SnowAlert - SQL based SIEM solution running on Snowflake SaaS data warehouse
http://bit.ly/2sOVzgs
Submitted January 26, 2019 at 01:37AM by Aurum2
via reddit http://bit.ly/2sMCxqM
http://bit.ly/2sOVzgs
Submitted January 26, 2019 at 01:37AM by Aurum2
via reddit http://bit.ly/2sMCxqM
Medium
SnowAlert! Data Driven Security Analytics using Snowflake Cloud Data Warehouse
This is Worth Trying Out — An Open Source Project for Security Analytics with Snowflake
Steganography - A list of useful tools and resources
http://bit.ly/2Wk8Yuo
Submitted January 26, 2019 at 02:28AM by Ahm3d_H3sham
via reddit http://bit.ly/2RgtvvY
http://bit.ly/2Wk8Yuo
Submitted January 26, 2019 at 02:28AM by Ahm3d_H3sham
via reddit http://bit.ly/2RgtvvY
0xRick Owned Root !
Steganography - A list of useful tools and resources
Steganography Steganography is hiding a file or a message inside of another file , there are many fun steganography CTF challenges out there where the flag is hidden in an image , audio file or even other types of files. Here is a list of the most tools I…
Defeating Flask's Session Management
http://bit.ly/2S6SBCg
Submitted January 26, 2019 at 06:00PM by nauseate
via reddit http://bit.ly/2HvrU5R
http://bit.ly/2S6SBCg
Submitted January 26, 2019 at 06:00PM by nauseate
via reddit http://bit.ly/2HvrU5R
Paradoxis
Defeating Flask’s Session Management
A few weeks back, I and a friend of mine were discussing web frameworks and how he claimed to have made an ‘Impossible to Bypass’ login…
NIST Cybersecurity Framework in MOSP
http://bit.ly/2HAIaCI
Submitted January 27, 2019 at 05:59AM by b1rch_b0y
via reddit http://bit.ly/2B6xfv7
http://bit.ly/2HAIaCI
Submitted January 27, 2019 at 05:59AM by b1rch_b0y
via reddit http://bit.ly/2B6xfv7
objects.monarc.lu
MOSP
MOSP - Create, edit and share JSON objects
Game with content-disposition – Vahagn Vardanyan – Medium
http://bit.ly/2FXhV7e
Submitted January 27, 2019 at 11:53AM by 7histle
via reddit http://bit.ly/2FUvZz4
http://bit.ly/2FXhV7e
Submitted January 27, 2019 at 11:53AM by 7histle
via reddit http://bit.ly/2FUvZz4
Medium
Game with content-disposition
Using this a little article, you can find an interesting security thing in content-disposition in file download and upload time.
Dailymotion resets user passwords after being subject to “large scale” computer attack
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
Piunika Web
Dailymotion hacked, resets user passwords after being subject to "large scale" computer attack - Piunika Web
The attack consists in 'guessing' the passwords of some dailymotion accounts by automatically trying a large number of combinations.
The end of the "perimeter" as we know it
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
Medium
OSINT and the new perimeter
In this post I explore the uses and limitations of the “perimeter” metaphor and look at the impact from the growth of OSINT in recent…
On Doing Research
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
www.cryptologie.net
On Doing Research
Along the years, I've been influenced by many great minds on how to do research. I thought I would paste a few of their advice here.
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
Shenanigans Labs
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
Back in March 2018, I embarked on an arguably pointless crusade to prove that the TrustedToAuthForDelegation attribute was meaningless, and that “protocol transition” can be achieved without it. I believed that security wise, once constrained delegation was…
Cross post from r/sysadmin was told maybe you guys could help with my situation.
http://bit.ly/2HBmYwy
Submitted January 28, 2019 at 08:35AM by padraigthrows
via reddit http://bit.ly/2FRcUh7
http://bit.ly/2HBmYwy
Submitted January 28, 2019 at 08:35AM by padraigthrows
via reddit http://bit.ly/2FRcUh7
reddit
r/sysadmin - am a student at a mid size high school and have found incredible insecurities in the way my school stores information…
13 votes and 35 comments so far on Reddit
Over 9,000 Cisco RV320/RV325 small business routers are vulnerable to CVE-2019-1653
http://bit.ly/2Rf9WV2
Submitted January 28, 2019 at 01:39PM by bad_packets
via reddit http://bit.ly/2WjeNIB
http://bit.ly/2Rf9WV2
Submitted January 28, 2019 at 01:39PM by bad_packets
via reddit http://bit.ly/2WjeNIB
Bad Packets Report
Over 9,000 Cisco RV320/RV325 routers are vulnerable to CVE-2019-1653
On Friday, January 25, 2019, our honeypots detected opportunistic scanning activity from multiple hosts targeting Cisco Small Business RV320 and RV325 routers. A vulnerability exists in these route…
iPhone iOS jailbreak writeup: IPC Voucher UaF Remote Jailbreak Stage 2
http://bit.ly/2T7kEPa
Submitted January 28, 2019 at 12:48PM by CyberBullets
via reddit http://bit.ly/2sOrBJd
http://bit.ly/2T7kEPa
Submitted January 28, 2019 at 12:48PM by CyberBullets
via reddit http://bit.ly/2sOrBJd
blogs.360.cn
IPC Voucher UaF Remote Jailbreak Stage 2 (EN)
分享奇虎360公司的技术,与安全的互联网共同成长。
Misconceptions, Battle Scars, & Growth on security
http://bit.ly/2sFSmj0
Submitted January 28, 2019 at 04:29PM by fagnerbrack
via reddit http://bit.ly/2DDifX8
http://bit.ly/2sFSmj0
Submitted January 28, 2019 at 04:29PM by fagnerbrack
via reddit http://bit.ly/2DDifX8
Medium
Misconceptions, Battle Scars, & Growth
I’ve been doing InfoSec stuff for ~20 years now (warning: time sneaks up on you!) and every 3–5 years I discover a better understanding of…
[PDF] Adversarial WiFi Sensing using a Single Smartphone
http://bit.ly/2sUm6bX
Submitted January 28, 2019 at 04:57PM by eberkut
via reddit http://bit.ly/2UlfbEA
http://bit.ly/2sUm6bX
Submitted January 28, 2019 at 04:57PM by eberkut
via reddit http://bit.ly/2UlfbEA
reddit
r/netsec - [PDF] Adversarial WiFi Sensing using a Single Smartphone
1 vote and 0 comments so far on Reddit
AZORult: Now, as A Signed “Google Update”
http://bit.ly/2MCCVBj
Submitted January 28, 2019 at 07:23PM by GelosSnake
via reddit http://bit.ly/2sTSBXK
http://bit.ly/2MCCVBj
Submitted January 28, 2019 at 07:23PM by GelosSnake
via reddit http://bit.ly/2sTSBXK
Minerva-Labs
AZORult: Now, as A Signed “Google Update”
AZORult attackers continue to adjust tactics to increase the chances that they’ll evade detection. This malware is a common information stealer, capable of exfiltrating a wide range of sensitive artifacts from an endpoint, including files, cached passwords…
Exploiting AWS 'AssumeRole' API for IAM enumeration
http://bit.ly/2RUpXVH
Submitted January 28, 2019 at 08:59PM by hackers_and_builders
via reddit http://bit.ly/2CNQs4L
http://bit.ly/2RUpXVH
Submitted January 28, 2019 at 08:59PM by hackers_and_builders
via reddit http://bit.ly/2CNQs4L
Rhino Security Labs
Unauthenticated AWS Role Enumeration (IAM Revisited)
This post on AWS role enumeration demonstrations a new IAM vulnerability in Amazon Web Services. Attackers can use account roles in larger cloud attacks.
Exploit for Check Point ZoneAlarm Anti-Virus
http://bit.ly/2SbOoNn
Submitted January 29, 2019 at 02:11AM by msiljak
via reddit http://bit.ly/2HD3kjA
http://bit.ly/2SbOoNn
Submitted January 29, 2019 at 02:11AM by msiljak
via reddit http://bit.ly/2HD3kjA
illumant llc
Check Point ZoneAlarm Anti-Virus Exploit
Local Exploitation of WCF Services within ZoneAlarm Anti-Virus Software to Escalate Privileges General Overview Illumant has discovered a critical vulnerability in Check Point’s ZoneAlarm anti-virus software. This vulnerability allows a low-privileged user…
Everything you need to know about ransomware in 2019
http://bit.ly/2BaMnYf
Submitted January 29, 2019 at 02:46AM by Emsisoft_Team
via reddit http://bit.ly/2BahBi3
http://bit.ly/2BaMnYf
Submitted January 29, 2019 at 02:46AM by Emsisoft_Team
via reddit http://bit.ly/2BahBi3
TechRadar
Everything you need to know about ransomware in 2019
Security expert Fabian Wosar shares his advice on saying safe from this year's biggest threats – and what to do if you fall victim.
Hacking Android: Attack Surfaces
http://bit.ly/2V758nS
Submitted January 29, 2019 at 02:37AM by marketingversprite
via reddit http://bit.ly/2TlgGSY
http://bit.ly/2V758nS
Submitted January 29, 2019 at 02:37AM by marketingversprite
via reddit http://bit.ly/2TlgGSY
VerSprite | Integrated Security Services and Consulting
Hacking Android: Attack Surfaces | VerSprite TVM
Many users with older versions of Android are prime targets with less hardend security. We will briefly look at the attack surface of an Android device.
52 Actionable Ways to Hack Your Productivity (satire)
http://bit.ly/2Rk4HmR
Submitted January 29, 2019 at 02:25AM by small-data-expert
via reddit http://bit.ly/2UhRooW
http://bit.ly/2Rk4HmR
Submitted January 29, 2019 at 02:25AM by small-data-expert
via reddit http://bit.ly/2UhRooW
Medium
52 Actionable Ways to Hack Your Productivity
Techniques I used when starting a startup and keeping my job as a day trader
Restoring a SQL Server Database during a pentest using AWS
http://bit.ly/2FUMUle
Submitted January 29, 2019 at 04:33AM by 312sec
via reddit http://bit.ly/2B5qyt2
http://bit.ly/2FUMUle
Submitted January 29, 2019 at 04:33AM by 312sec
via reddit http://bit.ly/2B5qyt2
Dolos Group
Restore a SQL Server Database to AWS
It happens to all testers eventually. You come across a file share hosting dozens of database backups. Giddiness ensues as you realize you have full read access and can copy any of them down to your dropbox, until you notice the database backups are tens…