Penetration Testing Active Directory, Part I
https://ift.tt/2VFuWqE
Submitted March 06, 2019 at 12:56AM by Hausec
via reddit https://ift.tt/2EN5IAP
https://ift.tt/2VFuWqE
Submitted March 06, 2019 at 12:56AM by Hausec
via reddit https://ift.tt/2EN5IAP
root@Hausec
Penetration Testing Active Directory, Part I
I’ve had several customers come to me before a pentest and say they think they’re in a good shape because their vulnerability scan shows no critical vulnerabilities and that they’…
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)
https://ift.tt/2tR6mXP
Submitted March 06, 2019 at 02:18AM by maximilianov
via reddit https://ift.tt/2VFr9cN
https://ift.tt/2tR6mXP
Submitted March 06, 2019 at 02:18AM by maximilianov
via reddit https://ift.tt/2VFr9cN
Medium
Finding and exploiting CVE-2018–7445 (unauthenticated RCE in MikroTik’s RouterOS SMB)
Unauthenticated RCE in MikroTik’s RouterOS SMB
Privilege Escalation in Quora, which can compromise all users on Quora
https://ift.tt/2Xx8Fgc
Submitted March 06, 2019 at 01:30AM by tarunkant
via reddit https://ift.tt/2XFsvGj
https://ift.tt/2Xx8Fgc
Submitted March 06, 2019 at 01:30AM by tarunkant
via reddit https://ift.tt/2XFsvGj
SpyClub
Horizontal Privilege Escalation on Quora which can compromise all users on Quora
Hey, I am SpyD3r(@TarunkantG) and in this blog, I will be discussing the bug I have found in Quora which can compromise all users on Quora due to Horizontal Privilege Escalation. I worked more than
Quick Guide - wardriving with kismet, gps and google earth
https://ift.tt/2ENw99x
Submitted March 06, 2019 at 03:55AM by smittix
via reddit https://ift.tt/2UnNMlF
https://ift.tt/2ENw99x
Submitted March 06, 2019 at 03:55AM by smittix
via reddit https://ift.tt/2UnNMlF
Stealing the Network
Wardriving with Kismet, GPS and Google Earth.
Wardriving Wardriving was once a really popular sport, I myself loved mapping new areas with my trusty Orinco Gold Card. I’m not sure how popular it is these days but I thought I’d writ…
Ghidra Public Release
https://ghidra-sre.org
Submitted March 06, 2019 at 11:40AM by secaggr
via reddit https://ift.tt/2TDWFuB
https://ghidra-sre.org
Submitted March 06, 2019 at 11:40AM by secaggr
via reddit https://ift.tt/2TDWFuB
reddit
r/netsec - Ghidra Public Release
0 votes and 0 comments so far on Reddit
9 Digital Identity Trends That Will Make or Break Businesses in 2019
https://ift.tt/2NJneZG
Submitted March 06, 2019 at 12:08PM by iamjohnlenn
via reddit https://ift.tt/2TANJ8Y
https://ift.tt/2NJneZG
Submitted March 06, 2019 at 12:08PM by iamjohnlenn
via reddit https://ift.tt/2TANJ8Y
Hacker Noon
9 Digital Identity Trends That Will Make or Break Businesses in 2019
Digital identity can make or break a business in several areas. Here are the top 9 digital identity trends that brands or businesses need…
Captive Portal: The Definitive Guide [2019]
https://ift.tt/2TzvwbX
Submitted March 06, 2019 at 04:28PM by i_rsX
via reddit https://ift.tt/2IUwSK8
https://ift.tt/2TzvwbX
Submitted March 06, 2019 at 04:28PM by i_rsX
via reddit https://ift.tt/2IUwSK8
rootsh3ll
Captive Portal: The Definitive Guide
This is the most comprehensive guide to Captive Portals on the planet. If you want to leverage WiFi Captive Portals for improving your Business, you’ll love this guide.
Digital Forensics Tips&Tricks: How to Find Active VPN Connection in the Memory Dump
https://ift.tt/2SMI8Il
Submitted March 06, 2019 at 07:28PM by atomlib_com
via reddit https://ift.tt/2Ti11rL
https://ift.tt/2SMI8Il
Submitted March 06, 2019 at 07:28PM by atomlib_com
via reddit https://ift.tt/2Ti11rL
Habr
Digital Forensics Tips&Tricks: How to Find Active VPN Connection in the Memory Dump
Sometimes you can meet a case when a cyber-attacker uses VPN to establish a reliable channel between C2 server and infected IT-infrastructure. And, as Threat...
PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services - Check Point Research
https://ift.tt/2EHZYr7
Submitted March 06, 2019 at 08:09PM by Omer_Gull
via reddit https://ift.tt/2UrSXBq
https://ift.tt/2EHZYr7
Submitted March 06, 2019 at 08:09PM by Omer_Gull
via reddit https://ift.tt/2UrSXBq
Check Point Research
PXE Dust: Finding a Vulnerability in Windows Servers Deployment Services - Check Point Research
Research By: Omer Gull Introduction Many large organizations use Windows Deployment Services (WDS) to install customized operating systems on new machines in the network. The Windows Deployment Services is usually, by its nature, accessible to anyone connected…
4G to 5G Evolution: In-Depth Security Perspective
https://ift.tt/2NIqBQK
Submitted March 06, 2019 at 09:10PM by zexterio
via reddit https://ift.tt/2UrYojO
https://ift.tt/2NIqBQK
Submitted March 06, 2019 at 09:10PM by zexterio
via reddit https://ift.tt/2UrYojO
VStarCam - An Investigative Security Journey - Part 1
https://ift.tt/2VFh0N7
Submitted March 06, 2019 at 08:49PM by redcodefinal
via reddit https://ift.tt/2Hi8YGb
https://ift.tt/2VFh0N7
Submitted March 06, 2019 at 08:49PM by redcodefinal
via reddit https://ift.tt/2Hi8YGb
blog.0x42424242.in
VStarCam - An Investigative Security Journey - Part 1
Hello everyone and welcome to my first post on my new blog! Today I wanted to talk about a project I've been working on, and detail some o...
Azeria-labs: ARM heap exploitation series
https://ift.tt/2HfI3L7
Submitted March 06, 2019 at 12:02PM by xchg_ax_ax
via reddit https://ift.tt/2TvRNHL
https://ift.tt/2HfI3L7
Submitted March 06, 2019 at 12:02PM by xchg_ax_ax
via reddit https://ift.tt/2TvRNHL
Azeria-Labs
Heap Exploitation Part 1: Understanding the Glibc Heap Implementation
How to Assess and Breach the Physical Environment for a Red Team
https://ift.tt/2HfA5BG
Submitted March 06, 2019 at 10:44PM by pentest4life
via reddit https://ift.tt/2tQsEZM
https://ift.tt/2HfA5BG
Submitted March 06, 2019 at 10:44PM by pentest4life
via reddit https://ift.tt/2tQsEZM
Medium
Top 5 Ways The Red Team breached and assessed the Physical Environment
We tailgate, skim and clone. Social engineer and deceived to employee and CISO alike, to get onsite and hit our “Breach” Physical, or…
[CVE-2019-5786] Chrome / Chromium severe bug
https://ift.tt/2EpHv2l
Submitted March 07, 2019 at 12:16AM by cowreth
via reddit https://ift.tt/2NMq1RK
https://ift.tt/2EpHv2l
Submitted March 07, 2019 at 12:16AM by cowreth
via reddit https://ift.tt/2NMq1RK
Chrome Releases
Stable Channel Update for Desktop
The stable channel has been updated to 72.0.3626.121 for Windows, Mac, and Linux, which will roll out over the coming days/weeks. Secur...
Tails on steroids: Vagabond Workstation
https://ift.tt/2XJiCY0
Submitted March 07, 2019 at 03:15AM by 1337shill
via reddit https://ift.tt/2SPytAO
https://ift.tt/2XJiCY0
Submitted March 07, 2019 at 03:15AM by 1337shill
via reddit https://ift.tt/2SPytAO
reddit
r/netsec - Tails on steroids: Vagabond Workstation
0 votes and 0 comments so far on Reddit
An Hour With Ghidra : The Good and The Ugly
https://ift.tt/2ESbLEc
Submitted March 07, 2019 at 08:53AM by fady_othman
via reddit https://ift.tt/2UrnPlm
https://ift.tt/2ESbLEc
Submitted March 07, 2019 at 08:53AM by fady_othman
via reddit https://ift.tt/2UrnPlm
My last submission wasn't "technical" enough
https://ift.tt/2VE67Lz
Submitted March 07, 2019 at 08:52AM by 1337shill
via reddit https://ift.tt/2Cc8b6h
https://ift.tt/2VE67Lz
Submitted March 07, 2019 at 08:52AM by 1337shill
via reddit https://ift.tt/2Cc8b6h
GitHub
vagabondworkstation/hedron
Mirror for http://a3dninefan3vhkhkw36cgesk4hlfzwkbj3done4iscp3na7jckrcypid.onion - vagabondworkstation/hedron
An Exercise in Practical Container Escapology [Exploit]
https://ift.tt/2EGp1dZ
Submitted March 07, 2019 at 07:11PM by elon2020
via reddit https://ift.tt/2tTV2dv
https://ift.tt/2EGp1dZ
Submitted March 07, 2019 at 07:11PM by elon2020
via reddit https://ift.tt/2tTV2dv
Capsule8
Container Escape: You Think That's Air You're Breathing? • Capsule8
Container escape exercise tutorial from C8 Labs with working exploit leveraging vulnerabilities CVE-2017-18344 and CVE-2017-1000112.
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android
https://ift.tt/2EUgSE2
Submitted March 07, 2019 at 09:24PM by franconezappa
via reddit https://ift.tt/2VLzxHV
https://ift.tt/2EUgSE2
Submitted March 07, 2019 at 09:24PM by franconezappa
via reddit https://ift.tt/2VLzxHV
Daniele Antonioli
Nearby Threats: Reversing, Analyzing, and Attacking Google’s ‘Nearby Connections’ on Android | Daniele Antonioli
Google’s Nearby Connections API enables any Android (and Android Things) application to provide proximity-based services to its users, regardless of their network connectivity. The API uses Bluetooth BR/EDR, Bluetooth LE and Wi-Fi to let “nearby” …
Security Researchers Discover 6 More Polyglot Malware Exploits Inside of Ad Networks
https://ift.tt/2EIJmQ1
Submitted March 07, 2019 at 09:03PM by ascetik
via reddit https://ift.tt/2XH8kro
https://ift.tt/2EIJmQ1
Submitted March 07, 2019 at 09:03PM by ascetik
via reddit https://ift.tt/2XH8kro
Adweek
Cybersecurity Firm Finds Increasingly Complex and Common Malware Inside of Ad Networks
Devcon says it’s found several polyglots.
Facebook Messenger server random memory exposure through corrupted GIF image
https://ift.tt/2IVtezW
Submitted March 07, 2019 at 10:27PM by albinowax
via reddit https://ift.tt/2TAWXCj
https://ift.tt/2IVtezW
Submitted March 07, 2019 at 10:27PM by albinowax
via reddit https://ift.tt/2TAWXCj
Vulnano
Facebook Messenger server random memory exposure through corrupted GIF image