XSSing Google Code-in thanks to improperly escaped JSON data
https://ift.tt/2R0zQ2y
Submitted December 16, 2018 at 02:41AM by ThomasCZ
via reddit https://ift.tt/2QDCZX2
https://ift.tt/2R0zQ2y
Submitted December 16, 2018 at 02:41AM by ThomasCZ
via reddit https://ift.tt/2QDCZX2
Thomas Orlita's blog
XSSing Google Code-in thanks to improperly escaped JSON data - Thomas Orlita's blog
Google Code-in is an online programming competition for students hosted by Google that takes place every year. When I was singing up for a second time, I put a payload into all the text fields. I didn’t expect anything to happen, but when I clicked the submit…
Universal Android SSL Pinning with Frida - Under 10 Mins Guide.
https://ift.tt/2S22EoH
Submitted December 16, 2018 at 08:40AM by 0xInfection
via reddit https://ift.tt/2LoehUE
https://ift.tt/2S22EoH
Submitted December 16, 2018 at 08:40AM by 0xInfection
via reddit https://ift.tt/2LoehUE
reddit
r/netsec - Universal Android SSL Pinning with Frida - Under 10 Mins Guide.
1 vote and 0 comments so far on Reddit
Multilateration in 2D: IoT/LoRaWAN Mass Surveillance in Python
https://ift.tt/2CfwHnF
Submitted December 16, 2018 at 11:46AM by jurasofish
via reddit https://ift.tt/2GiGz3P
https://ift.tt/2CfwHnF
Submitted December 16, 2018 at 11:46AM by jurasofish
via reddit https://ift.tt/2GiGz3P
GitHub
jurasofish/multilateration
Draw loci corresponding to radio transmission multilateration - jurasofish/multilateration
Übersicht Remote Code Execution, Spotify takeover: on the security implications of locally hosted web services
https://ift.tt/2RZ4U08
Submitted December 16, 2018 at 07:13PM by Zemnmez
via reddit https://ift.tt/2Cg1nEZ
https://ift.tt/2RZ4U08
Submitted December 16, 2018 at 07:13PM by Zemnmez
via reddit https://ift.tt/2Cg1nEZ
Medium
Übersicht Remote Code Execution, Spotify takeover
some words on the security implications of locally hosted web services
Infosec traditionally neglected vulnerable users and it’s beginning to change
https://ift.tt/2BsAlZs
Submitted December 16, 2018 at 08:31PM by yesnoornext
via reddit https://ift.tt/2EyFQdd
https://ift.tt/2BsAlZs
Submitted December 16, 2018 at 08:31PM by yesnoornext
via reddit https://ift.tt/2EyFQdd
threader.app
A thread written by @random_walker
The field of computer security has military origins, and focuses on defending expert users from powerful adversaries. Traditionally there’s been little attention to the security needs of the most vulnerable. But that’s started to change recently. [Thread]
Pass-the-Cache to Domain Compromise
https://ift.tt/2R2OR4g
Submitted December 17, 2018 at 07:00AM by CaptMeelo
via reddit https://ift.tt/2CgF6qJ
https://ift.tt/2R2OR4g
Submitted December 17, 2018 at 07:00AM by CaptMeelo
via reddit https://ift.tt/2CgF6qJ
Medium
Pass-the-Cache to Domain Compromise
This post is going to go over a very quick domain compromise by abusing cached Kerberos tickets discovered on a Linux-based jump-box…
Audio Based Deep Learning Password Detection
https://ift.tt/2CiFLYV
Submitted December 17, 2018 at 07:24AM by superhexi
via reddit https://ift.tt/2BnjJSY
https://ift.tt/2CiFLYV
Submitted December 17, 2018 at 07:24AM by superhexi
via reddit https://ift.tt/2BnjJSY
The Tech Nugget
Why Neural Networks Mean That Your Password is Worthless - The Tech Nugget
No matter how secure your password might be, deep learning and neural networks with audio detection techniques could mean you are vulnerable!
Hack The Box - Waldo write-up by 0xRick
https://ift.tt/2PHaO44
Submitted December 17, 2018 at 04:53PM by Ahm3d_H3sham
via reddit https://ift.tt/2UKiDtk
https://ift.tt/2PHaO44
Submitted December 17, 2018 at 04:53PM by Ahm3d_H3sham
via reddit https://ift.tt/2UKiDtk
0xrick.github.io
Hack The Box - Waldo
Quick Summary
Waldo was a great box and what makes it special is its unique way in getting the root flag. Every step with this box was very fun and I liked this box too much.
It’s a linux box and its ip is 10.10.10.87 so let’s jump right in
Nmap
Starting…
Waldo was a great box and what makes it special is its unique way in getting the root flag. Every step with this box was very fun and I liked this box too much.
It’s a linux box and its ip is 10.10.10.87 so let’s jump right in
Nmap
Starting…
Code Execution via Paste and Deserialization
https://ift.tt/2R3zys4
Submitted December 17, 2018 at 05:40PM by CaptMeelo
via reddit https://ift.tt/2CisQWI
https://ift.tt/2R3zys4
Submitted December 17, 2018 at 05:40PM by CaptMeelo
via reddit https://ift.tt/2CisQWI
The Return of The Charming Kitten
https://ift.tt/2RSEwVn
Submitted December 17, 2018 at 06:34PM by CaptMeelo
via reddit https://ift.tt/2Btatgm
https://ift.tt/2RSEwVn
Submitted December 17, 2018 at 06:34PM by CaptMeelo
via reddit https://ift.tt/2Btatgm
Certfa
The Return of The Charming Kitten - Certfa Blog
Phishing attacks are the most common form of infiltration used by Iranian state-backed hackers to gain access into accounts. Certfa reviews the latest campaign of phishing attacks that has been carried out and dubbed as “The Return of The Charming Kitten”.
ThunderDNS: How does the new DNS tunnel tool work
https://ift.tt/2BlMEqy
Submitted December 17, 2018 at 08:46PM by cyberpunkych
via reddit https://ift.tt/2LlHpfa
https://ift.tt/2BlMEqy
Submitted December 17, 2018 at 08:46PM by cyberpunkych
via reddit https://ift.tt/2LlHpfa
FBK CyberSecurity
ThunderDNS: How it works
Greetings! During penetration testing projects we often encounter tightly segmented networks that are almost completely isolated from the outside world. Sometimes, to solve this problem it is required of us to forward traffic through the only available protocol…
Remote Bitlocker Encryption Type Report - CVE-2018-12038 Mitigation
https://ift.tt/2EqVAhw
Submitted December 17, 2018 at 09:11PM by WorkLotus
via reddit https://ift.tt/2S79l8W
https://ift.tt/2EqVAhw
Submitted December 17, 2018 at 09:11PM by WorkLotus
via reddit https://ift.tt/2S79l8W
GitHub
thom-s/remote-bitlocker-encryption-report
PowerShell noscript to mitigate CVE-2018-12038. The noscript takes a list of PC as input, gets their BitLocker encryption type remotely, and outputs a report as a CSV file - thom-s/remote-bitlocker-enc...
Cybercriminals Use Malicious Memes that Communicate with Malware
https://ift.tt/2BieRi7
Submitted December 17, 2018 at 10:10PM by EvanConover
via reddit https://ift.tt/2GlGs7y
https://ift.tt/2BieRi7
Submitted December 17, 2018 at 10:10PM by EvanConover
via reddit https://ift.tt/2GlGs7y
Trendmicro
Cybercriminals Use Malicious Memes that Communicate with Malware - TrendLabs Security Intelligence Blog
Steganography, or the method used to conceal a malicious payload inside an image to evade security solutions, has long been used by cybercriminals to spread malware and perform other malicious operations. We recently discovered malicious actors using this…
SANS Holiday Hack Challenge Discord Channel - Come learn and share ideas and tips.
https://ift.tt/2rFnxux
Submitted December 17, 2018 at 10:28PM by Belowzeroday
via reddit https://ift.tt/2S7huu2
https://ift.tt/2rFnxux
Submitted December 17, 2018 at 10:28PM by Belowzeroday
via reddit https://ift.tt/2S7huu2
Discord
Discord - Free voice and text chat for gamers
Step up your game with a modern voice & text chat app. Crystal clear voice, multiple server and channel support, mobile apps, and more. Get your free server now!
The Practical Guide to Hacking Bluetooth Low Energy
https://ift.tt/2Q7RqOt
Submitted December 17, 2018 at 10:19PM by adi0x90
via reddit https://ift.tt/2LmwSAn
https://ift.tt/2Q7RqOt
Submitted December 17, 2018 at 10:19PM by adi0x90
via reddit https://ift.tt/2LmwSAn
Attify Blog - IoT Security, Pentesting and Exploitation
The Practical Guide to Hacking Bluetooth Low Energy
Learn about various BLE vulnerabilities and the tools and techniques employed for performing attacks on Bluetooth Low Energy devices.
Inject Word documents with malicious HTML/Javanoscript (PowerShell Script)
https://ift.tt/2S3RlMM
Submitted December 17, 2018 at 11:35PM by WorkLotus
via reddit https://ift.tt/2SRChlt
https://ift.tt/2S3RlMM
Submitted December 17, 2018 at 11:35PM by WorkLotus
via reddit https://ift.tt/2SRChlt
GitHub
thom-s/docx-embeddedhtml-injection
This PowerShell noscript exploits a known vulnerability in Word 2016 documents with embedded online videos by injecting HTML code into a docx file, replacing the values of all pre-existing embeddedHt...
BMC Patrol Agent - Domain User to Domain Admin – Securifera
https://ift.tt/2SSOYN2
Submitted December 18, 2018 at 12:07AM by securifera
via reddit https://ift.tt/2BoLcno
https://ift.tt/2SSOYN2
Submitted December 18, 2018 at 12:07AM by securifera
via reddit https://ift.tt/2BoLcno
Securifera
BMC Patrol Agent - Domain User to Domain Admin – Securifera
Domain User to Domain Admin
Knowing the difference between user authentication and authorization when designing secure software can be extremely important to avoid common security pitfalls. Often times application software vendors subvert the overall security…
Knowing the difference between user authentication and authorization when designing secure software can be extremely important to avoid common security pitfalls. Often times application software vendors subvert the overall security…
WordPress Privilege Escalation through Post Types
https://ift.tt/2CjoSNO
Submitted December 18, 2018 at 01:26AM by zit-hb
via reddit https://ift.tt/2A4IqE2
https://ift.tt/2CjoSNO
Submitted December 18, 2018 at 01:26AM by zit-hb
via reddit https://ift.tt/2A4IqE2
reddit
r/netsec - WordPress Privilege Escalation through Post Types
7 votes and 0 comments so far on Reddit
SharpPack: The Insider Threat Toolkit
https://ift.tt/2LjZU3s
Submitted December 18, 2018 at 04:21AM by dmchell
via reddit https://ift.tt/2PMkjPz
https://ift.tt/2LjZU3s
Submitted December 18, 2018 at 04:21AM by dmchell
via reddit https://ift.tt/2PMkjPz
www.mdsec.co.uk
SharpPack: The Insider Threat Toolkit – MDSec
Interactive Beginner's Guide to ROP
https://ift.tt/2EyuK7Z
Submitted December 18, 2018 at 01:12PM by pgombos
via reddit https://ift.tt/2GmAHGH
https://ift.tt/2EyuK7Z
Submitted December 18, 2018 at 01:12PM by pgombos
via reddit https://ift.tt/2GmAHGH
reddit
r/netsec - Interactive Beginner's Guide to ROP
7 votes and 3 comments so far on Reddit
Guide to finding and exploiting hidden web directories and files
https://ift.tt/2BAdGe7
Submitted December 18, 2018 at 02:53PM by albinowax
via reddit https://ift.tt/2rJpAO6
https://ift.tt/2BAdGe7
Submitted December 18, 2018 at 02:53PM by albinowax
via reddit https://ift.tt/2rJpAO6
Medium
Hidden directories and files as a source of sensitive information about web application
Hidden directories and files left accidentally on the web server might be a very valuable source of sensitive information. There can be a…