PowerShell Downloader - Emotet
http://bit.ly/2WaBHBZ
Submitted January 21, 2019 at 07:48PM by m_edmondson
via reddit http://bit.ly/2R4pQl5
http://bit.ly/2WaBHBZ
Submitted January 21, 2019 at 07:48PM by m_edmondson
via reddit http://bit.ly/2R4pQl5
Marcus Edmondson | Malware Analysis | Security Analytics
PowerShell Downloader – Emotet
Today I wanted to do a real quick post on a PowerShell downloader linked to Emotet. Here is a little background on what Emotet is according to Malwarebytes: Emotet is a Trojan that is primarily spr…
Unpatched Apache use after free bug infos / ASAN stack traces
http://bit.ly/2FF0EAb
Submitted January 21, 2019 at 09:09PM by KernelJay
via reddit http://bit.ly/2FE42eJ
http://bit.ly/2FF0EAb
Submitted January 21, 2019 at 09:09PM by KernelJay
via reddit http://bit.ly/2FE42eJ
GitHub
hannob/apache-uaf
Apache use after free bug infos / ASAN stack traces - hannob/apache-uaf
Packet Editing Live Connections with Python
http://bit.ly/2RHxiYB
Submitted January 22, 2019 at 08:56AM by netsecfriends
via reddit http://bit.ly/2FRRq2T
http://bit.ly/2RHxiYB
Submitted January 22, 2019 at 08:56AM by netsecfriends
via reddit http://bit.ly/2FRRq2T
Medium
Packet Editing Live Connections with Python
When I was a kid I played a lot of a game called Runescape. For those of you unaware, this is a Massive Multiplayer Online Roleplaying…
Abusing Exchange: One API call away from Domain Admin
http://bit.ly/2DqEhMH
Submitted January 22, 2019 at 01:00PM by dirkjanm
via reddit http://bit.ly/2UbE2L7
http://bit.ly/2DqEhMH
Submitted January 22, 2019 at 01:00PM by dirkjanm
via reddit http://bit.ly/2UbE2L7
dirkjanm.io
Abusing Exchange: One API call away from Domain Admin
In most organisations using Active Directory and Exchange, Exchange servers have such high privileges that being an Administrator on an Exchange server is enough to escalate to Domain Admin. Recently I came across a blog from the ZDI, in which they detail…
Evilginx 2.3.0 "Phisherman's Dream" Update - 2FA bypassing reverse proxy phishing framework (Tool)
http://bit.ly/2HnuKKl
Submitted January 22, 2019 at 04:11PM by kgretzky
via reddit http://bit.ly/2DrosoT
http://bit.ly/2HnuKKl
Submitted January 22, 2019 at 04:11PM by kgretzky
via reddit http://bit.ly/2DrosoT
reddit
r/netsec - Evilginx 2.3.0 "Phisherman's Dream" Update - 2FA bypassing reverse proxy phishing framework (Tool)
1 vote and 0 comments so far on Reddit
One... Two... Three Micropatches For Three Windows 0days
http://bit.ly/2WcxflV
Submitted January 22, 2019 at 05:32PM by dielel
via reddit http://bit.ly/2RGLTDC
http://bit.ly/2WcxflV
Submitted January 22, 2019 at 05:32PM by dielel
via reddit http://bit.ly/2RGLTDC
0Patch
One... Two... Three Micropatches For Three Windows 0days
A Short Micropatching Trilogy by Mitja Kolsek, the 0patch Team While we're busy ironing out the wrinkles before 0patch finally exits i...
ANALYSIS OF THE AMCACHE - by Blanche Lagny - ANSSI (CERT-FR)
http://bit.ly/2MpJTtr
Submitted January 22, 2019 at 07:59PM by spread_awareness
via reddit http://bit.ly/2RJvZIC
http://bit.ly/2MpJTtr
Submitted January 22, 2019 at 07:59PM by spread_awareness
via reddit http://bit.ly/2RJvZIC
SSRF’s up! Real World Server-Side Request Forgery
http://bit.ly/2MpvmxU
Submitted January 22, 2019 at 08:25PM by vonpecker
via reddit http://bit.ly/2U7CDVB
http://bit.ly/2MpvmxU
Submitted January 22, 2019 at 08:25PM by vonpecker
via reddit http://bit.ly/2U7CDVB
Shorebreak Security, Inc
SSRF’s up! Real World Server-Side Request Forgery (SSRF)
In this blog post we’re going to explain what an SSRF attack is, how to test for it, and some basic guidelines on how to fix it
Rooting Nagios Via Outdated Libraries
http://bit.ly/2DrzDy4
Submitted January 22, 2019 at 08:10PM by chicksdigthelongrun
via reddit http://bit.ly/2U6T6ti
http://bit.ly/2DrzDy4
Submitted January 22, 2019 at 08:10PM by chicksdigthelongrun
via reddit http://bit.ly/2U6T6ti
Medium
Rooting Nagios Via Outdated Libraries
Nagios XI vulnerable since 2012
winPortPush - A PowerShell Utility for Pivoting into Internal Networks via a Compromised Windows Host
http://bit.ly/2AV8RfK
Submitted January 22, 2019 at 09:17PM by kindredsec
via reddit http://bit.ly/2T85XLF
http://bit.ly/2AV8RfK
Submitted January 22, 2019 at 09:17PM by kindredsec
via reddit http://bit.ly/2T85XLF
GitHub
itsKindred/winPortPush
A simple PowerShell utility used for pivoting into internal networks via a compromised Windows host. - itsKindred/winPortPush
checking keepass against PwnedPasswords
http://bit.ly/2Mpbfjp
Submitted January 22, 2019 at 11:35PM by skewlboy
via reddit http://bit.ly/2sFKrlO
http://bit.ly/2Mpbfjp
Submitted January 22, 2019 at 11:35PM by skewlboy
via reddit http://bit.ly/2sFKrlO
GitHub
fopina/kdbxpasswordpwned
Check keepass passwords against https://haveibeenpwned.com/Passwords - fopina/kdbxpasswordpwned
Atlantic Security Conference (AtlSecCon) Call for Papers
EVENT DATEThe Atlantic Security Conference (AtlSecCon) will take place April 24th & 25th, 2019 at the Halifax Convention Centre in Halifax, Nova Scotia, Canada.ABOUT USAtlSecCon, is the first non-profit security conference in Atlantic Canada focusing on bringing some of the world’s brightest and darkest minds together with one common goal – to expand the pool of IT Security knowledge beyond its typical confines.The conference runs for two days and features a diverse selection of presentations prepared by experienced professionals. Multiple presentation tracks are available. Three open for vendor neutral and one track to talk about your next-gen, HD 1080p 4k, 2nd edition, advanced APT product/service.AtlSecCon provides an unmatched opportunity for anyone from Students and IT Professionals, to Managers and C-level folks to collaborate with their peers and learn from the leading industry experts.We look for speakers that are true security professionals, with a depth of understanding on topics that matter and want to teach others.SPEAKER PERKSAll speakers will be given free admission to the 2 day conference, access to the VIP lounge and admission to the speaker’s dinner and after party.SELECTION INFORMATIONThe AtlSecCon board of directors carefully selects talks based on interest and value it may bring to the community. Not sure about your talk? Only one way to find out!Successful speakers will be notified via email as papers are received and selected. Get your papers in soon!October 1st, 2018 – CFP openDecember 31st, 2018 – CFP round 1 complete, speaker announcements madeJanuary 1st, 2019 – CFP round 2 startsFebruary 28th, 2019 – CFP closed, final speaker announcements madeApril 24th & 25th – AtlSecCon 2019!More Info and Submit: https://atlseccon.com/cfp
Submitted January 21, 2019 at 09:53PM by AtlSecCon
via reddit http://bit.ly/2Tds03P
EVENT DATEThe Atlantic Security Conference (AtlSecCon) will take place April 24th & 25th, 2019 at the Halifax Convention Centre in Halifax, Nova Scotia, Canada.ABOUT USAtlSecCon, is the first non-profit security conference in Atlantic Canada focusing on bringing some of the world’s brightest and darkest minds together with one common goal – to expand the pool of IT Security knowledge beyond its typical confines.The conference runs for two days and features a diverse selection of presentations prepared by experienced professionals. Multiple presentation tracks are available. Three open for vendor neutral and one track to talk about your next-gen, HD 1080p 4k, 2nd edition, advanced APT product/service.AtlSecCon provides an unmatched opportunity for anyone from Students and IT Professionals, to Managers and C-level folks to collaborate with their peers and learn from the leading industry experts.We look for speakers that are true security professionals, with a depth of understanding on topics that matter and want to teach others.SPEAKER PERKSAll speakers will be given free admission to the 2 day conference, access to the VIP lounge and admission to the speaker’s dinner and after party.SELECTION INFORMATIONThe AtlSecCon board of directors carefully selects talks based on interest and value it may bring to the community. Not sure about your talk? Only one way to find out!Successful speakers will be notified via email as papers are received and selected. Get your papers in soon!October 1st, 2018 – CFP openDecember 31st, 2018 – CFP round 1 complete, speaker announcements madeJanuary 1st, 2019 – CFP round 2 startsFebruary 28th, 2019 – CFP closed, final speaker announcements madeApril 24th & 25th – AtlSecCon 2019!More Info and Submit: https://atlseccon.com/cfp
Submitted January 21, 2019 at 09:53PM by AtlSecCon
via reddit http://bit.ly/2Tds03P
Halifaxconventioncentre
Halifax Convention Centre
We’re here to make your planning and event experience seamless and straightforward.
Remote Code Execution in apt/apt-get
http://bit.ly/2sGxNmI
Submitted January 22, 2019 at 10:31PM by EvanConover
via reddit http://bit.ly/2AZnFtG
http://bit.ly/2sGxNmI
Submitted January 22, 2019 at 10:31PM by EvanConover
via reddit http://bit.ly/2AZnFtG
justi.cz
Remote Code Execution in apt/apt-get
tl;dr I found a vulnerability in apt that allows a network man-in-the-middle (or a malicious package mirror) to execute arbitrary code as root on a machine i...
Recovering the AES key on a Cortex-M3 processor with emusca, using @Unicorn_Engine and Daredevil, by @jevinskie « Adafruit Industries
http://bit.ly/2sDIGpg
Submitted January 23, 2019 at 02:11AM by digicat
via reddit http://bit.ly/2U9cK7M
http://bit.ly/2sDIGpg
Submitted January 23, 2019 at 02:11AM by digicat
via reddit http://bit.ly/2U9cK7M
Adafruit Industries - Makers, hackers, artists, designers and engineers!
Recovering the AES key on a Cortex-M3 processor with emusca, using @Unicorn_Engine and Daredevil, by @jevinskie
Unicorn Engine is a powerful, lightweight multi-platform, multi-architecture CPU emulator framework. It simulates multiple architectures including Arm, Arm64 (Armv8), M68K, Mips, Sparc, & X86 (…
Abusing Office Web Add-ins (for fun and limited profit) – MDSec
http://bit.ly/2CD3wtC
Submitted January 23, 2019 at 02:03AM by AVERAGE_TEST_DUMMY
via reddit http://bit.ly/2FSKSkH
http://bit.ly/2CD3wtC
Submitted January 23, 2019 at 02:03AM by AVERAGE_TEST_DUMMY
via reddit http://bit.ly/2FSKSkH
www.mdsec.co.uk
Abusing Office Web Add-ins (for fun and limited profit) – MDSec
Break Free - Escaping Restricted Environments and Bypassing DLP
http://bit.ly/2RKPqkj
Submitted January 23, 2019 at 04:32AM by 15charisnoteno
via reddit http://bit.ly/2DuM4sP
http://bit.ly/2RKPqkj
Submitted January 23, 2019 at 04:32AM by 15charisnoteno
via reddit http://bit.ly/2DuM4sP
SIXGEN | United States| Full Spectrum Cybersecurity Solutions
BreakFree
Escaping Restricted Environments and Bypassing DLP I recently completed a “Purple Team” engagement (where a Red team works with a Blue team to demonstrate techn...
CVE-2019-6260: Gaining control of BMC from the host processor
http://bit.ly/2S0L5Zv
Submitted January 23, 2019 at 06:56AM by ajdlinux
via reddit http://bit.ly/2FHyqEW
http://bit.ly/2S0L5Zv
Submitted January 23, 2019 at 06:56AM by ajdlinux
via reddit http://bit.ly/2FHyqEW
Ramblings
CVE-2019-6260: Gaining control of BMC from the host processor
This is details for CVE-2019-6260 – which has been nicknamed “pantsdown” due to the nature of feeling that we feel that we’ve “caught chunks of the industry with their…
CISA Emergency Directive on DNS Infrastructure Tampering
http://bit.ly/2R6GeS3
Submitted January 23, 2019 at 06:42AM by watusa
via reddit http://bit.ly/2sC6H02
http://bit.ly/2R6GeS3
Submitted January 23, 2019 at 06:42AM by watusa
via reddit http://bit.ly/2sC6H02
www.us-cert.gov
CISA Emergency Directive on DNS Infrastructure Tampering | US-CERT
The U.S. Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive to address ongoing incidents associated with global Domain Name System (DNS) infrastructure tampering.
Phishing Quiz Made by Google
http://bit.ly/2S0UH6p
Submitted January 23, 2019 at 08:54AM by CaptMeelo
via reddit http://bit.ly/2CAYQo0
http://bit.ly/2S0UH6p
Submitted January 23, 2019 at 08:54AM by CaptMeelo
via reddit http://bit.ly/2CAYQo0
Withgoogle
Phishing Quiz
Founder of Snort, Marty Roesch is leaving Cisco
http://bit.ly/2TdmD4F
Submitted January 23, 2019 at 10:05AM by techky
via reddit http://bit.ly/2TcToyU
http://bit.ly/2TdmD4F
Submitted January 23, 2019 at 10:05AM by techky
via reddit http://bit.ly/2TcToyU
Medium
Charting a New Course
The Next Chapter of My Journey
Contextualizing Attacker Activity within Sessions in Exchange Online - Using Audit to Track Attackers
http://bit.ly/2RZVwg2
Submitted January 23, 2019 at 11:11AM by shehackspurple
via reddit http://bit.ly/2T6YkVS
http://bit.ly/2RZVwg2
Submitted January 23, 2019 at 11:11AM by shehackspurple
via reddit http://bit.ly/2T6YkVS
reddit
r/netsec - Contextualizing Attacker Activity within Sessions in Exchange Online - Using Audit to Track Attackers
3 votes and 0 comments so far on Reddit