Tomcat exploit variant : host-manager
https://ift.tt/2Hm7WZV
Submitted March 08, 2019 at 02:52PM by __SamBeckS__
via reddit https://ift.tt/2Ce8k9j
https://ift.tt/2Hm7WZV
Submitted March 08, 2019 at 02:52PM by __SamBeckS__
via reddit https://ift.tt/2Ce8k9j
3 million vehicles can be unlocked remotely via trivially discovered web API vulnerability
https://ift.tt/2VEGMB6
Submitted March 08, 2019 at 04:55PM by cybergibbons
via reddit https://ift.tt/2UrY3xs
https://ift.tt/2VEGMB6
Submitted March 08, 2019 at 04:55PM by cybergibbons
via reddit https://ift.tt/2UrY3xs
Pentestpartners
Gone in six seconds? Exploiting car alarms | Pen Test Partners
Key relay attacks against keyless entry vehicles are well known. Many 3rd party car alarm vendors market themselves as solutions to this. We have shown that
WebTech, identify technologies used on websites
https://ift.tt/2TDS3Vc
Submitted March 08, 2019 at 07:21PM by smaury
via reddit https://ift.tt/2HlUzZt
https://ift.tt/2TDS3Vc
Submitted March 08, 2019 at 07:21PM by smaury
via reddit https://ift.tt/2HlUzZt
Shielder
WebTech, identify technologies used on websites - Shielder
WebTech is a tool and a Burp extension capable of analyzing web pages and report used web technologies, frameworks and versions.
Mapping the state of the .gov.uk domain space
https://ift.tt/2SU02ca
Submitted March 09, 2019 at 01:33AM by Quick_Stick
via reddit https://ift.tt/2TplNFV
https://ift.tt/2SU02ca
Submitted March 09, 2019 at 01:33AM by Quick_Stick
via reddit https://ift.tt/2TplNFV
GitHub
tg12/MappingGovUKDomains
A look into the "state" of the .gov.uk namespace. Contribute to tg12/MappingGovUKDomains development by creating an account on GitHub.
Multiple Persistent XSS into RCE Walkthrough -- Cantemo Portal Version 3.8.4
https://ift.tt/2EQsFSO
Submitted March 09, 2019 at 02:54AM by SilentEcho
via reddit https://ift.tt/2TnMWcm
https://ift.tt/2EQsFSO
Submitted March 09, 2019 at 02:54AM by SilentEcho
via reddit https://ift.tt/2TnMWcm
Bishop Fox
Cantemo Portal Version 3.8.4 - Cross-Site Scripting - Bishop Fox
Product Vendor Cantemo AB Product Denoscription Cantemo AB is a software systems and technology vendor for major media outlets. The Cantemo Portal application is a high-performance media asset management tool. The latest version at the time of this research…
Russian hackers are eight times faster than North Korean groups
https://ift.tt/2Hqrf47
Submitted March 09, 2019 at 02:56PM by Akkeri
via reddit https://ift.tt/2VOs9ez
https://ift.tt/2Hqrf47
Submitted March 09, 2019 at 02:56PM by Akkeri
via reddit https://ift.tt/2VOs9ez
MIT Technology Review
Russian hackers are eight times faster than North Korean groups
Russian hackers are way ahead of the next-fastest state-sponsored hackers, North Korea, who themselves are nearly twice as fast as Chinese groups, according to a new report by US cybersecurity firm Crowdstrike.
Hack The Box - Ethereal write-up by 0xRick
https://ift.tt/2F08dQG
Submitted March 09, 2019 at 08:28PM by Ahm3d_H3sham
via reddit https://ift.tt/2UqHSjO
https://ift.tt/2F08dQG
Submitted March 09, 2019 at 08:28PM by Ahm3d_H3sham
via reddit https://ift.tt/2UqHSjO
0xRick Owned Root !
Hack The Box - Ethereal
Introduction Hey guys today Ethereal retired and here is my write-up about it. And as the difficulty says , It’s insane ! The most annoying part about this box is that it was very hard to enumerate because we only get a blind RCE and the firewall rules made…
NMAP 101 - RTFM
https://ift.tt/2H9q0XO
Submitted March 10, 2019 at 12:43AM by ZephrX112
via reddit https://ift.tt/2HnGT0i
https://ift.tt/2H9q0XO
Submitted March 10, 2019 at 12:43AM by ZephrX112
via reddit https://ift.tt/2HnGT0i
ZeroSec - Adventures In Information Security
NMAP Tips: RTFM?
NMAP TL;DR
It's a tool used for portscanning and this post will explore some of the common
and useful flags that can be used while scanning to pick up usful information
about targets.
What Is NMAP?
Nmap or Network mapper is an open source tool for network…
It's a tool used for portscanning and this post will explore some of the common
and useful flags that can be used while scanning to pick up usful information
about targets.
What Is NMAP?
Nmap or Network mapper is an open source tool for network…
Writing a Password Protected Reverse Shell (Linux/x64)
https://ift.tt/2TGuqLF
Submitted March 10, 2019 at 10:23PM by h41zum
via reddit https://ift.tt/2F0XyoP
https://ift.tt/2TGuqLF
Submitted March 10, 2019 at 10:23PM by h41zum
via reddit https://ift.tt/2F0XyoP
Medium
Writing a Password Protected Reverse Shell (Linux/x64)
Let’s write some shellcode, shall we?
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications
https://ift.tt/2UqJCtf
Submitted March 11, 2019 at 04:10AM by splinter_code
via reddit https://ift.tt/2SVeP6r
https://ift.tt/2UqJCtf
Submitted March 11, 2019 at 04:10AM by splinter_code
via reddit https://ift.tt/2SVeP6r
GitHub
antonioCoco/SharPyShell
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications - antonioCoco/SharPyShell
Inserting arbitrary files into Google Earth Studio Projects Archives
https://ift.tt/2SXTDN4
Submitted March 11, 2019 at 04:06AM by ThomasCZ
via reddit https://ift.tt/2Cg3us4
https://ift.tt/2SXTDN4
Submitted March 11, 2019 at 04:06AM by ThomasCZ
via reddit https://ift.tt/2Cg3us4
Thomas Orlita's blog
Inserting arbitrary files into Google Earth Projects Archives - Thomas Orlita's blog
Thanks to multiple combined vulnerabilities we are able to insert arbitrary files into anyone's Google Earth Studio Projects Archive.
MouseJack: From Mouse to Shell - Part 2 - Fixed Mice and JackIt + SILENTTRINITY = Defender Bypass
https://ift.tt/2Hq0aOz
Submitted March 11, 2019 at 03:36AM by InfoSecJim
via reddit https://ift.tt/2J4T7NB
https://ift.tt/2Hq0aOz
Submitted March 11, 2019 at 03:36AM by InfoSecJim
via reddit https://ift.tt/2J4T7NB
Jim Wilbur's Blog
MouseJack: From Mouse to Shell - Part 2
MouseJack was publicly disclosed in 2016 & an exploit was later released named JackIt. Part 2 explains how to use SILENTTRINTIY + JackIt to bypass Defender.
sec4dev 2019 slides & videos
https://sec4dev.io/2019
Submitted March 11, 2019 at 08:02AM by ninoseki
via reddit https://ift.tt/2TpNFcW
https://sec4dev.io/2019
Submitted March 11, 2019 at 08:02AM by ninoseki
via reddit https://ift.tt/2TpNFcW
sec4dev
sec4dev – the security Conference & Bootcamp for developers. Let's make security a first-class citizen in software development!
The sec4dev Conference & Bootcamp is a Vienna-based security event which targets one very specific group: people involved in software…
The sec4dev Conference & Bootcamp is a Vienna-based security event which targets one very specific group: people involved in software…
21-Year Old Tech Entrepreneur claims “I am the World’s First Trillionaire”
https://ift.tt/2EOXEyx
Submitted March 11, 2019 at 11:58AM by Alexandra7352
via reddit https://ift.tt/2TFzKif
https://ift.tt/2EOXEyx
Submitted March 11, 2019 at 11:58AM by Alexandra7352
via reddit https://ift.tt/2TFzKif
Medium
I am the World’s First Trillionaire
Last year you may have heard the news that I would soon become the world’s first trillionaire. I was being modest at the time because I…
AnchorWatch - A Rogue Device Detection Script for Windows with Email Alerts. I wrote a PowerShell noscript that scans subnet(s) every X minutes and sends email alerts on each discovery.
https://ift.tt/2SV9vA8
Submitted March 11, 2019 at 02:52PM by i_rsX
via reddit https://ift.tt/2XQtJib
https://ift.tt/2SV9vA8
Submitted March 11, 2019 at 02:52PM by i_rsX
via reddit https://ift.tt/2XQtJib
GitHub
GitHub - iamrootsh3ll/AnchorWatch: A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem
A Rogue Device Detection Script with Email Alerts Functionality for Windows Subsystem - GitHub - iamrootsh3ll/AnchorWatch: A Rogue Device Detection Script with Email Alerts Functionality for Window...
The National Vulnerability Database (NVD) is one of the most valuable resources available in the fight to keep our software products safe. Here's the NVD Explained
https://ift.tt/2XONLcO
Submitted March 11, 2019 at 04:23PM by c3a1r1
via reddit https://ift.tt/2HcH8fi
https://ift.tt/2XONLcO
Submitted March 11, 2019 at 04:23PM by c3a1r1
via reddit https://ift.tt/2HcH8fi
Whitesourcesoftware
The National Vulnerability Database Explained
The National Vulnerability Database is the leading resource for software vulnerabilities. We break down what you need to know to make the most of it.
"If you want, I can store the encrypted password." - A Password-Storage Field Study with Freelance Developers [PDF]
https://ift.tt/2NSgdpL
Submitted March 11, 2019 at 06:10PM by maisels
via reddit https://ift.tt/2VROAjb
https://ift.tt/2NSgdpL
Submitted March 11, 2019 at 06:10PM by maisels
via reddit https://ift.tt/2VROAjb
How to Discover Unprotected MongoDB and Elasticsearch Databases
https://ift.tt/2Ceo0cD
Submitted March 11, 2019 at 07:58PM by atomlib_com
via reddit https://ift.tt/2TCwcxp
https://ift.tt/2Ceo0cD
Submitted March 11, 2019 at 07:58PM by atomlib_com
via reddit https://ift.tt/2TCwcxp
Habr
How to Discover MongoDB and Elasticsearch Open Databases
Some time ago among security researchers, it was very “fashionable” to find improperly configured AWS cloud storages with various kinds of confidential inf...
Pandora's Box: Another New Way to Leak All Your Sensitive Data
https://ift.tt/2VPPIDS
Submitted March 11, 2019 at 08:07PM by ok_bye_now_
via reddit https://ift.tt/2UxaTdE
https://ift.tt/2VPPIDS
Submitted March 11, 2019 at 08:07PM by ok_bye_now_
via reddit https://ift.tt/2UxaTdE
Adversis
Pandora's Box: Another New Way to Leak All Your Sensitive Data
We discovered hundreds of thousands of documents and terabytes of data exposed across hundreds of customers…
c0c0n XII CFP is now Open | Closing Date - 12 May 2019
https://ift.tt/2CajRX1
Submitted March 11, 2019 at 09:57PM by pr4jwal
via reddit https://ift.tt/2TEP4f8
https://ift.tt/2CajRX1
Submitted March 11, 2019 at 09:57PM by pr4jwal
via reddit https://ift.tt/2TEP4f8
is-ra.org
CFP Closing Date - 12 May 2019 | c0c0n 12 | Hacking and Cyber Security Briefing
Building an Office macro to spoof parent processes and command line arguments
https://ift.tt/2NVpf54
Submitted March 12, 2019 at 04:22AM by thorn42
via reddit https://ift.tt/2F6Cn4F
https://ift.tt/2NVpf54
Submitted March 12, 2019 at 04:22AM by thorn42
via reddit https://ift.tt/2F6Cn4F
Christophe Tafani-Dereeper
Building an Office macro to spoof parent processes and command line arguments - Christophe Tafani-Dereeper
Most modern EDR solutions use behavioral detection, allowing to detect malware based on how it behaves instead of solely using static indicators of compromise (IoC) like file hashes or domain names. In this post, I give a VBA implementation of two techniques…