Karta - IDA Plugin for identifying & matching statically linked open sources in your binary
https://ift.tt/2TSCvh6
Submitted March 21, 2019 at 08:36PM by eyalitki
via reddit https://ift.tt/2um9bjP
https://ift.tt/2TSCvh6
Submitted March 21, 2019 at 08:36PM by eyalitki
via reddit https://ift.tt/2um9bjP
Check Point Research
Karta – Matching Open Sources in Binaries - Check Point Research
Research by: Eyal Itkin Introduction “Karta” (Russian for “map”) is a source code assisted binary matching plugin for IDA. The plugin was developed to match symbols for an open source library in a very large binary, usually a firmware file. For those who…
Linux Security Modules (LSM) - From Concepts to Code Flow (By J.C. Scaly)
https://ift.tt/2Oh1hBu
Submitted March 21, 2019 at 09:24PM by scalys7
via reddit https://ift.tt/2FqnZUT
https://ift.tt/2Oh1hBu
Submitted March 21, 2019 at 09:24PM by scalys7
via reddit https://ift.tt/2FqnZUT
Google Docs
Linux Security Modules (LSM).pdf
XS-Search in Google Books
https://ift.tt/2Weh8nd
Submitted March 21, 2019 at 10:11PM by payloadartist
via reddit https://ift.tt/2UNwJKb
https://ift.tt/2Weh8nd
Submitted March 21, 2019 at 10:11PM by payloadartist
via reddit https://ift.tt/2UNwJKb
Medium
Google Books X-Hacking
Cross-Site Search on Google Books by abusing the XSS Auditor
High-power hash cracking on AWS with NPK
https://ift.tt/2TnBKHP
Submitted March 21, 2019 at 10:04PM by coalfirelabs
via reddit https://ift.tt/2OkF0Tf
https://ift.tt/2TnBKHP
Submitted March 21, 2019 at 10:04PM by coalfirelabs
via reddit https://ift.tt/2OkF0Tf
Coalfire.com
High-Power Hash Cracking with NPK
Unlike encryption, hashing isn’t reversible. The only way to “recover” the password from the hash is to make a guess as to what the password is, run it through the hashing algorithm, and see if the result matches the hash you have. At the end of the day though…
Linux Exploit Suggester 2: Kernel Privilege Escalation for Penetration Testing Environments
https://ift.tt/2r6by7N
Submitted March 22, 2019 at 12:32AM by ZeroDayHacker
via reddit https://ift.tt/2Cx3MuV
https://ift.tt/2r6by7N
Submitted March 22, 2019 at 12:32AM by ZeroDayHacker
via reddit https://ift.tt/2Cx3MuV
GitHub
jondonas/linux-exploit-suggester-2
Next-Generation Linux Kernel Exploit Suggester. Contribute to jondonas/linux-exploit-suggester-2 development by creating an account on GitHub.
[CVE-2019-5418] File Content Disclosure on Rails
https://chybeta.github.io/2019/03/16/Analysis-for【CVE-2019-5418】File-Content-Disclosure-on-Rails/
Submitted March 22, 2019 at 04:05AM by xtreak
via reddit https://ift.tt/2Tki5sd
https://chybeta.github.io/2019/03/16/Analysis-for【CVE-2019-5418】File-Content-Disclosure-on-Rails/
Submitted March 22, 2019 at 04:05AM by xtreak
via reddit https://ift.tt/2Tki5sd
Chybeta
Analysis for【CVE-2019-5418】File Content Disclosure on Rails
Chinese Edition: Ruby on Rails 路径穿越与任意文件读取漏洞分析 - 【CVE-2019-5418】
Java Serialization: A Practical Exploitation Guide
https://ift.tt/2FrlHVy
Submitted March 22, 2019 at 03:23PM by 0v3rl04d
via reddit https://ift.tt/2FsWF8x
https://ift.tt/2FrlHVy
Submitted March 22, 2019 at 03:23PM by 0v3rl04d
via reddit https://ift.tt/2FsWF8x
Rapid7
[Research] Java Serialization Objects (JSO): An Exploitation Guide
This research report explores how JSOs can be vulnerable to unsafe deserialization vulnerabilities, how Metasploit Framework can help validate, and more.
CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
https://ift.tt/2Uui3zo
Submitted March 22, 2019 at 06:33PM by Mempodipper
via reddit https://ift.tt/2uoNShL
https://ift.tt/2Uui3zo
Submitted March 22, 2019 at 06:33PM by Mempodipper
via reddit https://ift.tt/2uoNShL
Zero Day Initiative
CVE-2019-0604: Details of a Microsoft SharePoint RCE Vulnerability
Last month, Microsoft released patches to address two remote code execution (RCE) vulnerabilities in SharePoint. In both Critical-rated cases, an attacker could send a specially crafted request to execute their code in the context of the SharePoint application…
750,000 Medtronic defibrillators vulnerable to low-skill exploit
https://ift.tt/2Tn9pkQ
Submitted March 22, 2019 at 08:52PM by QuirkySpiceBush
via reddit https://ift.tt/2JLFdR9
https://ift.tt/2Tn9pkQ
Submitted March 22, 2019 at 08:52PM by QuirkySpiceBush
via reddit https://ift.tt/2JLFdR9
ics-cert.us-cert.gov
Medtronic Conexus Radio Frequency Telemetry Protocol | ICS-CERT
1. EXECUTIVE SUMMARYCVSS v9.3 ATTENTION: Exploitable with adjacent access/low skill level to exploitVendor: MedtronicEquipment: MyCareLink Monitor, CareLink Monitor, CareLink 2090 Programmer, specific Medtronic implanted cardiac devices listed belowVulnerabilities:…
This Spyware Data Leak Is So Bad We Can't Even Tell You About It
https://ift.tt/2CvIwG0
Submitted March 23, 2019 at 02:01AM by _Steamed_Hams
via reddit https://ift.tt/2ulYzS6
https://ift.tt/2CvIwG0
Submitted March 23, 2019 at 02:01AM by _Steamed_Hams
via reddit https://ift.tt/2ulYzS6
Motherboard
This Spyware Data Leak Is So Bad We Can't Even Tell You About It
A consumer spyware vendor left a lot of incredibly sensitive and private data, including intimate pictures and private call recordings, for all to see on a server freely accessible over the internet. And it still hasn’t taken the data down.
VStarCam - An Investigative Security Journey - Part 2
https://ift.tt/2UPqpBL
Submitted March 23, 2019 at 08:24AM by redcodefinal
via reddit https://ift.tt/2OiwaFC
https://ift.tt/2UPqpBL
Submitted March 23, 2019 at 08:24AM by redcodefinal
via reddit https://ift.tt/2OiwaFC
blog.0x42424242.in
VStarCam - An Investigative Security Journey - Part 2
In the last part , I covered the basics of the UDP protocol used by the camera, as well as some of the quirks and potential problems. In thi...
Endlessh: an SSH Tarpit
https://ift.tt/2WaMuv0
Submitted March 23, 2019 at 08:06AM by knotdjb
via reddit https://ift.tt/2TtzDCc
https://ift.tt/2WaMuv0
Submitted March 23, 2019 at 08:06AM by knotdjb
via reddit https://ift.tt/2TtzDCc
reddit
r/netsec - Endlessh: an SSH Tarpit
0 votes and 1 comment so far on Reddit
Researchers reveal high-risk vulnerabilities in Chrome for Android
https://ift.tt/2HPdhsW
Submitted March 23, 2019 at 04:59PM by modigliani88
via reddit https://ift.tt/2FvqKV2
https://ift.tt/2HPdhsW
Submitted March 23, 2019 at 04:59PM by modigliani88
via reddit https://ift.tt/2FvqKV2
reddit
r/netsec - Researchers reveal high-risk vulnerabilities in Chrome for Android
0 votes and 0 comments so far on Reddit
Hack The Box - Frolic Write-up by 0xRick
https://ift.tt/2HEgZ9f
Submitted March 23, 2019 at 08:34PM by Ahm3d_H3sham
via reddit https://ift.tt/2OluBXA
https://ift.tt/2HEgZ9f
Submitted March 23, 2019 at 08:34PM by Ahm3d_H3sham
via reddit https://ift.tt/2OluBXA
0xRick Owned Root !
Hack The Box - Frolic
Quick Summary Hey guys today frolic retired and here is my write-up about it. This box was more of a CTF challenge than a real world scenario , especially the user part , But it was nice because for root we will exploit a buffer overflow vulnerability. It’s…
fridump3: A universal memory dumper using Frida for Python 3
https://ift.tt/2M6kIyw
Submitted March 24, 2019 at 12:50AM by Titokhan
via reddit https://ift.tt/2U3CYMR
https://ift.tt/2M6kIyw
Submitted March 24, 2019 at 12:50AM by Titokhan
via reddit https://ift.tt/2U3CYMR
GitHub
rootbsd/fridump3
A universal memory dumper using Frida for Python 3 - rootbsd/fridump3
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
https://ift.tt/2U5uLHO
Submitted March 24, 2019 at 12:42AM by clash1111
via reddit https://ift.tt/2HPl8qe
https://ift.tt/2U5uLHO
Submitted March 24, 2019 at 12:42AM by clash1111
via reddit https://ift.tt/2HPl8qe
NY Times
A New Age of Warfare: How Internet Mercenaries Do Battle for Authoritarian Governments
Sophisticated surveillance, once the domain of world powers, is increasingly available on the private market. Smaller countries are seizing on the tools — sometimes for darker purposes.
Beagle: Accelerating incident response with graphs
https://ift.tt/2UQWWra
Submitted March 24, 2019 at 08:09PM by splinks
via reddit https://ift.tt/2HC0QBt
https://ift.tt/2UQWWra
Submitted March 24, 2019 at 08:09PM by splinks
via reddit https://ift.tt/2HC0QBt
GitHub
yampelo/beagle
Beagle is an incident response and digital forensics tool which transforms security logs and data into graphs. - yampelo/beagle
Peer to peer VPN Nodes Program
https://ift.tt/2VVJBOo
Submitted March 24, 2019 at 11:11PM by MystCommunityManager
via reddit https://ift.tt/2USx7XZ
https://ift.tt/2VVJBOo
Submitted March 24, 2019 at 11:11PM by MystCommunityManager
via reddit https://ift.tt/2USx7XZ
Typeform
Mysterium Node Runner Survey
Turn data collection into an experience with Typeform. Create beautiful online forms, surveys, quizzes, and so much more. Try it for FREE.
Disclosure of Origin IP of The Exploits Trading Platform 0day.today
https://ift.tt/2TTzfCd
Submitted March 25, 2019 at 10:03AM by payloadartist
via reddit https://ift.tt/2FztIIm
https://ift.tt/2TTzfCd
Submitted March 25, 2019 at 10:03AM by payloadartist
via reddit https://ift.tt/2FztIIm
Infosec Writers Guild
Origin IP of The Exploits Trading Platform 0day.today
Ever wondered where the origin server for the popular zero day exploit platform 0day-today is? PayLoadArtist found out.
Paranoid Habits. Security Tips
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
https://ift.tt/2CBL0Cx
Submitted March 25, 2019 at 02:51PM by pragmader
via reddit https://ift.tt/2WiX1nS
pragmader.me
Pragmatic Blog: Denis Rechkunov – Paranoid Habits. Security Tips
This is another write up of my recent talk where I share what tools and techniques I use to protect myself from being hacked.
Let SIEM and EDR Coexist.
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
https://ift.tt/2HPSFAJ
Submitted March 25, 2019 at 07:59PM by hackerxbella
via reddit https://ift.tt/2FxWGHo
Cybereason
Use SIEM and EDR Together to Improve Defenses and Save Money
In this white paper, we explore the complementary and interdependent uses of SIEM, SOAR, and EDR technologies. By using these tools in conjunction with clearly defined roles, security operations teams can reduce costs, improve security, and assist human intelligence…