
libtiff decodes arbitrarily-sized JBIG into a target buffer - project-zero
https://ift.tt/2Pk1kj5
Submitted October 26, 2018 at 04:11PM by ranok
via reddit https://ift.tt/2OO9YXA
https://ift.tt/2Pk1kj5
Submitted October 26, 2018 at 04:11PM by ranok
via reddit https://ift.tt/2OO9YXA
The Next Chapter: From the Endpoint to the Cloud - QubesOS
https://ift.tt/2z24PAm
Submitted October 26, 2018 at 06:00PM by up-sky-7
via reddit https://ift.tt/2CEa7Wh
https://ift.tt/2z24PAm
Submitted October 26, 2018 at 06:00PM by up-sky-7
via reddit https://ift.tt/2CEa7Wh
Qubes OS
The Next Chapter: From the Endpoint to the Cloud
Earlier this year, I decided to take a sabbatical. I wanted to reflect on my infosec work and decide what I would like to focus on in the coming years. As you probably know, I’ve spent the last nine years mostly fighting the battle to secure the endpoint…
bscan: an extensible service enumeration tool
https://ift.tt/2qd28I9
Submitted October 26, 2018 at 07:26PM by Dr_Rector
via reddit https://ift.tt/2CFBShg
https://ift.tt/2qd28I9
Submitted October 26, 2018 at 07:26PM by Dr_Rector
via reddit https://ift.tt/2CFBShg
GitHub
welchbj/bscan
an asynchronous target enumeration tool. Contribute to welchbj/bscan development by creating an account on GitHub.
Exploitation Training
https://ift.tt/2z3nH21
Submitted October 26, 2018 at 08:31PM by mstfknn
via reddit https://ift.tt/2OMZBTM
https://ift.tt/2z3nH21
Submitted October 26, 2018 at 08:31PM by mstfknn
via reddit https://ift.tt/2OMZBTM
PRISMA CSI
5 - Exploitation • PRISMA CSI
Content of Exploitation, What is an exploit?, Types of exploits, Local remote and 0day exploits, Exploit Databases, Example Exploit Scenarios
Chinese Telecom performing BGP Hijacking
https://ift.tt/2SaenC9
Submitted October 26, 2018 at 08:22PM by alnarra_1
via reddit https://ift.tt/2RjdfLs
https://ift.tt/2SaenC9
Submitted October 26, 2018 at 08:22PM by alnarra_1
via reddit https://ift.tt/2RjdfLs
Signal Desktop Leaves Message Decryption Key in Plain Sight
https://ift.tt/2Sc2Imn
Submitted October 26, 2018 at 11:15PM by cmsimike
via reddit https://ift.tt/2Avjvdl
https://ift.tt/2Sc2Imn
Submitted October 26, 2018 at 11:15PM by cmsimike
via reddit https://ift.tt/2Avjvdl
BleepingComputer
Signal Desktop Leaves Message Decryption Key in Plain Sight
A mistake in the process used by the Signal Desktop application to encrypt locally stored messages leaves them wide open to an attacker.
use nginx auth_request module and Lasso to protect all of your private applications with Google Auth
https://ift.tt/2O73oWU
Submitted October 27, 2018 at 12:50AM by bnfinet
via reddit https://ift.tt/2z51HDT
https://ift.tt/2O73oWU
Submitted October 27, 2018 at 12:50AM by bnfinet
via reddit https://ift.tt/2z51HDT
Medium
Enforce Google Authentication for Any Application with nginx and Lasso
By using the nginx auth_request module and Lasso you can protect any application running behind your nginx reverse proxy with OAuth. Lasso…
Trivial local privilege escalation to root in X11 - CVE-2018-14665
https://ift.tt/2CHyr9S
Submitted October 27, 2018 at 05:42PM by picklednull
via reddit https://ift.tt/2Au0HLn
https://ift.tt/2CHyr9S
Submitted October 27, 2018 at 05:42PM by picklednull
via reddit https://ift.tt/2Au0HLn
reddit
r/netsec - Trivial local privilege escalation to root in X11 - CVE-2018-14665
4 votes and 0 comments so far on Reddit
Rocket Shot: Backwards program slice stitching for automatic CTF problem solving.
https://ift.tt/2EMtP4F
Submitted October 27, 2018 at 05:51PM by Arrilius
via reddit https://ift.tt/2PnjBfs
https://ift.tt/2EMtP4F
Submitted October 27, 2018 at 05:51PM by Arrilius
via reddit https://ift.tt/2PnjBfs
GitHub
ChrisTheCoolHut/Rocket-Shot
Backwards program slice stitching for automatic CTF problem solving. - ChrisTheCoolHut/Rocket-Shot
BlackEye Phishing Kit In Python w/ Automatic Serveo Forwarding. Allows you to use custom subdomains.
https://ift.tt/2OQ1EGN
Submitted October 27, 2018 at 07:20PM by thecoderkiller
via reddit https://ift.tt/2Sokm6r
https://ift.tt/2OQ1EGN
Submitted October 27, 2018 at 07:20PM by thecoderkiller
via reddit https://ift.tt/2Sokm6r
GitHub
M4cs/BlackEye-Python
BlackEye Phishing Kit in Python w Serveo Subdomain Creation - M4cs/BlackEye-Python
Hack The Box – Bounty Walkthrough
https://ift.tt/2AvrtTJ
Submitted October 27, 2018 at 08:31PM by m4v3r1ck-
via reddit https://ift.tt/2PZKRh5
https://ift.tt/2AvrtTJ
Submitted October 27, 2018 at 08:31PM by m4v3r1ck-
via reddit https://ift.tt/2PZKRh5
VeteranSec
Hack The Box – Bounty Walkthrough
Video Walkthrough: Introduction: This week’s retiring machine is Bounty, which is a beginner-friendly box that can still teach a few new tricks. Bounty is rated 4.8/10, which I feel is prett…
PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls.
https://ift.tt/2D6M6bq
Submitted October 28, 2018 at 03:15AM by ustayready
via reddit https://ift.tt/2OaxRmN
https://ift.tt/2D6M6bq
Submitted October 28, 2018 at 03:15AM by ustayready
via reddit https://ift.tt/2OaxRmN
GitHub
ustayready/CasperStager
PoC for persisting .NET payloads in Windows Notification Facility (WNF) state names using low-level Windows Kernel API calls. - ustayready/CasperStager
Blocking Internet Ads Using DNS Sinkhole
https://ift.tt/2Smo40q
Submitted October 28, 2018 at 11:41AM by shreyasonline
via reddit https://ift.tt/2z9MVfd
https://ift.tt/2Smo40q
Submitted October 28, 2018 at 11:41AM by shreyasonline
via reddit https://ift.tt/2z9MVfd
Technitium
Blocking Internet Ads Using DNS Sinkhole
Technitium DNS Server is an open source software that can be effectively used to block Internet Advertisements (Ads), adware and, malware o...
SSLLabs.com can't connect to browser's with enforced TLS 1.3
https://ift.tt/2z8ViYi
Submitted October 28, 2018 at 04:06PM by rediii123
via reddit https://ift.tt/2JjRfNq
https://ift.tt/2z8ViYi
Submitted October 28, 2018 at 04:06PM by rediii123
via reddit https://ift.tt/2JjRfNq
Filtering NSFW Content While Running a Wall of Sheep in the Wild
https://ift.tt/2qaWnLa
Submitted October 28, 2018 at 06:01PM by xenexfor
via reddit https://ift.tt/2qeOioP
https://ift.tt/2qaWnLa
Submitted October 28, 2018 at 06:01PM by xenexfor
via reddit https://ift.tt/2qeOioP
/dev/random
Post-BruCON Experience - Running a Wall of Sheep in the Wild | /dev/random
The use of a Wall of Sheep is nice to raise the security awareness of your audience. A Wall of Sheep is a tool used to demonstrate what can happen when users connect to a wild network without a minimum level of security. The non-encrypted traffic is analyzed…
IBM Acquiring RedHat.
https://ift.tt/2ObUSWA
Submitted October 29, 2018 at 02:24AM by sastdast
via reddit https://ift.tt/2Q3rrry
https://ift.tt/2ObUSWA
Submitted October 29, 2018 at 02:24AM by sastdast
via reddit https://ift.tt/2Q3rrry
CNBC
IBM to acquire Red Hat in deal valued at $34 billion
The acquisition is by far IBM's largest deal ever, and third-biggest in the history of U.S. tech.
Systemd has a remotely exploitable bug in its DHCPv6 client
https://ift.tt/2CMl9bQ
Submitted October 29, 2018 at 03:47AM by xrna
via reddit https://ift.tt/2qfN1xT
https://ift.tt/2CMl9bQ
Submitted October 29, 2018 at 03:47AM by xrna
via reddit https://ift.tt/2qfN1xT
Erratasec
Systemd is bad parsing and should feel bad
Systemd has a remotely exploitable bug in it's DHCPv6 client. That means anybody on the local network can send you a packet and take control...
Three C-Words of Web App Security: Part 2 – CSRF
https://ift.tt/2PuKBtg
Submitted October 29, 2018 at 01:55PM by CyberBullets
via reddit https://ift.tt/2PZgLu1
https://ift.tt/2PuKBtg
Submitted October 29, 2018 at 01:55PM by CyberBullets
via reddit https://ift.tt/2PZgLu1
Fuxploider - File upload vulnerability scanner and exploitation tool
https://ift.tt/2uIkxkx
Submitted October 29, 2018 at 05:19PM by n1ghtw1sh
via reddit https://ift.tt/2SqeMQZ
https://ift.tt/2uIkxkx
Submitted October 29, 2018 at 05:19PM by n1ghtw1sh
via reddit https://ift.tt/2SqeMQZ
GitHub
almandin/fuxploider
File upload vulnerability scanner and exploitation tool. - almandin/fuxploider