SMS 2FA service leaked. 26 million texts and metadata.
https://ift.tt/2PwioTF
Submitted November 17, 2018 at 07:47AM by rcmaehl
via reddit https://ift.tt/2zZ8rnh
https://ift.tt/2PwioTF
Submitted November 17, 2018 at 07:47AM by rcmaehl
via reddit https://ift.tt/2zZ8rnh
TechCrunch
A leaky database of SMS text messages exposed password resets and two-factor codes
A security lapse has exposed a massive database containing tens of millions of text messages, including password reset links, two-factor codes, shipping notifications and more. The exposed server belongs to Voxox (formerly Telcentris), a San Diego, Calif.…
An Open CTF for the Community - Leap Security CTF 2018
https://ift.tt/2QP3HYF
Submitted November 17, 2018 at 09:20AM by moot3ch
via reddit https://ift.tt/2qRjqLf
https://ift.tt/2QP3HYF
Submitted November 17, 2018 at 09:20AM by moot3ch
via reddit https://ift.tt/2qRjqLf
reddit
r/netsec - An Open CTF for the Community - Leap Security CTF 2018
3 votes and 0 comments so far on Reddit
BabySploit - Easy To Use Pentesting Toolkit Written In Python
https://ift.tt/2PoHLXy
Submitted November 17, 2018 at 02:35PM by thecoderkiller
via reddit https://ift.tt/2FsbfiO
https://ift.tt/2PoHLXy
Submitted November 17, 2018 at 02:35PM by thecoderkiller
via reddit https://ift.tt/2FsbfiO
GitHub
M4cs/BabySploit
BabySplot Beginner Pentesting Framework. Contribute to M4cs/BabySploit development by creating an account on GitHub.
Intel Management Engine JTAG Proof of Concept
https://ift.tt/2Ns7CsN
Submitted November 17, 2018 at 03:52PM by snsmac
via reddit https://ift.tt/2qTabud
https://ift.tt/2Ns7CsN
Submitted November 17, 2018 at 03:52PM by snsmac
via reddit https://ift.tt/2qTabud
GitHub
ptresearch/IntelTXE-PoC
Intel Management Engine JTAG Proof of Concept . Contribute to ptresearch/IntelTXE-PoC development by creating an account on GitHub.
Taking Down an Insider Threat: story of a failed pentest
https://ift.tt/2QQZu6A
Submitted November 17, 2018 at 10:20PM by _vavkamil_
via reddit https://ift.tt/2QOCp4D
https://ift.tt/2QQZu6A
Submitted November 17, 2018 at 10:20PM by _vavkamil_
via reddit https://ift.tt/2QOCp4D
threader.app
A thread written by @TinkerSec
Singing the Blues:
Taking Down an Insider Threat
"I had all of the advantages. I was already inside the network. No one suspected me. But they found my hack, kicked me off the network...
...and physically hunted me down." https://t.co/468Q6C4KR5
Taking Down an Insider Threat
"I had all of the advantages. I was already inside the network. No one suspected me. But they found my hack, kicked me off the network...
...and physically hunted me down." https://t.co/468Q6C4KR5
BYOB (Build Your Own Botnet) v0.4 Released - New Spreader Module For Worm-like Behavior
https://ift.tt/2o2lJKj
Submitted November 18, 2018 at 02:32AM by PoonSafari
via reddit https://ift.tt/2FrpVi7
https://ift.tt/2o2lJKj
Submitted November 18, 2018 at 02:32AM by PoonSafari
via reddit https://ift.tt/2FrpVi7
GitHub
GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
An open-source post-exploitation framework for students, researchers and developers. - GitHub - malwaredllc/byob: An open-source post-exploitation framework for students, researchers and developers.
Compare: WebARX, MalCare, Sucuri, WordFence, iThemesSecurity, SiteLock, SecuPress and CloudFlare
https://ift.tt/2Q1IuxA
Submitted November 18, 2018 at 03:40AM by modelop
via reddit https://ift.tt/2qSkY7L
https://ift.tt/2Q1IuxA
Submitted November 18, 2018 at 03:40AM by modelop
via reddit https://ift.tt/2qSkY7L
Ghost Emails: Hacking Gmail’s UX to Hide the Sender
https://ift.tt/2OOFv6L
Submitted November 17, 2018 at 09:34AM by timcotten
via reddit https://ift.tt/2qRJ1nn
https://ift.tt/2OOFv6L
Submitted November 17, 2018 at 09:34AM by timcotten
via reddit https://ift.tt/2qRJ1nn
Cotten.IO
Ghost Emails: Hacking Gmail’s UX to Hide the Sender
Faking the Appearance of a System Message in Gmail
Huge Repository For Active Directory Kill Chain Attack & Defense
https://ift.tt/2PDkzov
Submitted November 19, 2018 at 07:24AM by Hemlck
via reddit https://ift.tt/2Q8ui5L
https://ift.tt/2PDkzov
Submitted November 19, 2018 at 07:24AM by Hemlck
via reddit https://ift.tt/2Q8ui5L
GitHub
infosecn1nja/AD-Attack-Defense
Active Directory Security For Red & Blue Team. Contribute to infosecn1nja/AD-Attack-Defense development by creating an account on GitHub.
Protecting 802.1X key in Secure Enclave
https://ift.tt/2qSzJYh
Submitted November 19, 2018 at 09:31AM by ivladdalvi
via reddit https://ift.tt/2FvLkGP
https://ift.tt/2qSzJYh
Submitted November 19, 2018 at 09:31AM by ivladdalvi
via reddit https://ift.tt/2FvLkGP
reddit
r/mac - Protecting 802.1X key in Secure Enclave
1 vote and 0 comments so far on Reddit
A comparison of Kubernetes container runtimes
https://ift.tt/2Toc9zS
Submitted November 19, 2018 at 04:04PM by stevenacreman
via reddit https://ift.tt/2QUI755
https://ift.tt/2Toc9zS
Submitted November 19, 2018 at 04:04PM by stevenacreman
via reddit https://ift.tt/2QUI755
kubedex.com
Kubernetes Container Runtimes - kubedex.com
Come and read Kubernetes Container Runtimes on Kubedex.com. The number one site to Discover, Compare and Share Kubernetes Applications.
First part of a new series about Ethereum smart contract analysis, exploit generation and auto-looting
https://ift.tt/2qVldPC
Submitted November 19, 2018 at 04:15PM by berndtzl
via reddit https://ift.tt/2zk8uuj
https://ift.tt/2qVldPC
Submitted November 19, 2018 at 04:15PM by berndtzl
via reddit https://ift.tt/2zk8uuj
Medium
Practical Smart Contract Security Analysis and Exploitation— Part 1
In this series I explain how to use Mythril Classic to find and exploit security bugs in Ethereum smart contracts. The articles will cover…
Yet another memory leak in ImageMagick or how to exploit CVE-2018–16323.
https://ift.tt/2S4iwqz
Submitted November 19, 2018 at 06:08PM by ninjazeroone
via reddit https://ift.tt/2QWn8yI
https://ift.tt/2S4iwqz
Submitted November 19, 2018 at 06:08PM by ninjazeroone
via reddit https://ift.tt/2QWn8yI
Medium
Yet another memory leak in ImageMagick or how to exploit CVE-2018–16323.
Hi, in this article we’ll talk about ImageMagick vulnerabilities.
Carolina Con CFP
We are pleased to announce that Carolina Con 15 will be hosted in Charlotte at the Renaissance Charlotte Suites April 26th through the 28th in 2019. All interested in speaking to any topic in the realm of hacking, technology, science, robotics or any related field are invited to submit a proposal to speak at the con.A proposal should include the following:Name or handle/aliasPresentation nameA brief abstract about 1-2 paragraphsAn estimated time-length of your presentationOptional: A brief bioProposal should be submitted to the following email, carolinacon[at]protonmail[dot]com.The subject line is should state “CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - the Call For Papers is now open”Submissions are due by February 15th, 2019, midnight ESTWe may be making some early selections this year among the submissions, so please be timely if you're committed to being apart of the chosen presenters. We value diversity so please don't hesitate to propose your ideas no matter how outlandish.If you present at the Con, you will receive;Free Carolina Con admission for you and 1 guest1 free Carolina Con 15 T-shirtMad props and love from our staff and attendeesThe hosting organization, 49th Security Division, is a UNC Charlotte Computer Science club that focuses on ethical hacking and education. As we mentioned, Carolina Con 15 will be held in Charlotte. We hope to continue in the vain of the established culture and to inspire the next generation of hackers.If you have any questions or concerns, you can reach us at the email provided for the paper submission.
Submitted November 19, 2018 at 07:08AM by blkmanta
via reddit https://ift.tt/2S4o18H
We are pleased to announce that Carolina Con 15 will be hosted in Charlotte at the Renaissance Charlotte Suites April 26th through the 28th in 2019. All interested in speaking to any topic in the realm of hacking, technology, science, robotics or any related field are invited to submit a proposal to speak at the con.A proposal should include the following:Name or handle/aliasPresentation nameA brief abstract about 1-2 paragraphsAn estimated time-length of your presentationOptional: A brief bioProposal should be submitted to the following email, carolinacon[at]protonmail[dot]com.The subject line is should state “CarolinaCon-15 is April 26-28, 2019 in Charlotte NC - the Call For Papers is now open”Submissions are due by February 15th, 2019, midnight ESTWe may be making some early selections this year among the submissions, so please be timely if you're committed to being apart of the chosen presenters. We value diversity so please don't hesitate to propose your ideas no matter how outlandish.If you present at the Con, you will receive;Free Carolina Con admission for you and 1 guest1 free Carolina Con 15 T-shirtMad props and love from our staff and attendeesThe hosting organization, 49th Security Division, is a UNC Charlotte Computer Science club that focuses on ethical hacking and education. As we mentioned, Carolina Con 15 will be held in Charlotte. We hope to continue in the vain of the established culture and to inspire the next generation of hackers.If you have any questions or concerns, you can reach us at the email provided for the paper submission.
Submitted November 19, 2018 at 07:08AM by blkmanta
via reddit https://ift.tt/2S4o18H
reddit
r/netsec - Carolina Con CFP
2 votes and 0 comments so far on Reddit
An OSINT Analysis of the Elon Musk Bitcoin Scam
https://ift.tt/2OPaZda
Submitted November 18, 2018 at 05:55PM by smicallef
via reddit https://ift.tt/2DQ5rOq
https://ift.tt/2OPaZda
Submitted November 18, 2018 at 05:55PM by smicallef
via reddit https://ift.tt/2DQ5rOq
Medium
An OSINT Analysis of the Elon Musk Bitcoin Scam
Using some OSINT techniques, let’s look into the recent Elon Musk Bitcoin scam and see what interesting information we might find.
Vision Direct reveals breach that skimmed customer credit cards
https://ift.tt/2Kd709j
Submitted November 19, 2018 at 08:21PM by joshkale_
via reddit https://ift.tt/2QUUdLv
https://ift.tt/2Kd709j
Submitted November 19, 2018 at 08:21PM by joshkale_
via reddit https://ift.tt/2QUUdLv
TechCrunch
Vision Direct reveals breach that skimmed customer credit cards
European online contact lens supplier Vision Direct has revealed a data breach which compromised full credit card details for a number of its customers, as well as personal information. Compromised data includes full name, billing address, email address,…
XS-Searching Google’s bug tracker to find out vulnerable source code
https://ift.tt/2ORtGwL
Submitted November 19, 2018 at 10:23PM by Involder
via reddit https://ift.tt/2zhLYCh
https://ift.tt/2ORtGwL
Submitted November 19, 2018 at 10:23PM by Involder
via reddit https://ift.tt/2zhLYCh
Medium
XS-Searching Google’s bug tracker to find out vulnerable source code
Or how side-channel timing attacks aren’t that impractical
Join fellow hackers for one month of security research in Malaysia and Indonesia (all expenses paid)
https://ift.tt/2B91Gyc
Submitted November 19, 2018 at 09:50PM by breakingsystems
via reddit https://ift.tt/2qV2Iuv
https://ift.tt/2B91Gyc
Submitted November 19, 2018 at 09:50PM by breakingsystems
via reddit https://ift.tt/2qV2Iuv
reddit
r/netsec - Join fellow hackers for one month of security research in Malaysia and Indonesia (all expenses paid)
6 votes and 0 comments so far on Reddit
Vectorized Emulation: MMU Design
https://ift.tt/2A531au
Submitted November 20, 2018 at 01:57AM by gamozolabs
via reddit https://ift.tt/2BhrRFV
https://ift.tt/2A531au
Submitted November 20, 2018 at 01:57AM by gamozolabs
via reddit https://ift.tt/2BhrRFV
Gamozo Labs Blog
Vectorized Emulation: MMU Design
I blog about random things security, everything is broken, nothing scales, shared memory models are flawed.
Kickstart Application Security on Heroku with the Templarbit Buildpack
https://ift.tt/2FtXdNy
Submitted November 20, 2018 at 02:29AM by iamcoolc
via reddit https://ift.tt/2qU9Yqx
https://ift.tt/2FtXdNy
Submitted November 20, 2018 at 02:29AM by iamcoolc
via reddit https://ift.tt/2qU9Yqx
Templarbit Inc.
Kickstart Application Security on Heroku with the Templarbit Buildpack
Heroku remains a popular choice for teams to run their software...
SignedMalware.org | A Resource That Demonstrates Failures In Code Signing PKI
https://ift.tt/2h3AjBl
Submitted November 20, 2018 at 03:45AM by Hemlck
via reddit https://ift.tt/2S130M0
https://ift.tt/2h3AjBl
Submitted November 20, 2018 at 03:45AM by Hemlck
via reddit https://ift.tt/2S130M0