New TLS Padding Oracle Scanner (padcheck)
https://ift.tt/2U32P8q
Submitted March 30, 2019 at 04:43AM by KernelJay
via reddit https://ift.tt/2OzAErz
https://ift.tt/2U32P8q
Submitted March 30, 2019 at 04:43AM by KernelJay
via reddit https://ift.tt/2OzAErz
GitHub
Tripwire/padcheck
TLS CBC Padding Oracle Checker. Contribute to Tripwire/padcheck development by creating an account on GitHub.
Hack The Box - Curling Write-up by 0xRick
https://ift.tt/2V1iHol
Submitted March 30, 2019 at 08:36PM by Ahm3d_H3sham
via reddit https://ift.tt/2CJiA9W
https://ift.tt/2V1iHol
Submitted March 30, 2019 at 08:36PM by Ahm3d_H3sham
via reddit https://ift.tt/2CJiA9W
0xRick Owned Root !
Hack The Box - Curling
Quick Summary Hey guys today Curling retired and here is my write-up about it. I had a lot of fun doing this box as it was easy and simple. Also it was straightforward , no rabbit holes and such things. It’s a linux box and its ip is 10.10.10.150 I added…
Vulnserver LTER SEH Continued (Part 2)
https://ift.tt/2UcPKJ5
Submitted March 30, 2019 at 09:05PM by doylersec
via reddit https://ift.tt/2HP9JaV
https://ift.tt/2UcPKJ5
Submitted March 30, 2019 at 09:05PM by doylersec
via reddit https://ift.tt/2HP9JaV
doyler.net
Vulnserver LTER SEH Continued (Part 2) | doyler.net
This post will conclude my Vulnserver LTER SEH exploit. Vulnserver LTER SEH - Part 2 If you haven't read Part 1 yet, then I recommend you start there. That said, I last left off with a newly generated reverse shell … Continue reading →
PoC || GTFO 0x19 (Github Mirror)
https://ift.tt/2WBMjZT
Submitted March 30, 2019 at 11:32PM by netsecfriends
via reddit https://ift.tt/2HOq1Rc
https://ift.tt/2WBMjZT
Submitted March 30, 2019 at 11:32PM by netsecfriends
via reddit https://ift.tt/2HOq1Rc
GitHub
pocorgtfo/README.md at master · angea/pocorgtfo
a "Proof of Concept or GTFO" mirror with extra article index, direct links and clean PDFs. - pocorgtfo/README.md at master · angea/pocorgtfo
Exodus: New Android Spyware Made in Italy
https://ift.tt/2U5VdSz
Submitted March 31, 2019 at 01:40PM by fo0
via reddit https://ift.tt/2OAoLlf
https://ift.tt/2U5VdSz
Submitted March 31, 2019 at 01:40PM by fo0
via reddit https://ift.tt/2OAoLlf
Kubernetes (kubectl) directory traversal vulnerability due to insufficient fix - CVE-2019-1002101
https://ift.tt/2I7WJMC
Submitted March 31, 2019 at 02:02PM by reddit_read_today
via reddit https://ift.tt/2U5rlpy
https://ift.tt/2I7WJMC
Submitted March 31, 2019 at 02:02PM by reddit_read_today
via reddit https://ift.tt/2U5rlpy
Twistlock
Disclosing a directory traversal vulnerability in Kubernetes copy - CVE-2019-1002101 | Twistlock
Preface On March 4, I reported a security vulnerability in kubectl to the Kubernetes and OpenShift security teams, which was assigned CVE-2019-1002101. This post explains the discovery process, the vulnerability details and its impact and exploitation methods.…
CommandoVM - a fully customized, Windows-based security distribution for penetration testing and red teaming
https://ift.tt/2YyHHpe
Submitted March 31, 2019 at 02:49PM by Titokhan
via reddit https://ift.tt/2WCggsz
https://ift.tt/2YyHHpe
Submitted March 31, 2019 at 02:49PM by Titokhan
via reddit https://ift.tt/2WCggsz
GitHub
fireeye/commando-vm
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com - fireeye/commando-vm
The Journey to Try Harder: TJNull’s Preparation Guide for PWK/OSCP
https://ift.tt/2CLZkZf
Submitted March 31, 2019 at 08:44PM by xaocuc
via reddit https://ift.tt/2uzq1vO
https://ift.tt/2CLZkZf
Submitted March 31, 2019 at 08:44PM by xaocuc
via reddit https://ift.tt/2uzq1vO
NetSec Focus
The Journey to Try Harder: TJNull’s Preparation Guide for PWK/OSCP
Table of Contents: Overview Dedication A Word of Warning! Section 1: Getting Comfortable with Kali Linux Section 2: Essential Tools in Kali Section 3: Passive Reconnaissance Section 4: Active Reconnaissance Section 5: Vulnerability Scanning Section 6: Buffer…
A Trinity of Shellcode, AES & Go - @syscall59
https://ift.tt/2FLqznI
Submitted March 31, 2019 at 10:18PM by h41zum
via reddit https://ift.tt/2Uje7F0
https://ift.tt/2FLqznI
Submitted March 31, 2019 at 10:18PM by h41zum
via reddit https://ift.tt/2Uje7F0
Medium
A Trinity of Shellcode, AES & Go
Writing a shellcode AES crypter using Go
Blue ATT&CK: Mapping your blue team to ATT&CK
https://ift.tt/2uCDvXD
Submitted March 31, 2019 at 11:45PM by digicat
via reddit https://ift.tt/2HRzJlL
https://ift.tt/2uCDvXD
Submitted March 31, 2019 at 11:45PM by digicat
via reddit https://ift.tt/2HRzJlL
reddit
r/blueteamsec - Blue ATT&CK: Mapping your blue team to ATT&CK
0 votes and 1 comment so far on Reddit
The /r/netsec Monthly Discussion Thread - April 2019
OverviewQuestions regarding netsec and discussion related directly to netsec are welcome here.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on /r/netsec.As always, the content & discussion guidelines should also be observed on /r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted April 01, 2019 at 10:06AM by AutoModerator
via reddit https://ift.tt/2JVf9TC
OverviewQuestions regarding netsec and discussion related directly to netsec are welcome here.Rules & GuidelinesAlways maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.Avoid use of memes. If you have something to say, say it with real words.All discussions and questions should directly relate to netsec.No tech support is to be requested or provided on /r/netsec.As always, the content & discussion guidelines should also be observed on /r/netsec.FeedbackFeedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.
Submitted April 01, 2019 at 10:06AM by AutoModerator
via reddit https://ift.tt/2JVf9TC
Reddit
Technical Information Security Content & Discussion
/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to provide value to security practitioners, students, researchers, and hackers everywhere.
Exploiting signed bootloaders to circumvent UEFI Secure Boot
https://ift.tt/2FTi0Hx
Submitted April 01, 2019 at 04:27PM by atomlib_com
via reddit https://ift.tt/2TPXCf2
https://ift.tt/2FTi0Hx
Submitted April 01, 2019 at 04:27PM by atomlib_com
via reddit https://ift.tt/2TPXCf2
Habr
Exploiting signed bootloaders to circumvent UEFI Secure Boot
Modern PC motherboards' firmware follow UEFI specification since 2010. In 2013, a new technology called Secure Boot appeared, intended to prevent bootkits from...
Exploiting signed bootloaders to circumvent UEFI Secure Boot
https://ift.tt/2Vc2LzQ
Submitted April 01, 2019 at 03:57PM by ValdikSS
via reddit https://ift.tt/2TPw4Xv
https://ift.tt/2Vc2LzQ
Submitted April 01, 2019 at 03:57PM by ValdikSS
via reddit https://ift.tt/2TPw4Xv
Habr
Exploiting signed bootloaders to circumvent UEFI Secure Boot
Modern PC motherboards' firmware follow UEFI specification since 2010. In 2013, a new technology called Secure Boot appeared, intended to prevent bootkits from...
Security alert: pipdig insecure, DDoSing competitors
https://ift.tt/2UtfMYJ
Submitted April 01, 2019 at 02:55PM by hacktvist
via reddit https://ift.tt/2YymI5M
https://ift.tt/2UtfMYJ
Submitted April 01, 2019 at 02:55PM by hacktvist
via reddit https://ift.tt/2YymI5M
Jem - UK blogger
Security alert: pipdig insecure, DDoSing competitors - Jem - UK blogger
I love WordPress. I make my living from it. It’s no exaggeration to say that developing WordPress websites has changed my life: it provides me with an income that pays my mortgage and feeds my babies. However, every now and again something happens in the……
Hack yourself into Tomorrowland! #BugBounty #intigriti
https://ift.tt/2FNEnyX
Submitted April 01, 2019 at 05:42PM by SirDevastator
via reddit https://ift.tt/2WEGA5E
https://ift.tt/2FNEnyX
Submitted April 01, 2019 at 05:42PM by SirDevastator
via reddit https://ift.tt/2WEGA5E
Intigriti
intigriti - ethical hacking and managed bug bounty platform
intigriti provides an ethical hacking and bug bounty platform to identify and tackle vulnerabilities. Our bug bounty programs facilitate to test online security through using crowd security researchers with a strong focus on Europe
GitHub - righettod/poc-graphql: Research on GraphQL from an AppSec point of view.
https://ift.tt/2OCuMxP
Submitted April 01, 2019 at 05:22PM by Mempodipper
via reddit https://ift.tt/2FO7Skv
https://ift.tt/2OCuMxP
Submitted April 01, 2019 at 05:22PM by Mempodipper
via reddit https://ift.tt/2FO7Skv
GitHub
righettod/poc-graphql
Research on GraphQL from an AppSec point of view. Contribute to righettod/poc-graphql development by creating an account on GitHub.
MI5 agent caught selling Huawei exploits on Russian hacker forums
https://ift.tt/2WDAe6t
Submitted April 01, 2019 at 06:42PM by bigjew222
via reddit https://ift.tt/2uIVPhH
https://ift.tt/2WDAe6t
Submitted April 01, 2019 at 06:42PM by bigjew222
via reddit https://ift.tt/2uIVPhH
reddit
r/netsec - MI5 agent caught selling Huawei exploits on Russian hacker forums
0 votes and 0 comments so far on Reddit
How I hacked modern Vending Machines
https://ift.tt/2Oosfuj
Submitted April 01, 2019 at 08:12PM by HenrySeldon
via reddit https://ift.tt/2TMa6oe
https://ift.tt/2Oosfuj
Submitted April 01, 2019 at 08:12PM by HenrySeldon
via reddit https://ift.tt/2TMa6oe
Hacker Noon
How I hacked modern Vending Machines
“Hitting and kicking” the bundled App of their widest European distribution company.
How To Secure Apache From Clickjack attack using X-Frame-Options
https://ift.tt/2CNjYIF
Submitted April 01, 2019 at 09:16PM by lokendra15
via reddit https://ift.tt/2Um4q8M
https://ift.tt/2CNjYIF
Submitted April 01, 2019 at 09:16PM by lokendra15
via reddit https://ift.tt/2Um4q8M
Tutorials24x7
How To Secure Apache From Clickjack attack using X-Frame-Options
Explains the way to secure websites and web-based applications from Clickjacking hosted on Apache HTTP Server using the Header option X-Frame-Options.
What you see is not what you get: when homographs attack (full-chain homograph attack in Signal, Telegram and Tor Browser)
https://ift.tt/2CMdxpe
Submitted April 01, 2019 at 09:13PM by juliocesarfort
via reddit https://ift.tt/2JXXESs
https://ift.tt/2CMdxpe
Submitted April 01, 2019 at 09:13PM by juliocesarfort
via reddit https://ift.tt/2JXXESs
reddit
r/netsec - What you see is not what you get: when homographs attack (full-chain homograph attack in Signal, Telegram and Tor Browser)
0 votes and 0 comments so far on Reddit
One of our users requested a behind-the-scenes look at the ProtonVPN team in action. Our team answered.
https://ift.tt/2CPtnzd
Submitted April 01, 2019 at 11:43PM by ProtonMail
via reddit https://ift.tt/2UaKoyv
https://ift.tt/2CPtnzd
Submitted April 01, 2019 at 11:43PM by ProtonMail
via reddit https://ift.tt/2UaKoyv
reddit
r/ProtonVPN - One of our users requested a behind-the-scenes look at the ProtonVPN team in action. Our team answered.
39 votes and 4 comments so far on Reddit