Metasploit Development Diaries: Q1 2019
https://ift.tt/2FtkqMK
Submitted March 26, 2019 at 10:51PM by wtfse
via reddit https://ift.tt/2FDue83
https://ift.tt/2FtkqMK
Submitted March 26, 2019 at 10:51PM by wtfse
via reddit https://ift.tt/2FDue83
Rapid7
Metasploit Dev Diaries: How Vulns Become Metasploit Modules
Metasploit’s Development Diaries series sheds light on how Rapid7’s offensive research team analyzes vulnerabilities as potential candidates for inclusion in Metasploit Framework.
Minimal docker container of Parrot OS for running an automated pentest.
https://ift.tt/2WrpsQB
Submitted March 26, 2019 at 11:12PM by vishnudxb
via reddit https://ift.tt/2UVXqwr
https://ift.tt/2WrpsQB
Submitted March 26, 2019 at 11:12PM by vishnudxb
via reddit https://ift.tt/2UVXqwr
GitHub
vishnudxb/automated-pentest
Minimal docker container of Parrot OS for running an automated pentest. - vishnudxb/automated-pentest
Hackerone $50M CTF Writeup
https://ift.tt/2UcYnDi
Submitted March 27, 2019 at 02:20AM by payloadartist
via reddit https://ift.tt/2JDIcuv
https://ift.tt/2UcYnDi
Submitted March 27, 2019 at 02:20AM by payloadartist
via reddit https://ift.tt/2JDIcuv
GitHub
manoelt/50M_CTF_Writeup
$50 Million CTF from Hackerone - Writeup. Contribute to manoelt/50M_CTF_Writeup development by creating an account on GitHub.
Bypassing AV (Windows Defender) … Part II - Automation!
https://ift.tt/2HHoA7a
Submitted March 27, 2019 at 05:52AM by unru1yboss
via reddit https://ift.tt/2Wpszsi
https://ift.tt/2HHoA7a
Submitted March 27, 2019 at 05:52AM by unru1yboss
via reddit https://ift.tt/2Wpszsi
CYBERGUIDER IT SERVICES INC.
Bypassing AV (Windows Defender)
Dont rely on AntiVirus (AV) as your security conrnerstone. Bypassing AV (Windows Defender) is still as trivial as ever ... Part II.
SecApps Recon - Maltego Alternative with powerful commnd-line interpretability via Pown.js
https://ift.tt/1MYXdBh
Submitted March 27, 2019 at 07:42PM by _pdp_
via reddit https://ift.tt/2U8uHas
https://ift.tt/1MYXdBh
Submitted March 27, 2019 at 07:42PM by _pdp_
via reddit https://ift.tt/2U8uHas
Secapps
Open Source Intelligence (OSINT) Tool
Advanced information gathering and target recon tool for OSINT activities.
NVIDIA Arbitrary File Writes to Command Execution CVE-2019-5674
https://ift.tt/2TZPNsf
Submitted March 27, 2019 at 09:36PM by hackers_and_builders
via reddit https://ift.tt/2JJcBYA
https://ift.tt/2TZPNsf
Submitted March 27, 2019 at 09:36PM by hackers_and_builders
via reddit https://ift.tt/2JJcBYA
Rhino Security Labs
NVIDIA Arbitrary File Writes to Command Execution | CVE-2019-5674 - Rhino Security Labs
A walkthrough of exploiting NVIDIA GeForce Experience through arbitrary file overwrites, CVE-2019-5674.
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets)
https://ift.tt/2JGS72F
Submitted March 27, 2019 at 10:59PM by dukeofmola
via reddit https://ift.tt/2CIJ4rU
https://ift.tt/2JGS72F
Submitted March 27, 2019 at 10:59PM by dukeofmola
via reddit https://ift.tt/2CIJ4rU
Sequoia
A Pentester's Guide - Part 1 (OSINT - Passive Recon and Discovery of Assets) | Sequoia
To kick off this series on offensive security techniques, I am going to begin with what I consider to be the most important aspects of pentesting. Passi...
Android Runtime Restrictions Bypass
https://ift.tt/2V0ANa6
Submitted March 28, 2019 at 12:35AM by jeandrew
via reddit https://ift.tt/2CBIGLJ
https://ift.tt/2V0ANa6
Submitted March 28, 2019 at 12:35AM by jeandrew
via reddit https://ift.tt/2CBIGLJ
GitHub
quarkslab/android-restriction-bypass
PoC to bypass Android restrictions. Contribute to quarkslab/android-restriction-bypass development by creating an account on GitHub.
Easily curl services secured by mutual TLS with step
https://ift.tt/2CBe25p
Submitted March 28, 2019 at 03:40AM by kagvaBwIcfpi
via reddit https://ift.tt/2uwNU7b
https://ift.tt/2CBe25p
Submitted March 28, 2019 at 03:40AM by kagvaBwIcfpi
via reddit https://ift.tt/2uwNU7b
Smallstep
Unlike an inventory of machines or services, user identities are usually already managed by existing G-Suite, Okta, Salesforce, or Microsoft Office 365. Almost all of these enterprise services expose OpenID Connect identity providers which are a suite of…
We had a number of questions about the hack demo, so here's a quick explanation of what we did. Note none of these exploit are particularly savvy or new, what IS new is using an ad tool to do them in about 10 minutes to illustrate how big of a concern ad tech/ad threat is becoming.
https://ift.tt/2FGEf4y
Submitted March 28, 2019 at 04:26AM by DEVCON3PJS
via reddit https://ift.tt/2HGRRyI
https://ift.tt/2FGEf4y
Submitted March 28, 2019 at 04:26AM by DEVCON3PJS
via reddit https://ift.tt/2HGRRyI
reddit
r/adops - We had a number of questions about the hack demo, so here's a quick explanation of what we did. Note none of these exploit…
0 votes and 0 comments so far on Reddit
BSidesSF 2019 Videos
https://www.youtube.com/BSidesSFTV?mc_cid=dfd16f0c14&mc_eid=ccd82f0038
Submitted March 27, 2019 at 08:17PM by sastdast
via reddit https://ift.tt/2TE2jsf
https://www.youtube.com/BSidesSFTV?mc_cid=dfd16f0c14&mc_eid=ccd82f0038
Submitted March 27, 2019 at 08:17PM by sastdast
via reddit https://ift.tt/2TE2jsf
YouTube
Security BSides San Francisco
Security BSides San Francisco is a two-day information security conference. It is a conference by the community for the community.
XSSearch technique for Cross-Site Content and Status Type Leakage
https://ift.tt/2TGFN1U
Submitted March 28, 2019 at 07:18PM by payloadartist
via reddit https://ift.tt/2TB6wNu
https://ift.tt/2TGFN1U
Submitted March 28, 2019 at 07:18PM by payloadartist
via reddit https://ift.tt/2TB6wNu
Medium
Cross-Site Content and Status Types Leakage
A brand new technique for detecting the content-type and the HTTP status of the cross-origin response via object typemustmatch attribute.
Vulnserver LTER - Extreme SEH Overwrite (Part 1)
https://ift.tt/2V3dsVg
Submitted March 29, 2019 at 02:58AM by doylersec
via reddit https://ift.tt/2CIk0Sa
https://ift.tt/2V3dsVg
Submitted March 29, 2019 at 02:58AM by doylersec
via reddit https://ift.tt/2CIk0Sa
doyler.net
Vulnserver LTER - Extreme SEH Overwrite (Part 1) | doyler.net
I know this one took a bit longer, but I've finally finished up my Vulnserver LTER write-up. Vulnserver LTER - Introduction If you have not been following along, I'm slowly writing all the exploits for vulnserver. This one will be … Continue reading →
N.S.A. Contractor Hal Martin, Arrested in Biggest Breach of U.S. Secrets, Pleads Guilty
https://ift.tt/2JQKqqG
Submitted March 29, 2019 at 02:27AM by dadoftwins71309
via reddit https://ift.tt/2YyW7FC
https://ift.tt/2JQKqqG
Submitted March 29, 2019 at 02:27AM by dadoftwins71309
via reddit https://ift.tt/2YyW7FC
NY Times
N.S.A. Contractor Arrested in Biggest Breach of U.S. Secrets Pleads Guilty
The contractor, Harold Martin, was arrested in 2016, but investigators never found evidence that he had shared stolen classified information with anyone.
Cisco RV320 Command Injection. Again.
https://ift.tt/2CHDczr
Submitted March 29, 2019 at 01:44AM by xaocuc
via reddit https://ift.tt/2HLUTBI
https://ift.tt/2CHDczr
Submitted March 29, 2019 at 01:44AM by xaocuc
via reddit https://ift.tt/2HLUTBI
www.redteam-pentesting.de
Cisco RV320 Command Injection
RedTeam Pentesting discovered a command injection vulnerability in the web-based certificate generator feature of the Cisco RV320 router which was inadequately patched by the vendor.
Magento 2.2.0 <= 2.3.0 Unauthenticated SQLi
https://ift.tt/2WuLhP7
Submitted March 29, 2019 at 04:09AM by cfambionics
via reddit https://ift.tt/2HJdFKd
https://ift.tt/2WuLhP7
Submitted March 29, 2019 at 04:09AM by cfambionics
via reddit https://ift.tt/2HJdFKd
Ambionics
Magento 2.2.0 <= 2.3.0 Unauthenticated SQLi
Several flaws have been identified in the latest version of Magento 2, allowing an attacker to obtain complete control over the server. We're now releasing the exploit for the unauthenticated SQL injection. We'll release the details for the RCE vulnerability…
Fireeye Introduces Commando VM: Windows Offensive VM
https://ift.tt/2V48eZ8
Submitted March 29, 2019 at 06:43AM by alnarra_1
via reddit https://ift.tt/2FClHBa
https://ift.tt/2V48eZ8
Submitted March 29, 2019 at 06:43AM by alnarra_1
via reddit https://ift.tt/2FClHBa
FireEye
Commando VM: The First of Its Kind Windows Offensive Distribution « Commando VM: The First of Its Kind Windows Offensive Distribution
We introduce Commando VM, a tool for penetration testers who use Windows.
Cisco bungled RV320/RV325 patches, routers still exposed to hacks
https://ift.tt/2OAfqtW
Submitted March 29, 2019 at 05:33AM by MatthewRS2
via reddit https://ift.tt/2V3HM1Q
https://ift.tt/2OAfqtW
Submitted March 29, 2019 at 05:33AM by MatthewRS2
via reddit https://ift.tt/2V3HM1Q
ZDNet
Cisco bungled RV320/RV325 patches, routers still exposed to hacks
Cisco blacklists curl instead of fixing vulnerable code. No new patches available, meaning devices still vulnerable to attacks.
mkYARA – Writing YARA rules for the lazy analyst
https://ift.tt/2HXiMFZ
Submitted March 29, 2019 at 10:09AM by digicat
via reddit https://ift.tt/2YwRImO
https://ift.tt/2HXiMFZ
Submitted March 29, 2019 at 10:09AM by digicat
via reddit https://ift.tt/2YwRImO
Fox-IT International blog
mkYARA – Writing YARA rules for the lazy analyst
Writing YARA rules based on executable code within malware can be a tedious task. An analyst cannot simply copy and paste raw executable code into a YARA rule, because this code contains variable v…
privacytools.io is running a Mastodon instance now. Join us
https://ift.tt/2HMcklI
Submitted March 29, 2019 at 05:23PM by BurungHantu
via reddit https://ift.tt/2JOp9Oo
https://ift.tt/2HMcklI
Submitted March 29, 2019 at 05:23PM by BurungHantu
via reddit https://ift.tt/2JOp9Oo
Mastodon hosted on social.privacytools.io
Mastodon 🔐 privacytools.io
privacytools.io provides knowledge and tools to protect your privacy against global mass surveillance.
Website: privacytools.io
In cooperation with: OpenNIC.org
Website: privacytools.io
In cooperation with: OpenNIC.org
ShadowHammer MAC Address List
https://ift.tt/2TDRTsQ
Submitted March 29, 2019 at 04:48PM by ga-vu
via reddit https://ift.tt/2uE7X3v
https://ift.tt/2TDRTsQ
Submitted March 29, 2019 at 04:48PM by ga-vu
via reddit https://ift.tt/2uE7X3v
Skylightcyber
Skylight Cyber | Unleash The Hash
Get the [almost] full list of MAC addresses that were targeted in the ASUS breach, and share our pain in the short story of extracting them.