Bypassing Firebase client-side authorization to create custom app.goo.gl subdomains
https://ift.tt/2PVOMv0
Submitted December 14, 2018 at 06:48PM by ThomasCZ
via reddit https://ift.tt/2zXErcq
https://ift.tt/2PVOMv0
Submitted December 14, 2018 at 06:48PM by ThomasCZ
via reddit https://ift.tt/2zXErcq
Thomas Orlita's blog
Bypassing Firebase authorization to create custom goo.gl subdomains - Thomas Orlita's blog
Since the support of goo.gl has already ended, I’ve been looking for ways to shorten URLs using Google services. Some time ago I’ve found a bug that allowed me to shorten links using Google’s official g.co shortener. This time I took a look at Firebase Dynamic…
Cylance Narrows The Cybersecurity Skills Gap With Virtual CISO.
https://ift.tt/2UHZ9Wd
Submitted December 14, 2018 at 07:13PM by xaocuc
via reddit https://ift.tt/2rzYVDg
https://ift.tt/2UHZ9Wd
Submitted December 14, 2018 at 07:13PM by xaocuc
via reddit https://ift.tt/2rzYVDg
IT Security Guru
Cylance Narrows The Cybersecurity Skills Gap With Virtual CISO. - IT Security Guru
Cylance Inc., the leading provider of AI-driven, prevention-first security solutions, today announced the availability of its virtual chief information sec
NoNameCon 2019 Call for Talks and Workshops
https://ift.tt/2Lj2jLU
Submitted December 14, 2018 at 07:30PM by xaocuc
via reddit https://ift.tt/2LnYpS9
https://ift.tt/2Lj2jLU
Submitted December 14, 2018 at 07:30PM by xaocuc
via reddit https://ift.tt/2LnYpS9
cfp.nonamecon.org
NoNameCon 2019
Schedule, talks and talk submissions for NoNameCon 2019
phpMyAdmin (AllowArbitraryServer) Arbitrary File Read Vulnerability
https://ift.tt/2Cd91jr
Submitted December 14, 2018 at 10:46PM by Ambulong
via reddit https://ift.tt/2Ljov8G
https://ift.tt/2Cd91jr
Submitted December 14, 2018 at 10:46PM by Ambulong
via reddit https://ift.tt/2Ljov8G
Vulnspy
phpMyAdmin (AllowArbitraryServer) Arbitrary File Read Vulnerability | VULNSPY
Many posts have pointed out that a malicious MySQL server can use the LOAD DATA LOCAL command to read arbitrary files from MYSQL clients. According to this article (chinese) phpMyAdmin开启远程登陆导致本地文件读取, We can read arbitrary file on phpMyAdmin server if $cf…
SQLite and Chromium RCE
https://ift.tt/2A29rYB
Submitted December 15, 2018 at 04:07AM by 3553x
via reddit https://ift.tt/2GgjJKf
https://ift.tt/2A29rYB
Submitted December 15, 2018 at 04:07AM by 3553x
via reddit https://ift.tt/2GgjJKf
Tencent
Magellan - Tencent Blade Team
Magellan is a remote code execution vulnerability that exists in SQLite. As a well-known database, SQLite is widely used in all modern mainstream operating systems and software, so this vulnerability has a wide range of influence. After testing Chromium was…
Magellan - SQLite Remote Code Execution Vulnerability
https://ift.tt/2A29rYB
Submitted December 15, 2018 at 05:26AM by Pandry
via reddit https://ift.tt/2A0Goom
https://ift.tt/2A29rYB
Submitted December 15, 2018 at 05:26AM by Pandry
via reddit https://ift.tt/2A0Goom
Tencent
Magellan - Tencent Blade Team
Magellan is a remote code execution vulnerability that exists in SQLite. As a well-known database, SQLite is widely used in all modern mainstream operating systems and software, so this vulnerability has a wide range of influence. After testing Chromium was…
Hosting malicious payloads on Youtube
https://ift.tt/2CeNhUI
Submitted December 15, 2018 at 06:32AM by mthbernardes
via reddit https://ift.tt/2Qzqdss
https://ift.tt/2CeNhUI
Submitted December 15, 2018 at 06:32AM by mthbernardes
via reddit https://ift.tt/2Qzqdss
mthbernardes.github.io
Gambler - Hacking and other stuffs
Posts about hacking, coding and other stuffs
Crash Chrome 70 with the SQLite Magellan bug
https://ift.tt/2PDuKVp
Submitted December 15, 2018 at 09:50AM by zhuowei
via reddit https://ift.tt/2GjAN1X
https://ift.tt/2PDuKVp
Submitted December 15, 2018 at 09:50AM by zhuowei
via reddit https://ift.tt/2GjAN1X
Worth Doing Badly
Crash Chrome 70 with the SQLite Magellan bug
This proof-of-concept crashes the Chrome renderer process using Tencent Blade Team's Magellan SQLite3 bug. It's based on a SQLite test case from the commit that fixed the bug.
The 5 Hacking Newsletter
https://ift.tt/2EoVozw
Submitted December 15, 2018 at 10:14PM by s14ve
via reddit https://ift.tt/2QTEC1P
https://ift.tt/2EoVozw
Submitted December 15, 2018 at 10:14PM by s14ve
via reddit https://ift.tt/2QTEC1P
reddit
r/netsec - The 5 Hacking Newsletter
2 votes and 0 comments so far on Reddit
RIP Tim May
https://ift.tt/2PEL88f
Submitted December 15, 2018 at 11:07PM by eleitl
via reddit https://ift.tt/2UMrefb
https://ift.tt/2PEL88f
Submitted December 15, 2018 at 11:07PM by eleitl
via reddit https://ift.tt/2UMrefb
Facebook
Lucky Green
Tim May - Cypherpunks co-Founder, Discoverer of Radiation-Induced Single Event Upsets in Integrated Circuits, Uncompromising Firearms Proponent Word has reached me that my dear friend,...
XSSing Google Code-in thanks to improperly escaped JSON data
https://ift.tt/2R0zQ2y
Submitted December 16, 2018 at 02:41AM by ThomasCZ
via reddit https://ift.tt/2QDCZX2
https://ift.tt/2R0zQ2y
Submitted December 16, 2018 at 02:41AM by ThomasCZ
via reddit https://ift.tt/2QDCZX2
Thomas Orlita's blog
XSSing Google Code-in thanks to improperly escaped JSON data - Thomas Orlita's blog
Google Code-in is an online programming competition for students hosted by Google that takes place every year. When I was singing up for a second time, I put a payload into all the text fields. I didn’t expect anything to happen, but when I clicked the submit…
Universal Android SSL Pinning with Frida - Under 10 Mins Guide.
https://ift.tt/2S22EoH
Submitted December 16, 2018 at 08:40AM by 0xInfection
via reddit https://ift.tt/2LoehUE
https://ift.tt/2S22EoH
Submitted December 16, 2018 at 08:40AM by 0xInfection
via reddit https://ift.tt/2LoehUE
reddit
r/netsec - Universal Android SSL Pinning with Frida - Under 10 Mins Guide.
1 vote and 0 comments so far on Reddit
Multilateration in 2D: IoT/LoRaWAN Mass Surveillance in Python
https://ift.tt/2CfwHnF
Submitted December 16, 2018 at 11:46AM by jurasofish
via reddit https://ift.tt/2GiGz3P
https://ift.tt/2CfwHnF
Submitted December 16, 2018 at 11:46AM by jurasofish
via reddit https://ift.tt/2GiGz3P
GitHub
jurasofish/multilateration
Draw loci corresponding to radio transmission multilateration - jurasofish/multilateration
Übersicht Remote Code Execution, Spotify takeover: on the security implications of locally hosted web services
https://ift.tt/2RZ4U08
Submitted December 16, 2018 at 07:13PM by Zemnmez
via reddit https://ift.tt/2Cg1nEZ
https://ift.tt/2RZ4U08
Submitted December 16, 2018 at 07:13PM by Zemnmez
via reddit https://ift.tt/2Cg1nEZ
Medium
Übersicht Remote Code Execution, Spotify takeover
some words on the security implications of locally hosted web services
Infosec traditionally neglected vulnerable users and it’s beginning to change
https://ift.tt/2BsAlZs
Submitted December 16, 2018 at 08:31PM by yesnoornext
via reddit https://ift.tt/2EyFQdd
https://ift.tt/2BsAlZs
Submitted December 16, 2018 at 08:31PM by yesnoornext
via reddit https://ift.tt/2EyFQdd
threader.app
A thread written by @random_walker
The field of computer security has military origins, and focuses on defending expert users from powerful adversaries. Traditionally there’s been little attention to the security needs of the most vulnerable. But that’s started to change recently. [Thread]
Pass-the-Cache to Domain Compromise
https://ift.tt/2R2OR4g
Submitted December 17, 2018 at 07:00AM by CaptMeelo
via reddit https://ift.tt/2CgF6qJ
https://ift.tt/2R2OR4g
Submitted December 17, 2018 at 07:00AM by CaptMeelo
via reddit https://ift.tt/2CgF6qJ
Medium
Pass-the-Cache to Domain Compromise
This post is going to go over a very quick domain compromise by abusing cached Kerberos tickets discovered on a Linux-based jump-box…
Audio Based Deep Learning Password Detection
https://ift.tt/2CiFLYV
Submitted December 17, 2018 at 07:24AM by superhexi
via reddit https://ift.tt/2BnjJSY
https://ift.tt/2CiFLYV
Submitted December 17, 2018 at 07:24AM by superhexi
via reddit https://ift.tt/2BnjJSY
The Tech Nugget
Why Neural Networks Mean That Your Password is Worthless - The Tech Nugget
No matter how secure your password might be, deep learning and neural networks with audio detection techniques could mean you are vulnerable!
Hack The Box - Waldo write-up by 0xRick
https://ift.tt/2PHaO44
Submitted December 17, 2018 at 04:53PM by Ahm3d_H3sham
via reddit https://ift.tt/2UKiDtk
https://ift.tt/2PHaO44
Submitted December 17, 2018 at 04:53PM by Ahm3d_H3sham
via reddit https://ift.tt/2UKiDtk
0xrick.github.io
Hack The Box - Waldo
Quick Summary
Waldo was a great box and what makes it special is its unique way in getting the root flag. Every step with this box was very fun and I liked this box too much.
It’s a linux box and its ip is 10.10.10.87 so let’s jump right in
Nmap
Starting…
Waldo was a great box and what makes it special is its unique way in getting the root flag. Every step with this box was very fun and I liked this box too much.
It’s a linux box and its ip is 10.10.10.87 so let’s jump right in
Nmap
Starting…
Code Execution via Paste and Deserialization
https://ift.tt/2R3zys4
Submitted December 17, 2018 at 05:40PM by CaptMeelo
via reddit https://ift.tt/2CisQWI
https://ift.tt/2R3zys4
Submitted December 17, 2018 at 05:40PM by CaptMeelo
via reddit https://ift.tt/2CisQWI
The Return of The Charming Kitten
https://ift.tt/2RSEwVn
Submitted December 17, 2018 at 06:34PM by CaptMeelo
via reddit https://ift.tt/2Btatgm
https://ift.tt/2RSEwVn
Submitted December 17, 2018 at 06:34PM by CaptMeelo
via reddit https://ift.tt/2Btatgm
Certfa
The Return of The Charming Kitten - Certfa Blog
Phishing attacks are the most common form of infiltration used by Iranian state-backed hackers to gain access into accounts. Certfa reviews the latest campaign of phishing attacks that has been carried out and dubbed as “The Return of The Charming Kitten”.
ThunderDNS: How does the new DNS tunnel tool work
https://ift.tt/2BlMEqy
Submitted December 17, 2018 at 08:46PM by cyberpunkych
via reddit https://ift.tt/2LlHpfa
https://ift.tt/2BlMEqy
Submitted December 17, 2018 at 08:46PM by cyberpunkych
via reddit https://ift.tt/2LlHpfa
FBK CyberSecurity
ThunderDNS: How it works
Greetings! During penetration testing projects we often encounter tightly segmented networks that are almost completely isolated from the outside world. Sometimes, to solve this problem it is required of us to forward traffic through the only available protocol…