Bash post-exploitation tool for Linux
http://bit.ly/2SEuqI5
Submitted January 24, 2019 at 09:53PM by bellthief
via reddit http://bit.ly/2RKNubr
http://bit.ly/2SEuqI5
Submitted January 24, 2019 at 09:53PM by bellthief
via reddit http://bit.ly/2RKNubr
GitHub
zMarch/Orc
Orc is a post-exploitation framework for Linux written in Bash - zMarch/Orc
NZ 2019 Top 10 critical controls released
http://bit.ly/2Wg8QMp
Submitted January 25, 2019 at 11:17AM by svotso
via reddit http://bit.ly/2RfIrL0
http://bit.ly/2Wg8QMp
Submitted January 25, 2019 at 11:17AM by svotso
via reddit http://bit.ly/2RfIrL0
CERT NZ
CERT NZ's critical controls 2019 | CERT NZ
CERT NZ’s ten critical controls would mitigate, or better contain, the majority of attacks we’ve seen.
Top application security news of the week.
http://bit.ly/2SbDsPQ
Submitted January 25, 2019 at 03:34PM by KeyDutch
via reddit http://bit.ly/2CIRO0s
http://bit.ly/2SbDsPQ
Submitted January 25, 2019 at 03:34PM by KeyDutch
via reddit http://bit.ly/2CIRO0s
Htbridge
Application Security Weekly Review, Week 4 2019
Mysterious attack on PHP PEAR website, hack of popular WordPress plugin maker, and privacy risks of top free VPN Android apps.
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram…
http://bit.ly/2MvBu7M
Submitted January 25, 2019 at 03:31PM by lukeberner
via reddit http://bit.ly/2RTpfrO
http://bit.ly/2MvBu7M
Submitted January 25, 2019 at 03:31PM by lukeberner
via reddit http://bit.ly/2RTpfrO
Medium
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram, Cloudflare, etc)
TL;DR: Waiting in the 2FA page could allow you to log in without knowing the current password in many major websites.
Turbo Intruder: Embracing the billion-request attack
http://bit.ly/2DyPvyM
Submitted January 25, 2019 at 04:51PM by albinowax
via reddit http://bit.ly/2FVSxPf
http://bit.ly/2DyPvyM
Submitted January 25, 2019 at 04:51PM by albinowax
via reddit http://bit.ly/2FVSxPf
portswigger.net
Turbo Intruder: Embracing the billion-request attack | Blog
Automated web application attacks are terminally limited by the number of HTTP requests they can send. It's impossible to know how many hacks have gone off the rails because you didn't quite manage to
A tool to find subdomains and interesting things like secrets hidden inside, external Javanoscript files of page, and Github.
http://bit.ly/2V085Xf
Submitted January 25, 2019 at 06:54PM by nsonaniya2010
via reddit http://bit.ly/2S6Jj9c
http://bit.ly/2V085Xf
Submitted January 25, 2019 at 06:54PM by nsonaniya2010
via reddit http://bit.ly/2S6Jj9c
GitHub
nsonaniya2010/SubDomainizer
A tool to find subdomains and interesting things hidden inside, external Javanoscript files of page, and Github. - nsonaniya2010/SubDomainizer
From Evil Printers to Parent Domain Controllers
http://bit.ly/2B1T1jC
Submitted January 25, 2019 at 08:52PM by CaptMeelo
via reddit http://bit.ly/2TgQfxS
http://bit.ly/2B1T1jC
Submitted January 25, 2019 at 08:52PM by CaptMeelo
via reddit http://bit.ly/2TgQfxS
Checkmate
Intrusion Testing – From Evil Printers to Parent Domain Controllers
Intrusion testing Recently I was engaged in a project where I was supposed to breach an organization and exfiltrate data from within the perimeter of the organization without alerting their SOC. I …
Magento – RCE & Local File Read with low privilege admin rights
http://bit.ly/2RcFudY
Submitted January 25, 2019 at 07:58PM by cbolat
via reddit http://bit.ly/2MvHqO4
http://bit.ly/2RcFudY
Submitted January 25, 2019 at 07:58PM by cbolat
via reddit http://bit.ly/2MvHqO4
reddit
r/netsec - Magento – RCE & Local File Read with low privilege admin rights
1 vote and 0 comments so far on Reddit
South Korean Android delivery apps found to be leaking passwords and financial data
http://bit.ly/2MwRshY
Submitted January 25, 2019 at 09:10PM by xxdesmus
via reddit http://bit.ly/2FMUdLv
http://bit.ly/2MwRshY
Submitted January 25, 2019 at 09:10PM by xxdesmus
via reddit http://bit.ly/2FMUdLv
Rainbowtabl.es
South Korean Android Delivery Apps Found Leaking passwords and financial data
South Korea-based Zcall Delivery Android apps are leaking delivery information, plaintext passwords, and financial information.
What the Fuzz
http://bit.ly/2FUVT56
Submitted January 25, 2019 at 09:05PM by CaptMeelo
via reddit http://bit.ly/2RPQ9R1
http://bit.ly/2FUVT56
Submitted January 25, 2019 at 09:05PM by CaptMeelo
via reddit http://bit.ly/2RPQ9R1
reddit
r/netsec - What the Fuzz
2 votes and 0 comments so far on Reddit
ThinkPHP Vulnerability Abused by Botnets Hakai and Yowai
http://bit.ly/2ROfcEb
Submitted January 25, 2019 at 09:35PM by EvanConover
via reddit http://bit.ly/2S6kf21
http://bit.ly/2ROfcEb
Submitted January 25, 2019 at 09:35PM by EvanConover
via reddit http://bit.ly/2S6kf21
Trendmicro
ThinkPHP Vulnerability Abused by Botnets Hakai and Yowai - TrendLabs Security Intelligence Blog
We found a new Mirai variant we’ve called Yowai and Gafgyt variant Hakai abusing a ThinkPHP flaw for propagation and DDoS attacks.
What the Fuzz - Introduction to Fuzzing
http://bit.ly/2FUVT56
Submitted January 24, 2019 at 06:51PM by flx1101
via reddit http://bit.ly/2CI6D3w
http://bit.ly/2FUVT56
Submitted January 24, 2019 at 06:51PM by flx1101
via reddit http://bit.ly/2CI6D3w
reddit
r/netsec - What the Fuzz - Introduction to Fuzzing
0 votes and 0 comments so far on Reddit
SnowAlert - SQL based SIEM solution running on Snowflake SaaS data warehouse
http://bit.ly/2sOVzgs
Submitted January 26, 2019 at 01:37AM by Aurum2
via reddit http://bit.ly/2sMCxqM
http://bit.ly/2sOVzgs
Submitted January 26, 2019 at 01:37AM by Aurum2
via reddit http://bit.ly/2sMCxqM
Medium
SnowAlert! Data Driven Security Analytics using Snowflake Cloud Data Warehouse
This is Worth Trying Out — An Open Source Project for Security Analytics with Snowflake
Steganography - A list of useful tools and resources
http://bit.ly/2Wk8Yuo
Submitted January 26, 2019 at 02:28AM by Ahm3d_H3sham
via reddit http://bit.ly/2RgtvvY
http://bit.ly/2Wk8Yuo
Submitted January 26, 2019 at 02:28AM by Ahm3d_H3sham
via reddit http://bit.ly/2RgtvvY
0xRick Owned Root !
Steganography - A list of useful tools and resources
Steganography Steganography is hiding a file or a message inside of another file , there are many fun steganography CTF challenges out there where the flag is hidden in an image , audio file or even other types of files. Here is a list of the most tools I…
Defeating Flask's Session Management
http://bit.ly/2S6SBCg
Submitted January 26, 2019 at 06:00PM by nauseate
via reddit http://bit.ly/2HvrU5R
http://bit.ly/2S6SBCg
Submitted January 26, 2019 at 06:00PM by nauseate
via reddit http://bit.ly/2HvrU5R
Paradoxis
Defeating Flask’s Session Management
A few weeks back, I and a friend of mine were discussing web frameworks and how he claimed to have made an ‘Impossible to Bypass’ login…
NIST Cybersecurity Framework in MOSP
http://bit.ly/2HAIaCI
Submitted January 27, 2019 at 05:59AM by b1rch_b0y
via reddit http://bit.ly/2B6xfv7
http://bit.ly/2HAIaCI
Submitted January 27, 2019 at 05:59AM by b1rch_b0y
via reddit http://bit.ly/2B6xfv7
objects.monarc.lu
MOSP
MOSP - Create, edit and share JSON objects
Game with content-disposition – Vahagn Vardanyan – Medium
http://bit.ly/2FXhV7e
Submitted January 27, 2019 at 11:53AM by 7histle
via reddit http://bit.ly/2FUvZz4
http://bit.ly/2FXhV7e
Submitted January 27, 2019 at 11:53AM by 7histle
via reddit http://bit.ly/2FUvZz4
Medium
Game with content-disposition
Using this a little article, you can find an interesting security thing in content-disposition in file download and upload time.
Dailymotion resets user passwords after being subject to “large scale” computer attack
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
Piunika Web
Dailymotion hacked, resets user passwords after being subject to "large scale" computer attack - Piunika Web
The attack consists in 'guessing' the passwords of some dailymotion accounts by automatically trying a large number of combinations.
The end of the "perimeter" as we know it
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
Medium
OSINT and the new perimeter
In this post I explore the uses and limitations of the “perimeter” metaphor and look at the impact from the growth of OSINT in recent…
On Doing Research
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
www.cryptologie.net
On Doing Research
Along the years, I've been influenced by many great minds on how to do research. I thought I would paste a few of their advice here.
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
Shenanigans Labs
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
Back in March 2018, I embarked on an arguably pointless crusade to prove that the TrustedToAuthForDelegation attribute was meaningless, and that “protocol transition” can be achieved without it. I believed that security wise, once constrained delegation was…