Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
https://ift.tt/2ULgQE4
Submitted March 21, 2019 at 04:55AM by IUsedToBeACave
via reddit https://ift.tt/2WcnJyn
https://ift.tt/2ULgQE4
Submitted March 21, 2019 at 04:55AM by IUsedToBeACave
via reddit https://ift.tt/2WcnJyn
Medium
Authenticated Arbitrary Command Execution on PostgreSQL 9.3 > Latest
PostgreSQL from 9.3 to latest has functionality allowing the database superuser & users in the ‘pg_read_server_files’ to execute OS…
Credit Karma's Android App Uses Insecure HTTP (Phishing Risk)
https://ift.tt/2Fq3Ezi
Submitted March 21, 2019 at 11:10AM by Soatok
via reddit https://ift.tt/2HE8oDR
https://ift.tt/2Fq3Ezi
Submitted March 21, 2019 at 11:10AM by Soatok
via reddit https://ift.tt/2HE8oDR
Gist
Credit Karma App Uses Insecure HTTP
Credit Karma App Uses Insecure HTTP. GitHub Gist: instantly share code, notes, and snippets.
Ironing Out Docker: Docker security overview
https://ift.tt/2ukslXl
Submitted March 21, 2019 at 03:55PM by nindustries
via reddit https://ift.tt/2FjWonj
https://ift.tt/2ukslXl
Submitted March 21, 2019 at 03:55PM by nindustries
via reddit https://ift.tt/2FjWonj
reddit
r/netsec - Ironing Out Docker: Docker security overview
0 votes and 0 comments so far on Reddit
Understanding STIR/SHAKEN (anti robocall protocol)
https://ift.tt/2TVakgI
Submitted March 21, 2019 at 04:15PM by ga-vu
via reddit https://ift.tt/2UIYW4N
https://ift.tt/2TVakgI
Submitted March 21, 2019 at 04:15PM by ga-vu
via reddit https://ift.tt/2UIYW4N
reddit
r/netsec - Understanding STIR/SHAKEN (anti robocall protocol)
0 votes and 0 comments so far on Reddit
SigintOS: A Wireless Pentest Distro Review
https://ift.tt/2UKPH4f
Submitted March 21, 2019 at 04:51PM by xaocuc
via reddit https://ift.tt/2Wbugtb
https://ift.tt/2UKPH4f
Submitted March 21, 2019 at 04:51PM by xaocuc
via reddit https://ift.tt/2Wbugtb
Medium
SigintOS: A Wireless Pentest Distro Review
Good news! There’s new security distro called SigintOS becoming available for download. SigintOS is an Ubuntu based distribution with a…
CarbonCopy: A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion
https://ift.tt/2UfMBoh
Submitted March 21, 2019 at 04:42PM by Titokhan
via reddit https://ift.tt/2TNuWbq
https://ift.tt/2UfMBoh
Submitted March 21, 2019 at 04:42PM by Titokhan
via reddit https://ift.tt/2TNuWbq
GitHub
paranoidninja/CarbonCopy
A tool which creates a spoofed certificate of any online website and signs an Executable for AV Evasion. Works for both Windows and Linux - paranoidninja/CarbonCopy
Ironing Out Docker: Security Overview
https://ift.tt/2CtbhmI
Submitted March 21, 2019 at 05:24PM by nindustries
via reddit https://ift.tt/2U0aljr
https://ift.tt/2CtbhmI
Submitted March 21, 2019 at 05:24PM by nindustries
via reddit https://ift.tt/2U0aljr
Reversing Go Programs
https://ift.tt/2CvI7Df
Submitted March 21, 2019 at 08:15PM by nishan8583
via reddit https://ift.tt/2UMBeVp
https://ift.tt/2CvI7Df
Submitted March 21, 2019 at 08:15PM by nishan8583
via reddit https://ift.tt/2UMBeVp
Medium
Reversing Golang Binaries: Part-1
In this blog I will attempt to understand and share my understanding of how go binaries look when compiled and then disassembled. I used…
Karta - IDA Plugin for identifying & matching statically linked open sources in your binary
https://ift.tt/2TSCvh6
Submitted March 21, 2019 at 08:36PM by eyalitki
via reddit https://ift.tt/2um9bjP
https://ift.tt/2TSCvh6
Submitted March 21, 2019 at 08:36PM by eyalitki
via reddit https://ift.tt/2um9bjP
Check Point Research
Karta – Matching Open Sources in Binaries - Check Point Research
Research by: Eyal Itkin Introduction “Karta” (Russian for “map”) is a source code assisted binary matching plugin for IDA. The plugin was developed to match symbols for an open source library in a very large binary, usually a firmware file. For those who…
Linux Security Modules (LSM) - From Concepts to Code Flow (By J.C. Scaly)
https://ift.tt/2Oh1hBu
Submitted March 21, 2019 at 09:24PM by scalys7
via reddit https://ift.tt/2FqnZUT
https://ift.tt/2Oh1hBu
Submitted March 21, 2019 at 09:24PM by scalys7
via reddit https://ift.tt/2FqnZUT
Google Docs
Linux Security Modules (LSM).pdf
XS-Search in Google Books
https://ift.tt/2Weh8nd
Submitted March 21, 2019 at 10:11PM by payloadartist
via reddit https://ift.tt/2UNwJKb
https://ift.tt/2Weh8nd
Submitted March 21, 2019 at 10:11PM by payloadartist
via reddit https://ift.tt/2UNwJKb
Medium
Google Books X-Hacking
Cross-Site Search on Google Books by abusing the XSS Auditor
High-power hash cracking on AWS with NPK
https://ift.tt/2TnBKHP
Submitted March 21, 2019 at 10:04PM by coalfirelabs
via reddit https://ift.tt/2OkF0Tf
https://ift.tt/2TnBKHP
Submitted March 21, 2019 at 10:04PM by coalfirelabs
via reddit https://ift.tt/2OkF0Tf
Coalfire.com
High-Power Hash Cracking with NPK
Unlike encryption, hashing isn’t reversible. The only way to “recover” the password from the hash is to make a guess as to what the password is, run it through the hashing algorithm, and see if the result matches the hash you have. At the end of the day though…
Linux Exploit Suggester 2: Kernel Privilege Escalation for Penetration Testing Environments
https://ift.tt/2r6by7N
Submitted March 22, 2019 at 12:32AM by ZeroDayHacker
via reddit https://ift.tt/2Cx3MuV
https://ift.tt/2r6by7N
Submitted March 22, 2019 at 12:32AM by ZeroDayHacker
via reddit https://ift.tt/2Cx3MuV
GitHub
jondonas/linux-exploit-suggester-2
Next-Generation Linux Kernel Exploit Suggester. Contribute to jondonas/linux-exploit-suggester-2 development by creating an account on GitHub.
[CVE-2019-5418] File Content Disclosure on Rails
https://chybeta.github.io/2019/03/16/Analysis-for【CVE-2019-5418】File-Content-Disclosure-on-Rails/
Submitted March 22, 2019 at 04:05AM by xtreak
via reddit https://ift.tt/2Tki5sd
https://chybeta.github.io/2019/03/16/Analysis-for【CVE-2019-5418】File-Content-Disclosure-on-Rails/
Submitted March 22, 2019 at 04:05AM by xtreak
via reddit https://ift.tt/2Tki5sd
Chybeta
Analysis for【CVE-2019-5418】File Content Disclosure on Rails
Chinese Edition: Ruby on Rails 路径穿越与任意文件读取漏洞分析 - 【CVE-2019-5418】
Java Serialization: A Practical Exploitation Guide
https://ift.tt/2FrlHVy
Submitted March 22, 2019 at 03:23PM by 0v3rl04d
via reddit https://ift.tt/2FsWF8x
https://ift.tt/2FrlHVy
Submitted March 22, 2019 at 03:23PM by 0v3rl04d
via reddit https://ift.tt/2FsWF8x
Rapid7
[Research] Java Serialization Objects (JSO): An Exploitation Guide
This research report explores how JSOs can be vulnerable to unsafe deserialization vulnerabilities, how Metasploit Framework can help validate, and more.
CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
https://ift.tt/2Uui3zo
Submitted March 22, 2019 at 06:33PM by Mempodipper
via reddit https://ift.tt/2uoNShL
https://ift.tt/2Uui3zo
Submitted March 22, 2019 at 06:33PM by Mempodipper
via reddit https://ift.tt/2uoNShL
Zero Day Initiative
CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
Last month, Microsoft released patches to address two remote code execution (RCE) vulnerabilities in SharePoint. In both Critical-rated cases, an attacker could send a specially crafted request to execute their code in the context of the SharePoint application…
750,000 Medtronic defibrillators vulnerable to low-skill exploit
https://ift.tt/2Tn9pkQ
Submitted March 22, 2019 at 08:52PM by QuirkySpiceBush
via reddit https://ift.tt/2JLFdR9
https://ift.tt/2Tn9pkQ
Submitted March 22, 2019 at 08:52PM by QuirkySpiceBush
via reddit https://ift.tt/2JLFdR9
ics-cert.us-cert.gov
Medtronic Conexus Radio Frequency Telemetry Protocol | ICS-CERT
1. EXECUTIVE SUMMARYCVSS v9.3 ATTENTION: Exploitable with adjacent access/low skill level to exploitVendor: MedtronicEquipment: MyCareLink Monitor, CareLink Monitor, CareLink 2090 Programmer, specific Medtronic implanted cardiac devices listed belowVulnerabilities:…
This Spyware Data Leak Is So Bad We Can't Even Tell You About It
https://ift.tt/2CvIwG0
Submitted March 23, 2019 at 02:01AM by _Steamed_Hams
via reddit https://ift.tt/2ulYzS6
https://ift.tt/2CvIwG0
Submitted March 23, 2019 at 02:01AM by _Steamed_Hams
via reddit https://ift.tt/2ulYzS6
Motherboard
This Spyware Data Leak Is So Bad We Can't Even Tell You About It
A consumer spyware vendor left a lot of incredibly sensitive and private data, including intimate pictures and private call recordings, for all to see on a server freely accessible over the internet. And it still hasn’t taken the data down.
VStarCam - An Investigative Security Journey - Part 2
https://ift.tt/2UPqpBL
Submitted March 23, 2019 at 08:24AM by redcodefinal
via reddit https://ift.tt/2OiwaFC
https://ift.tt/2UPqpBL
Submitted March 23, 2019 at 08:24AM by redcodefinal
via reddit https://ift.tt/2OiwaFC
blog.0x42424242.in
VStarCam - An Investigative Security Journey - Part 2
In the last part , I covered the basics of the UDP protocol used by the camera, as well as some of the quirks and potential problems. In thi...
Endlessh: an SSH Tarpit
https://ift.tt/2WaMuv0
Submitted March 23, 2019 at 08:06AM by knotdjb
via reddit https://ift.tt/2TtzDCc
https://ift.tt/2WaMuv0
Submitted March 23, 2019 at 08:06AM by knotdjb
via reddit https://ift.tt/2TtzDCc
reddit
r/netsec - Endlessh: an SSH Tarpit
0 votes and 1 comment so far on Reddit
Researchers reveal high-risk vulnerabilities in Chrome for Android
https://ift.tt/2HPdhsW
Submitted March 23, 2019 at 04:59PM by modigliani88
via reddit https://ift.tt/2FvqKV2
https://ift.tt/2HPdhsW
Submitted March 23, 2019 at 04:59PM by modigliani88
via reddit https://ift.tt/2FvqKV2
reddit
r/netsec - Researchers reveal high-risk vulnerabilities in Chrome for Android
0 votes and 0 comments so far on Reddit