Metasploit Framework 5.0 Released
http://bit.ly/2CdXKy9
Submitted January 11, 2019 at 07:31PM by DemanHD
via reddit http://bit.ly/2VKiGWH
http://bit.ly/2CdXKy9
Submitted January 11, 2019 at 07:31PM by DemanHD
via reddit http://bit.ly/2VKiGWH
Rapid7 Blog
Metasploit Framework 5.0 Released
We are happy to announce the release of Metasploit 5.0, the culmination of work by the Metasploit team over the past year.
Ryuk Ransomware Attack: Rush to Attribution Misses the Point
http://bit.ly/2LY76CC
Submitted January 11, 2019 at 09:21PM by EvanConover
via reddit http://bit.ly/2M6TC7N
http://bit.ly/2LY76CC
Submitted January 11, 2019 at 09:21PM by EvanConover
via reddit http://bit.ly/2M6TC7N
McAfee Blogs
Ryuk Ransomware Attack: Rush to Attribution Misses the Point | McAfee Blogs
Senior analyst Ryan Sherstobitoff contributed to this report. During the past week, an outbreak of Ryuk ransomware that impeded newspaper printing
ChaosKey - hardware True Random Number Generator that attaches via USB
http://bit.ly/2k4DWat
Submitted January 11, 2019 at 11:19PM by drspeaker
via reddit http://bit.ly/2Rlahu9
http://bit.ly/2k4DWat
Submitted January 11, 2019 at 11:19PM by drspeaker
via reddit http://bit.ly/2Rlahu9
reddit
r/netsec - ChaosKey - hardware True Random Number Generator that attaches via USB
1 vote and 0 comments so far on Reddit
CackalackyCon Call for Papers is Open
Greetingz to all h4x0rs, breakers, clickers and scrollers, g33k girls, and cyber pathologists!WHAT: CackalackyCon Call for Papers
WHEN: CackalackyCon will happen on May 31st - June 2nd, 2019WHERE: The Sheraton Chapel Hill, NC
HOW: Complete the form and email it to cfp at cackalackycon.org
DEADLINES: First round submissions are due by Feb 28th, 2019. Final round submissions are due by Mar 31st, 2019.CackalackyCon will occur on May 31st - June 2nd, 2019. Our Call for Papers is now officially open! Please review the information below for instructions on submitting your talk ideas. If you have any questions about the CFP process please email cfp at cackalackycon.orgIf you know a thing about hackalacking, hijackalacking network traffic, attackalacking physical security measures, robotics, or unpackalacking malware, etc., and you are interested in presenting at CackalackyCon, we cordially invite you to submit your proposal. Our goal is to put on a conference with a wide range of talks at different levels of knowledge. We are looking forward to reviewing your talk ideas!CFP FormThis year we will be reviewing submissions in two rounds. The earlier you submit, the higher your chances are at being selected and the more time you have to procrastinate working on your talk!
First round submissions are due by Feb 28th, 2019 before midnight EST.
Final submissions are due by Mar 31st, 2019 before midnight EST.If you present at the Con, you will receive;
*Free Cackalacky admission for you and one guest
*One free CackalackyCon shirt
*Unlimited fist bumps from our staff
*A reputation, but not necessarily a good oneAfter selection, CackalackyCon will publish the following information to the website:
*Presentation noscript
*Presentation abstract
*Presenter names or handles
*Presenter biosThanks for your submission! We wouldn’t be a con without you!
Signed,
The CackalackyCon CrewCackalackyCon.org
Submitted January 11, 2019 at 09:38PM by Curbob
via reddit http://bit.ly/2smsNDJ
Greetingz to all h4x0rs, breakers, clickers and scrollers, g33k girls, and cyber pathologists!WHAT: CackalackyCon Call for Papers
WHEN: CackalackyCon will happen on May 31st - June 2nd, 2019WHERE: The Sheraton Chapel Hill, NC
HOW: Complete the form and email it to cfp at cackalackycon.org
DEADLINES: First round submissions are due by Feb 28th, 2019. Final round submissions are due by Mar 31st, 2019.CackalackyCon will occur on May 31st - June 2nd, 2019. Our Call for Papers is now officially open! Please review the information below for instructions on submitting your talk ideas. If you have any questions about the CFP process please email cfp at cackalackycon.orgIf you know a thing about hackalacking, hijackalacking network traffic, attackalacking physical security measures, robotics, or unpackalacking malware, etc., and you are interested in presenting at CackalackyCon, we cordially invite you to submit your proposal. Our goal is to put on a conference with a wide range of talks at different levels of knowledge. We are looking forward to reviewing your talk ideas!CFP FormThis year we will be reviewing submissions in two rounds. The earlier you submit, the higher your chances are at being selected and the more time you have to procrastinate working on your talk!
First round submissions are due by Feb 28th, 2019 before midnight EST.
Final submissions are due by Mar 31st, 2019 before midnight EST.If you present at the Con, you will receive;
*Free Cackalacky admission for you and one guest
*One free CackalackyCon shirt
*Unlimited fist bumps from our staff
*A reputation, but not necessarily a good oneAfter selection, CackalackyCon will publish the following information to the website:
*Presentation noscript
*Presentation abstract
*Presenter names or handles
*Presenter biosThanks for your submission! We wouldn’t be a con without you!
Signed,
The CackalackyCon CrewCackalackyCon.org
Submitted January 11, 2019 at 09:38PM by Curbob
via reddit http://bit.ly/2smsNDJ
reddit
r/netsec - CackalackyCon Call for Papers is Open
1 vote and 0 comments so far on Reddit
Threat Actor “Cold River”: Network Traffic Analysis and a Deep Dive on Agent Drable
http://bit.ly/2FnCIBr
Submitted January 12, 2019 at 12:59AM by teksquisite
via reddit http://bit.ly/2smRAaD
http://bit.ly/2FnCIBr
Submitted January 12, 2019 at 12:59AM by teksquisite
via reddit http://bit.ly/2smRAaD
Lastline
Threat Actor “Cold River”: Network Traffic Analysis and a Deep Dive on Agent Drable
Cold River is a sophisticated threat actor making malicious use of DNS tunneling for command and control activities, compelling lure documents, and previously unknown implants. Read our detailed analysis.
Capture The Flag! Here's how to get started with CTFs.
http://bit.ly/2Rhol85
Submitted January 12, 2019 at 12:57AM by teksquisite
via reddit http://bit.ly/2sws4jr
http://bit.ly/2Rhol85
Submitted January 12, 2019 at 12:57AM by teksquisite
via reddit http://bit.ly/2sws4jr
Lastline
Capture That Flag!
Participating in hacking competitions – aka, Capture the Flag – improves security culture and the talent of the security team. Learn how to think like a hacker in order to defeat hackers.
Hack The Box - Oz write-up by 0xRick
http://bit.ly/2ABXXLN
Submitted January 12, 2019 at 08:14PM by Ahm3d_H3sham
via reddit http://bit.ly/2SQcLgZ
http://bit.ly/2ABXXLN
Submitted January 12, 2019 at 08:14PM by Ahm3d_H3sham
via reddit http://bit.ly/2SQcLgZ
0xRick Owned Root !
Hack The Box - Oz
Quick Summary Hey I’m back with another Hack The Box write-up , this time Oz has retired and it was rated as a hard box. I enjoyed this box , it was really fun. It had some docker tricks which were very cool , It’s a linux box and it’s ip is 10.10.10.96 so…
Security Advisory SCWX-2018-001 (Vulnerability in ShoreTel Conferencing Platform)
http://bit.ly/2FuQpxx
Submitted January 12, 2019 at 09:50PM by doylersec
via reddit http://bit.ly/2Fqf72M
http://bit.ly/2FuQpxx
Submitted January 12, 2019 at 09:50PM by doylersec
via reddit http://bit.ly/2Fqf72M
Useful hacking site CHEAT SHEET. OSCP HTB
http://bit.ly/2CiSABf
Submitted January 13, 2019 at 08:38AM by bkirshe
via reddit http://bit.ly/2RnBpst
http://bit.ly/2CiSABf
Submitted January 13, 2019 at 08:38AM by bkirshe
via reddit http://bit.ly/2RnBpst
Jok3r Security
Cheat Sheet
Enumeration TCP nmap -p- -T4 -n IPmasscan -p0-65535 IP -n –rate 1000 -oL masscannmap -sC -sV IP -oA nmapnetdiscover -r IPnmap –noscript smb-check-vulns.nse –noscript-args=unsafe=1 -p445 IP U…
Why you shouldn't be using Bcrypt and Scrypt.
http://bit.ly/2D5yX1d
Submitted January 13, 2019 at 07:57AM by neverforgetdream
via reddit http://bit.ly/2D6SzBU
http://bit.ly/2D5yX1d
Submitted January 13, 2019 at 07:57AM by neverforgetdream
via reddit http://bit.ly/2D6SzBU
reddit
r/netsec - Why you shouldn't be using Bcrypt and Scrypt.
0 votes and 8 comments so far on Reddit
NFC Payments: Relay Attacks with LoRa
http://bit.ly/2TKeFja
Submitted January 13, 2019 at 03:39PM by xenexfor
via reddit http://bit.ly/2M51bf6
http://bit.ly/2TKeFja
Submitted January 13, 2019 at 03:39PM by xenexfor
via reddit http://bit.ly/2M51bf6
Salvador Mendoza
NFC Payments: Relay Attacks with LoRa
Intro This is a second post relating relay attacks. Initially, I wrote a small introduction to “local” relay against NFC Payments using the RFIDIot library. In this post, we will use th…
paypal.gift – About Domain Validation and Padlocks
https://paypal.gift
Submitted January 14, 2019 at 12:43AM by _jomo
via reddit http://bit.ly/2Cn7o1t
https://paypal.gift
Submitted January 14, 2019 at 12:43AM by _jomo
via reddit http://bit.ly/2Cn7o1t
paypal.gift
About Domain Validation and Padlocks
The padlock does not mean that the website is safe to use
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale « Global DNS Hijacking Campaign: DNS Record Manipulation at Scale
http://bit.ly/2QDUmlH
Submitted January 14, 2019 at 04:10AM by tenzin
via reddit http://bit.ly/2QKwo83
http://bit.ly/2QDUmlH
Submitted January 14, 2019 at 04:10AM by tenzin
via reddit http://bit.ly/2QKwo83
FireEye
Global DNS Hijacking Campaign: DNS Record Manipulation at Scale « Global DNS Hijacking Campaign: DNS Record Manipulation at Scale
We detail three different ways we have seen DNS records be manipulated to enable victim compromises.
Gaining access to Uber's user data through AMPScript evaluation
http://bit.ly/2M8dhV0
Submitted January 14, 2019 at 06:49PM by Mempodipper
via reddit http://bit.ly/2TRctGJ
http://bit.ly/2M8dhV0
Submitted January 14, 2019 at 06:49PM by Mempodipper
via reddit http://bit.ly/2TRctGJ
Someone bypassed Crowdstrike Falcon
http://bit.ly/2VPSv0F
Submitted January 14, 2019 at 08:06PM by nyxx88
via reddit http://bit.ly/2RMNO8K
http://bit.ly/2VPSv0F
Submitted January 14, 2019 at 08:06PM by nyxx88
via reddit http://bit.ly/2RMNO8K
reddit
r/netsec - Someone bypassed Crowdstrike Falcon
1 vote and 0 comments so far on Reddit
Trumping Physical Security with Software Insecurity
http://bit.ly/2H9mxZV
Submitted January 14, 2019 at 07:59PM by chicksdigthelongrun
via reddit http://bit.ly/2RRSoCy
http://bit.ly/2H9mxZV
Submitted January 14, 2019 at 07:59PM by chicksdigthelongrun
via reddit http://bit.ly/2RRSoCy
Medium
Trumping Physical Security with Software Insecurity
I‘m in your base attacking your badges.
On Bounties and Boffins
http://bit.ly/2SYN6Tr
Submitted January 14, 2019 at 10:36PM by yossarian_flew_away
via reddit http://bit.ly/2Rqcrc2
http://bit.ly/2SYN6Tr
Submitted January 14, 2019 at 10:36PM by yossarian_flew_away
via reddit http://bit.ly/2Rqcrc2
Trail of Bits Blog
On Bounties and Boffins
Trying to make a living as a programmer participating in bug bounties is the same as convincing yourself that you’re good enough at Texas Hold ‘Em to quit your job. There’s data to back this up in …
Exposed JIRA server leaks NASA staff and project data
http://bit.ly/2CkF8N9
Submitted January 14, 2019 at 10:36PM by dXNlcg--
via reddit http://bit.ly/2Rt8dAx
http://bit.ly/2CkF8N9
Submitted January 14, 2019 at 10:36PM by dXNlcg--
via reddit http://bit.ly/2Rt8dAx
Medium
Exposed JIRA server leaks NASA staff and project data!
Here, I’ll be talking about an interesting vulnerability that I have found in NASA Jira (An Atlassian task tracking systems/project management software etc.).
Big Game Hunting with Ryuk: Another Lucrative Targeted Ransomware
http://bit.ly/2FopvY4
Submitted January 14, 2019 at 10:00PM by EvanConover
via reddit http://bit.ly/2D7Z3k2
http://bit.ly/2FopvY4
Submitted January 14, 2019 at 10:00PM by EvanConover
via reddit http://bit.ly/2D7Z3k2
Crowdstrike
What is Ryuk Ransomware? The Complete Breakdown
Since August 2018, Ryuk Ransomware has been used to target enterprise environments. Threat actors operating it have netted over $3,701,893.98 USD to date.
Enabling the Undocumented Adminless Mode on Windows 10 SMode
http://bit.ly/2QNhvlz
Submitted January 14, 2019 at 05:12AM by tiraniddo
via reddit http://bit.ly/2Cm2B0x
http://bit.ly/2QNhvlz
Submitted January 14, 2019 at 05:12AM by tiraniddo
via reddit http://bit.ly/2Cm2B0x
Blogspot
Enabling Adminless Mode on Windows 10 SMode
Microsoft has always been pretty terrible at documenting new and interesting features for their System Integrity Policy used to enable secur...
Buffer Overflow Practical Examples , Exploiting EIP
http://bit.ly/2TQPGuE
Submitted January 14, 2019 at 11:25PM by Ahm3d_H3sham
via reddit http://bit.ly/2Co99vB
http://bit.ly/2TQPGuE
Submitted January 14, 2019 at 11:25PM by Ahm3d_H3sham
via reddit http://bit.ly/2Co99vB
0xRick Owned Root !
Buffer Overflow Practical Examples , Exploiting EIP - protostar stack4
Introduction Hey again ,Today’s article is going to be short. So last time I solved stack3 , I’m back again and today I’m going to solve stack4 which is really interesting , it’s slightly different from stack3 but that difference is a new thing to see if…