Dailymotion resets user passwords after being subject to “large scale” computer attack
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
http://bit.ly/2S51hcg
Submitted January 27, 2019 at 03:11PM by Titokhan
via reddit http://bit.ly/2HA2019
Piunika Web
Dailymotion hacked, resets user passwords after being subject to "large scale" computer attack - Piunika Web
The attack consists in 'guessing' the passwords of some dailymotion accounts by automatically trying a large number of combinations.
The end of the "perimeter" as we know it
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
http://bit.ly/2TjdLdM
Submitted January 27, 2019 at 09:49PM by smicallef
via reddit http://bit.ly/2Thdo3b
Medium
OSINT and the new perimeter
In this post I explore the uses and limitations of the “perimeter” metaphor and look at the impact from the growth of OSINT in recent…
On Doing Research
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
http://bit.ly/2G4Gcs8
Submitted January 27, 2019 at 10:30PM by davidw_-
via reddit http://bit.ly/2RnjI7K
www.cryptologie.net
On Doing Research
Along the years, I've been influenced by many great minds on how to do research. I thought I would paste a few of their advice here.
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Disregard.
That advice from Feynman’s Breakthrough, Disregard Others!
was really useful to me as I realized that I HAD to…
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
http://bit.ly/2FSvrd1
Submitted January 28, 2019 at 06:25AM by CaptMeelo
via reddit http://bit.ly/2S9B3Fl
Shenanigans Labs
Wagging the Dog: Abusing Resource-Based Constrained Delegation to Attack Active Directory
Back in March 2018, I embarked on an arguably pointless crusade to prove that the TrustedToAuthForDelegation attribute was meaningless, and that “protocol transition” can be achieved without it. I believed that security wise, once constrained delegation was…
Cross post from r/sysadmin was told maybe you guys could help with my situation.
http://bit.ly/2HBmYwy
Submitted January 28, 2019 at 08:35AM by padraigthrows
via reddit http://bit.ly/2FRcUh7
http://bit.ly/2HBmYwy
Submitted January 28, 2019 at 08:35AM by padraigthrows
via reddit http://bit.ly/2FRcUh7
reddit
r/sysadmin - am a student at a mid size high school and have found incredible insecurities in the way my school stores information…
13 votes and 35 comments so far on Reddit
Over 9,000 Cisco RV320/RV325 small business routers are vulnerable to CVE-2019-1653
http://bit.ly/2Rf9WV2
Submitted January 28, 2019 at 01:39PM by bad_packets
via reddit http://bit.ly/2WjeNIB
http://bit.ly/2Rf9WV2
Submitted January 28, 2019 at 01:39PM by bad_packets
via reddit http://bit.ly/2WjeNIB
Bad Packets Report
Over 9,000 Cisco RV320/RV325 routers are vulnerable to CVE-2019-1653
On Friday, January 25, 2019, our honeypots detected opportunistic scanning activity from multiple hosts targeting Cisco Small Business RV320 and RV325 routers. A vulnerability exists in these route…
iPhone iOS jailbreak writeup: IPC Voucher UaF Remote Jailbreak Stage 2
http://bit.ly/2T7kEPa
Submitted January 28, 2019 at 12:48PM by CyberBullets
via reddit http://bit.ly/2sOrBJd
http://bit.ly/2T7kEPa
Submitted January 28, 2019 at 12:48PM by CyberBullets
via reddit http://bit.ly/2sOrBJd
blogs.360.cn
IPC Voucher UaF Remote Jailbreak Stage 2 (EN)
分享奇虎360公司的技术,与安全的互联网共同成长。
Misconceptions, Battle Scars, & Growth on security
http://bit.ly/2sFSmj0
Submitted January 28, 2019 at 04:29PM by fagnerbrack
via reddit http://bit.ly/2DDifX8
http://bit.ly/2sFSmj0
Submitted January 28, 2019 at 04:29PM by fagnerbrack
via reddit http://bit.ly/2DDifX8
Medium
Misconceptions, Battle Scars, & Growth
I’ve been doing InfoSec stuff for ~20 years now (warning: time sneaks up on you!) and every 3–5 years I discover a better understanding of…
[PDF] Adversarial WiFi Sensing using a Single Smartphone
http://bit.ly/2sUm6bX
Submitted January 28, 2019 at 04:57PM by eberkut
via reddit http://bit.ly/2UlfbEA
http://bit.ly/2sUm6bX
Submitted January 28, 2019 at 04:57PM by eberkut
via reddit http://bit.ly/2UlfbEA
reddit
r/netsec - [PDF] Adversarial WiFi Sensing using a Single Smartphone
1 vote and 0 comments so far on Reddit
AZORult: Now, as A Signed “Google Update”
http://bit.ly/2MCCVBj
Submitted January 28, 2019 at 07:23PM by GelosSnake
via reddit http://bit.ly/2sTSBXK
http://bit.ly/2MCCVBj
Submitted January 28, 2019 at 07:23PM by GelosSnake
via reddit http://bit.ly/2sTSBXK
Minerva-Labs
AZORult: Now, as A Signed “Google Update”
AZORult attackers continue to adjust tactics to increase the chances that they’ll evade detection. This malware is a common information stealer, capable of exfiltrating a wide range of sensitive artifacts from an endpoint, including files, cached passwords…
Exploiting AWS 'AssumeRole' API for IAM enumeration
http://bit.ly/2RUpXVH
Submitted January 28, 2019 at 08:59PM by hackers_and_builders
via reddit http://bit.ly/2CNQs4L
http://bit.ly/2RUpXVH
Submitted January 28, 2019 at 08:59PM by hackers_and_builders
via reddit http://bit.ly/2CNQs4L
Rhino Security Labs
Unauthenticated AWS Role Enumeration (IAM Revisited)
This post on AWS role enumeration demonstrations a new IAM vulnerability in Amazon Web Services. Attackers can use account roles in larger cloud attacks.
Exploit for Check Point ZoneAlarm Anti-Virus
http://bit.ly/2SbOoNn
Submitted January 29, 2019 at 02:11AM by msiljak
via reddit http://bit.ly/2HD3kjA
http://bit.ly/2SbOoNn
Submitted January 29, 2019 at 02:11AM by msiljak
via reddit http://bit.ly/2HD3kjA
illumant llc
Check Point ZoneAlarm Anti-Virus Exploit
Local Exploitation of WCF Services within ZoneAlarm Anti-Virus Software to Escalate Privileges General Overview Illumant has discovered a critical vulnerability in Check Point’s ZoneAlarm anti-virus software. This vulnerability allows a low-privileged user…
Everything you need to know about ransomware in 2019
http://bit.ly/2BaMnYf
Submitted January 29, 2019 at 02:46AM by Emsisoft_Team
via reddit http://bit.ly/2BahBi3
http://bit.ly/2BaMnYf
Submitted January 29, 2019 at 02:46AM by Emsisoft_Team
via reddit http://bit.ly/2BahBi3
TechRadar
Everything you need to know about ransomware in 2019
Security expert Fabian Wosar shares his advice on saying safe from this year's biggest threats – and what to do if you fall victim.
Hacking Android: Attack Surfaces
http://bit.ly/2V758nS
Submitted January 29, 2019 at 02:37AM by marketingversprite
via reddit http://bit.ly/2TlgGSY
http://bit.ly/2V758nS
Submitted January 29, 2019 at 02:37AM by marketingversprite
via reddit http://bit.ly/2TlgGSY
VerSprite | Integrated Security Services and Consulting
Hacking Android: Attack Surfaces | VerSprite TVM
Many users with older versions of Android are prime targets with less hardend security. We will briefly look at the attack surface of an Android device.
52 Actionable Ways to Hack Your Productivity (satire)
http://bit.ly/2Rk4HmR
Submitted January 29, 2019 at 02:25AM by small-data-expert
via reddit http://bit.ly/2UhRooW
http://bit.ly/2Rk4HmR
Submitted January 29, 2019 at 02:25AM by small-data-expert
via reddit http://bit.ly/2UhRooW
Medium
52 Actionable Ways to Hack Your Productivity
Techniques I used when starting a startup and keeping my job as a day trader
Restoring a SQL Server Database during a pentest using AWS
http://bit.ly/2FUMUle
Submitted January 29, 2019 at 04:33AM by 312sec
via reddit http://bit.ly/2B5qyt2
http://bit.ly/2FUMUle
Submitted January 29, 2019 at 04:33AM by 312sec
via reddit http://bit.ly/2B5qyt2
Dolos Group
Restore a SQL Server Database to AWS
It happens to all testers eventually. You come across a file share hosting dozens of database backups. Giddiness ensues as you realize you have full read access and can copy any of them down to your dropbox, until you notice the database backups are tens…
iPhone bug lets you hear the audio of the person you are calling before they pick up
http://bit.ly/2HCWkU7
Submitted January 29, 2019 at 08:30AM by the-silent-guardian
via reddit http://bit.ly/2RSVHue
http://bit.ly/2HCWkU7
Submitted January 29, 2019 at 08:30AM by the-silent-guardian
via reddit http://bit.ly/2RSVHue
9to5Mac
Major iPhone FaceTime bug lets you hear the audio of the person you are calling … before they pick up
A significant bug has been discovered in FaceTime and is currently spreading virally over social media. The bug lets you call anyone with FaceTime, and immediately hear the audio coming from their …
TLS beaconing detection using ee-outliers and Elasticsearch
http://bit.ly/2G8f635
Submitted January 29, 2019 at 03:06PM by digicat
via reddit http://bit.ly/2Sf35iT
http://bit.ly/2G8f635
Submitted January 29, 2019 at 03:06PM by digicat
via reddit http://bit.ly/2Sf35iT
NVISO Labs
TLS beaconing detection using ee-outliers and Elasticsearch
Earlier today, we open-source ee-outliers, our in-house developed framework to detect outliers in events stored in Elasticsearch. This blog post is the first of several in which we want to dive a b…
7z AES encryption contains several vulnerabilities
http://bit.ly/2MrgFug
Submitted January 29, 2019 at 06:34PM by Titokhan
via reddit http://bit.ly/2sVhene
http://bit.ly/2MrgFug
Submitted January 29, 2019 at 06:34PM by Titokhan
via reddit http://bit.ly/2sVhene
Threadreaderapp
Thread by @3lbios: "So I wanted to encrypt some files. Thought about using 7z+password. Stackexchange folks said "Didn't review…
Thread by @3lbios: "So I wanted to encrypt some files. Thought about using 7z+password. Stackexchange folks said "Didn't review it but it sho I did. After a few mins I noticed they use 8byte "random" IV. Yes, h […]" #7zip #encryption #facepalm #randomness
Abusing Exchange: One API call away from Domain Admin
http://bit.ly/2DqEhMH
Submitted January 29, 2019 at 06:27PM by Reddfish
via reddit http://bit.ly/2G4XAgl
http://bit.ly/2DqEhMH
Submitted January 29, 2019 at 06:27PM by Reddfish
via reddit http://bit.ly/2G4XAgl
dirkjanm.io
Abusing Exchange: One API call away from Domain Admin
In most organisations using Active Directory and Exchange, Exchange servers have such high privileges that being an Administrator on an Exchange server is enough to escalate to Domain Admin. Recently I came across a blog from the ZDI, in which they detail…
sn0int - Semi-automatic OSINT framework and package manager
http://bit.ly/2Wv0LUr
Submitted January 29, 2019 at 07:51PM by kpcyrd
via reddit http://bit.ly/2G8bFcI
http://bit.ly/2Wv0LUr
Submitted January 29, 2019 at 07:51PM by kpcyrd
via reddit http://bit.ly/2G8bFcI
GitHub
kpcyrd/sn0int
Semi-automatic OSINT framework and package manager - kpcyrd/sn0int