I scanned the whole country of Austria and this is what I've found
http://bit.ly/2RO53m5
Submitted February 10, 2019 at 01:42AM by _vavkamil_
via reddit http://bit.ly/2BtdnCu
http://bit.ly/2RO53m5
Submitted February 10, 2019 at 01:42AM by _vavkamil_
via reddit http://bit.ly/2BtdnCu
I scanned the whole country of Austria and this is what I've found
Personal blog of Christian Haschek
Evil Twin Attack - The Definitive Guide (Updated 2019)
http://bit.ly/2MWWCnJ
Submitted February 10, 2019 at 03:28AM by i_rsX
via reddit http://bit.ly/2RPTcE3
http://bit.ly/2MWWCnJ
Submitted February 10, 2019 at 03:28AM by i_rsX
via reddit http://bit.ly/2RPTcE3
rootsh3ll
Evil Twin Attack [The Definitive Guide] (Updated 2019)
A step-by-step guide to learn how to hack WiFi passwords (WEP/ WPA2/ WPS) in plain-text using the Evil Twin attack method
Guide for IR policies, plans, and more
http://bit.ly/2WLATDE
Submitted February 10, 2019 at 08:10AM by AllUrRootRBelong2Me
via reddit http://bit.ly/2SlYZ9n
http://bit.ly/2WLATDE
Submitted February 10, 2019 at 08:10AM by AllUrRootRBelong2Me
via reddit http://bit.ly/2SlYZ9n
Google Docs
SecKC - IR Manual (Draft).pdf
CANalyzat0r: Security analysis toolkit for proprietary car protocols
http://bit.ly/2RSPUzN
Submitted February 10, 2019 at 09:55PM by Titokhan
via reddit http://bit.ly/2MW4l5k
http://bit.ly/2RSPUzN
Submitted February 10, 2019 at 09:55PM by Titokhan
via reddit http://bit.ly/2MW4l5k
GitHub
schutzwerk/CANalyzat0r
Security analysis toolkit for proprietary car protocols - schutzwerk/CANalyzat0r
Checking Firewall Equivalence with Z3
http://bit.ly/2WU7jft
Submitted February 11, 2019 at 03:56AM by maslen
via reddit http://bit.ly/2SqA054
http://bit.ly/2WU7jft
Submitted February 11, 2019 at 03:56AM by maslen
via reddit http://bit.ly/2SqA054
Medium
Checking Firewall Equivalence with Z3
Lessons I’ve learned from software engineering are uniformly cynical:
[Cfrg] Structure in the S-box of the Russian algorithms (RFC 6986, RFC 7801)
http://bit.ly/2TKFC6I
Submitted February 11, 2019 at 02:06PM by xaocuc
via reddit http://bit.ly/2SFURAv
http://bit.ly/2TKFC6I
Submitted February 11, 2019 at 02:06PM by xaocuc
via reddit http://bit.ly/2SFURAv
First Android Clipper found on Google Play
http://bit.ly/2SIhXGG
Submitted February 11, 2019 at 01:57PM by lukasstefanko
via reddit http://bit.ly/2MXb2Ee
http://bit.ly/2SIhXGG
Submitted February 11, 2019 at 01:57PM by lukasstefanko
via reddit http://bit.ly/2MXb2Ee
Lukas Stefanko
Android Clipper found on Google Play | video demo - Lukas Stefanko
The first Android Trojan Clipper - that exchanges cryptocurrency address in copied clipboard - was discovered on Google Play.
7 things to do on Clean Out Your Computer Day 2019
http://bit.ly/2DpRNio
Submitted February 11, 2019 at 02:42PM by HenryArchippus
via reddit http://bit.ly/2UMnwBs
http://bit.ly/2DpRNio
Submitted February 11, 2019 at 02:42PM by HenryArchippus
via reddit http://bit.ly/2UMnwBs
Medium
7 things to do on Clean Out Your Computer Day 2019
It’s National Clean Out Your Computer Day, and I want to help you celebrate it by rolling up your sleeves and getting to work. It’s a…
DNSGrep — Quickly Searching Large DNS Datasets
http://bit.ly/2MZP4k9
Submitted February 11, 2019 at 04:12PM by albinowax
via reddit http://bit.ly/2SFJJDP
http://bit.ly/2MZP4k9
Submitted February 11, 2019 at 04:12PM by albinowax
via reddit http://bit.ly/2SFJJDP
reddit
r/netsec - DNSGrep — Quickly Searching Large DNS Datasets
1 vote and 0 comments so far on Reddit
New vulnerability in runc allows container escape, root-level code execution in Docker
http://bit.ly/2N25Rmp
Submitted February 11, 2019 at 09:09PM by eagle2120
via reddit http://bit.ly/2SLokcg
http://bit.ly/2N25Rmp
Submitted February 11, 2019 at 09:09PM by eagle2120
via reddit http://bit.ly/2SLokcg
seclists.org
oss-sec: CVE-2019-5736: runc container breakout (all versions)
Sorry, Adobe Reader, We're Not Letting You Phone Home Without User's Consent (0day)
http://bit.ly/2TQqFjm
Submitted February 11, 2019 at 10:01PM by dielel
via reddit http://bit.ly/2Bvdygt
http://bit.ly/2TQqFjm
Submitted February 11, 2019 at 10:01PM by dielel
via reddit http://bit.ly/2Bvdygt
0Patch
Sorry, Adobe Reader, We're Not Letting You Phone Home Without User's Consent (0day)
by Mitja Kolsek, the 0patch Team Today we'll look at a fairly simple vulnerability in Adobe Reader DC that allows a PDF document automati...
New Offensive USB Cable Allows Remote Attacks over WiFi
http://bit.ly/2GoTr7Q
Submitted February 11, 2019 at 11:10PM by Nynir
via reddit http://bit.ly/2RYZlhu
http://bit.ly/2GoTr7Q
Submitted February 11, 2019 at 11:10PM by Nynir
via reddit http://bit.ly/2RYZlhu
BleepingComputer
New Offensive USB Cable Allows Remote Attacks over WiFi
Like a scene from a James Bond or Mission Impossible movie, a new offensive USB cable plugged into a computer could allow attackers to execute commands over WiFi as if they were using the computer's keyboard.
Russia considers unplugging from Internet
https://bbc.in/2I6bm4J
Submitted February 11, 2019 at 11:22PM by Hobscob
via reddit http://bit.ly/2Gzgaxk
https://bbc.in/2I6bm4J
Submitted February 11, 2019 at 11:22PM by Hobscob
via reddit http://bit.ly/2Gzgaxk
BBC News
Russia considers 'unplugging' from internet
Russia may briefly disconnect from the internet as part of a test of its cyber-defences.
Abusing SUDO Advance for Linux Privilege Escalation - RedTeam Tips
http://bit.ly/2N2UCds
Submitted February 12, 2019 at 08:14AM by sandeep1337
via reddit http://bit.ly/2SOu70G
http://bit.ly/2N2UCds
Submitted February 12, 2019 at 08:14AM by sandeep1337
via reddit http://bit.ly/2SOu70G
Penetration Testing and CyberSecurity Solution - SecureLayer7
Abusing SUDO Advance for Linux Privilege Escalation – RedTeam Tips
Abusing SUDO Advance for Linux Privilege Escalation If you have a limited shell that has access to some programs using thesudocommand you might be able to escalate your privileges. here I show some of the binary which helps you to escalate privilege using…
Post Exploitation
http://bit.ly/2UVEo8H
Submitted February 12, 2019 at 03:25PM by mstfknn
via reddit http://bit.ly/2E4D9Ph
http://bit.ly/2UVEo8H
Submitted February 12, 2019 at 03:25PM by mstfknn
via reddit http://bit.ly/2E4D9Ph
PRISMA CSI
6 - Post Exploitation • PRISMA CSI
Post Exploitation, Domain Exploitation, Meterpreter, Crackmapexec, Empire, Local Privilege Escalation, Persistence, Pivoting
Collection #1-5 analysis, 8 billion unique account with password, 301Gb of passwords. French blog
http://bit.ly/2GFqMun
Submitted February 12, 2019 at 04:37PM by rmsisme
via reddit http://bit.ly/2N2shUX
http://bit.ly/2GFqMun
Submitted February 12, 2019 at 04:37PM by rmsisme
via reddit http://bit.ly/2N2shUX
Advens
2019 sera forte en mots de passe volés – le record est battu !
2019 commence par un record battu ! Des compilations de plusieurs centaines de Giga sont apparues, d’abord en vente sur le darknet puis échangées par torrents à partir de plusieurs forums, sous les noms :« Collection #1 à 5 » ou « bigDB ». Essayons de voir…
IoT security group
http://bit.ly/2trhxGJ
Submitted February 12, 2019 at 04:25PM by v33ruiot
via reddit http://bit.ly/2SKFdnw
http://bit.ly/2trhxGJ
Submitted February 12, 2019 at 04:25PM by v33ruiot
via reddit http://bit.ly/2SKFdnw
Telegram
IoTsecurity101
It is particularly on IoT security.. please ask your question and share your knowledge
Simple Social Buttons 2.0.4-2.0.21 - Authenticated Option Injection (40K+ sites affected)
http://bit.ly/2DsjTJZ
Submitted February 12, 2019 at 05:23PM by ded1cated
via reddit http://bit.ly/2N1YhIH
http://bit.ly/2DsjTJZ
Submitted February 12, 2019 at 05:23PM by ded1cated
via reddit http://bit.ly/2N1YhIH
WebARX
WordPress Plugin 'Simple Social Buttons' Critical Security Bug
WebARX researcher found a vulnerability in popular WordPress plugin Simple Social Buttons. Read more to find out what vulnerability allows.
oss-sec: CVE-2019-5736: runc container breakout (all versions)
http://bit.ly/2N25Rmp
Submitted February 12, 2019 at 05:43PM by sidcool1234
via reddit http://bit.ly/2TKmnKD
http://bit.ly/2N25Rmp
Submitted February 12, 2019 at 05:43PM by sidcool1234
via reddit http://bit.ly/2TKmnKD
seclists.org
oss-sec: CVE-2019-5736: runc container breakout (all versions)
Xiaomi M365 scooter - Lack of security, enables an attacker to flash malicious firmware or maliciously use the scooter features
http://bit.ly/2thtTAO
Submitted February 12, 2019 at 07:31PM by IamNullByte
via reddit http://bit.ly/2N2xsUK
http://bit.ly/2thtTAO
Submitted February 12, 2019 at 07:31PM by IamNullByte
via reddit http://bit.ly/2N2xsUK
Zimperium Mobile Security Blog
Don't Give Me a Brake - Xiaomi Scooter Hack Enables Dangerous Accelerations and Stops for Unsuspecting Riders | Zimperium Mobile…
This proof-of concept (PoC) is released for educational purposes and evaluation by researchers, and should not be used in any unintended way. Furthermore, this PoC and any other related material has been published only after disclosing it to Xiaomi Researcher:…
Tough day for VFEmail....
http://bit.ly/2SIStJf
Submitted February 12, 2019 at 07:27PM by NaCledHash
via reddit http://bit.ly/2WZC9mE
http://bit.ly/2SIStJf
Submitted February 12, 2019 at 07:27PM by NaCledHash
via reddit http://bit.ly/2WZC9mE
reddit
r/sysadmin - Tough day for VFEmail....
2 votes and 1 comment so far on Reddit