Detecting Web Attacks with a Seq2Seq Autoencoder
https://ift.tt/2V9mzU0
Submitted February 20, 2019 at 06:24PM by alexlash
via reddit https://ift.tt/2V6obOj
https://ift.tt/2V9mzU0
Submitted February 20, 2019 at 06:24PM by alexlash
via reddit https://ift.tt/2V6obOj
Ptsecurity
Detecting Web Attacks with a Seq2Seq Autoencoder
Attack detection has been a part of information security for decades. The first known intrusion detection system (IDS) implementations d...
Combine a subtle bug in shrinkwrap software with unsafe ADI DNS defaults and you get more NTLM hashes than you can wish for. Even in a hardened environment.
https://ift.tt/2XfzwgE
Submitted February 20, 2019 at 07:43PM by obilodeau
via reddit https://ift.tt/2SOPdNe
https://ift.tt/2XfzwgE
Submitted February 20, 2019 at 07:43PM by obilodeau
via reddit https://ift.tt/2SOPdNe
GoSecure
Abusing Unsafe Defaults in Active Directory Domain Services: A Real-World Case Study - GoSecure
Combine a bug in Antidote, a popular enterprise spellchecker, and unsafe defaults in Active Directory, and you get more NTLM hashes than you can deal with.
Detecting Web Attacks with a Seq2Seq Autoencoder
https://ift.tt/2U6wfyc
Submitted February 20, 2019 at 09:19PM by atomlib_com
via reddit https://ift.tt/2V90Lrv
https://ift.tt/2U6wfyc
Submitted February 20, 2019 at 09:19PM by atomlib_com
via reddit https://ift.tt/2V90Lrv
Habr
Detecting Web Attacks with a Seq2Seq Autoencoder
Attack detection has been a part of information security for decades. The first known intrusion detection system (IDS) implementations date back to the early...
Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research
https://ift.tt/2T6H6uS
Submitted February 20, 2019 at 08:39PM by eyalitki
via reddit https://ift.tt/2twBxYp
https://ift.tt/2T6H6uS
Submitted February 20, 2019 at 08:39PM by eyalitki
via reddit https://ift.tt/2twBxYp
Check Point Research
Extracting a 19 Year Old Code Execution from WinRAR - Check Point Research
Research by: Nadav Grossman Introduction In this article, we tell the story of how we found a logical bug using the WinAFL fuzzer and exploited it in WinRAR to gain full control over a victim’s computer. The exploit works by just extracting an archive, and…
Chomp Scan - A tool for bug bounty/penetration test domain reconnaissance.
https://ift.tt/2GEpcKr
Submitted February 20, 2019 at 11:15PM by IamJacksLackOf
via reddit https://ift.tt/2BIrmEI
https://ift.tt/2GEpcKr
Submitted February 20, 2019 at 11:15PM by IamJacksLackOf
via reddit https://ift.tt/2BIrmEI
GitHub
SolomonSklash/chomp-scan
A noscripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs. - SolomonSklash/chomp-scan
Never-ending WordPress vulnerabilities
https://ift.tt/2SM2DKc
Submitted February 21, 2019 at 12:05AM by ded1cated
via reddit https://ift.tt/2ImXwuT
https://ift.tt/2SM2DKc
Submitted February 21, 2019 at 12:05AM by ded1cated
via reddit https://ift.tt/2ImXwuT
Infosecurity Magazine
Two WordPress Plugin Authors Issue Bug Fixes
Users of WP Cost Estimation & Payment Forms Builder and Simple Social Buttons plugins urged to update.
WordPress 5.0.0 Remote Code Execution can lead to a full remote takeover
https://ift.tt/2TVoF9S
Submitted February 21, 2019 at 01:30AM by robert681
via reddit https://ift.tt/2Nhxvfz
https://ift.tt/2TVoF9S
Submitted February 21, 2019 at 01:30AM by robert681
via reddit https://ift.tt/2Nhxvfz
Pown Recon - target reconnaissance framework powered by graph theory
https://ift.tt/2GyjlWZ
Submitted February 21, 2019 at 03:27AM by _pdp_
via reddit https://ift.tt/2tv1Tdh
https://ift.tt/2GyjlWZ
Submitted February 21, 2019 at 03:27AM by _pdp_
via reddit https://ift.tt/2tv1Tdh
GitHub
pownjs/pown-recon
A powerful target reconnaissance framework powered by graph theory. - pownjs/pown-recon
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2019-003
https://ift.tt/2GUyuBh
Submitted February 21, 2019 at 07:56AM by sbyo4263
via reddit https://ift.tt/2STB7dB
https://ift.tt/2GUyuBh
Submitted February 21, 2019 at 07:56AM by sbyo4263
via reddit https://ift.tt/2STB7dB
reddit
r/netsec - Drupal core - Highly critical - Remote Code Execution - SA-CORE-2019-003
0 votes and 0 comments so far on Reddit
Analyzing HijaIyh (APPLE SCAMPAGE V2) phishing kit
https://ift.tt/2Elid6E
Submitted February 21, 2019 at 08:23AM by ninoseki
via reddit https://ift.tt/2IpyBqI
https://ift.tt/2Elid6E
Submitted February 21, 2019 at 08:23AM by ninoseki
via reddit https://ift.tt/2IpyBqI
HackMD
Analyzing HijaIyh (APPLE SCAMPAGE V2) phishing kit - HackMD
# Analyzing HijaIyh (APPLE SCAMPAGE V2) phishing kit Today I found an interesting phishing kit targ
Paperclip to a House: Turning Useless Data into an Authenticated User
https://ift.tt/2E1Yc3x
Submitted February 21, 2019 at 12:45PM by mdulin2
via reddit https://ift.tt/2GGCdDh
https://ift.tt/2E1Yc3x
Submitted February 21, 2019 at 12:45PM by mdulin2
via reddit https://ift.tt/2GGCdDh
Drupal core - Highly critical - Remote Code Execution - SA-CORE-2019-003
https://ift.tt/2Nipabj
Submitted February 21, 2019 at 12:15PM by Adr1enb
via reddit https://ift.tt/2twsnv6
https://ift.tt/2Nipabj
Submitted February 21, 2019 at 12:15PM by Adr1enb
via reddit https://ift.tt/2twsnv6
reddit
r/netsec - Drupal core - Highly critical - Remote Code Execution - SA-CORE-2019-003
0 votes and 1 comment so far on Reddit
VPN for marketing
https://ift.tt/2TYYyi5
Submitted February 21, 2019 at 03:33PM by EastZookeepergame
via reddit https://ift.tt/2GCITlL
https://ift.tt/2TYYyi5
Submitted February 21, 2019 at 03:33PM by EastZookeepergame
via reddit https://ift.tt/2GCITlL
Medium
Why a VPN should be in your marketing tools list
If you are working in a digital marketing sphere, most of your work is done online, from managing social media channels to monitoring…
Abusing autoresponders and email bounces
https://ift.tt/2IsVkSW
Submitted February 21, 2019 at 06:49PM by Securinti
via reddit https://ift.tt/2U0l62a
https://ift.tt/2IsVkSW
Submitted February 21, 2019 at 06:49PM by Securinti
via reddit https://ift.tt/2U0l62a
Medium
Abusing autoresponders and email bounces
Being a bug bounty hunter, I face a lot of competition. Lots of companies are willing to issue rewards for vulnerabilities in their…
Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!(EN) | DEVCORE 戴夫寇爾
https://ift.tt/2tyh0mh
Submitted February 21, 2019 at 07:28PM by b0920075
via reddit https://ift.tt/2GBqV2T
https://ift.tt/2tyh0mh
Submitted February 21, 2019 at 07:28PM by b0920075
via reddit https://ift.tt/2GBqV2T
DEVCORE 戴夫寇爾
Hacking Jenkins Part 2 - Abusing Meta Programming for Unauthenticated RCE!(EN) | DEVCORE 戴夫寇爾
After Jenkins released the [Security Advisory](https://jenkins.io/security/advisory/2018-12-05/#SECURITY-595) and fixed the dynamic routing vulnerability on 2018-12-05, I started to organize my notes in order to write this Hacking Jenkins series. While reviewing…
Hacking Jenkins Part 1 - Play with Dynamic Routing (EN) | DEVCORE 戴夫寇爾
https://ift.tt/2GVYVGL
Submitted February 21, 2019 at 07:27PM by b0920075
via reddit https://ift.tt/2NkbWL8
https://ift.tt/2GVYVGL
Submitted February 21, 2019 at 07:27PM by b0920075
via reddit https://ift.tt/2NkbWL8
DEVCORE 戴夫寇爾
Hacking Jenkins Part 1 - Play with Dynamic Routing (EN) | DEVCORE 戴夫寇爾
This article is mainly about a brief security review on Jenkins in the last year. During this review, we found 5 vulnerabilities including: CVE-2018-1999002(Arbitrary file read vulnerability), CVE-2018-1000600(CSRF and missing permission checks in GitHub…
MikroTik Firewall & NAT Bypass
https://ift.tt/2EmRztZ
Submitted February 21, 2019 at 07:19PM by chicksdigthelongrun
via reddit https://ift.tt/2V95p91
https://ift.tt/2EmRztZ
Submitted February 21, 2019 at 07:19PM by chicksdigthelongrun
via reddit https://ift.tt/2V95p91
Medium
MikroTik Firewall & NAT Bypass
Exploitation from WAN to LAN
IDS/IPS malware download evasion | GitHub
https://ift.tt/2NjgIbP
Submitted February 21, 2019 at 07:10PM by Eplox
via reddit https://ift.tt/2GA1P4x
https://ift.tt/2NjgIbP
Submitted February 21, 2019 at 07:10PM by Eplox
via reddit https://ift.tt/2GA1P4x
GitHub
Eplox/evador
IDS/IPS malware download evasion. Contribute to Eplox/evador development by creating an account on GitHub.
Breaking out of Docker via runC - Explaining CVE-2019-5736
https://ift.tt/2IC84Xw
Submitted February 21, 2019 at 09:06PM by reddit_read_today
via reddit https://ift.tt/2SRJsyk
https://ift.tt/2IC84Xw
Submitted February 21, 2019 at 09:06PM by reddit_read_today
via reddit https://ift.tt/2SRJsyk
Twistlock
Breaking out of Docker via runC - Explaining CVE-2019-5736 | Twistlock
Last week (2019-02-11) a new vulnerability in runC was reported by its maintainers, originally found by Adam Iwaniuk and Borys Poplawski. Dubbed CVE-2019-5736, it affects Docker containers running in default settings and can be used by an attacker to gain…
Cloud Based fully Automated Reconnaissance Tool
https://ift.tt/2V7IVVO
Submitted February 21, 2019 at 10:15PM by SwordSec
via reddit https://ift.tt/2TawLhB
https://ift.tt/2V7IVVO
Submitted February 21, 2019 at 10:15PM by SwordSec
via reddit https://ift.tt/2TawLhB
Swordeye
SwordEye Recon Private Beta
Cloud Based Fully Automated Reconnaissance Tool
Venom - A Multi-hop Proxy for Penetration Testers Written in Go
https://ift.tt/2Nk6iJh
Submitted February 21, 2019 at 07:19PM by D1ive
via reddit https://ift.tt/2ICnISK
https://ift.tt/2Nk6iJh
Submitted February 21, 2019 at 07:19PM by D1ive
via reddit https://ift.tt/2ICnISK
GitHub
Dliv3/Venom
Venom - A Multi-hop Proxy for Penetration Testers Written in Go - Dliv3/Venom