Why We Use Crypto When Generating Coupon Codes At Scale
http://bit.ly/2KhNP1T
Submitted April 08, 2019 at 10:09PM by honoredb
via reddit http://bit.ly/2Ik8z6x
http://bit.ly/2KhNP1T
Submitted April 08, 2019 at 10:09PM by honoredb
via reddit http://bit.ly/2Ik8z6x
Grubhub Bytes
Why Grubhub uses crypto when generating coupon codes at scale
There’s usually no need to get fancy when implementing discount codes, but Grubhub’s scale has pushed us to go beyond random strings.
BSidesSF - Getting shells from Javanoscript: How Dangerous can clicking a Link be in 2019?
https://www.youtube.com/watch?v=HfpnloZM61I
Submitted April 08, 2019 at 09:11PM by wifihack
via reddit http://bit.ly/2I7XJkW
https://www.youtube.com/watch?v=HfpnloZM61I
Submitted April 08, 2019 at 09:11PM by wifihack
via reddit http://bit.ly/2I7XJkW
YouTube
BSidesSF 2019 - Offensive Javanoscript Techniques for Red Teamers (Dylan Ayrey • Christian Frichot)
AppSec is often very heavily focused on pre-exploitation. Frameworks like BeEF break this norm a little and can be used as tools to move laterally from the browser, to implant malware on adjacent machines. Unfortunately, performing network reconnaissance…
Scripts to execute enumeration via LFI
http://bit.ly/2VzSGNa
Submitted April 09, 2019 at 03:47AM by mthbernardes
via reddit http://bit.ly/2D4mKcK
http://bit.ly/2VzSGNa
Submitted April 09, 2019 at 03:47AM by mthbernardes
via reddit http://bit.ly/2D4mKcK
GitHub
mthbernardes/LFI-Enum
Scripts to execute enumeration via LFI. Contribute to mthbernardes/LFI-Enum development by creating an account on GitHub.
[oss-security] DLL injection in Go < 1.12.2 [CVE-2019-9634]
http://bit.ly/2KmImqF
Submitted April 09, 2019 at 04:26PM by the_gnarts
via reddit http://bit.ly/2WXwRYi
http://bit.ly/2KmImqF
Submitted April 09, 2019 at 04:26PM by the_gnarts
via reddit http://bit.ly/2WXwRYi
reddit
r/netsec - [oss-security] DLL injection in Go < 1.12.2 [CVE-2019-9634]
0 votes and 0 comments so far on Reddit
Intro into abusing and identifying WMI Event Subnoscriptions for persistence
http://bit.ly/2Z0oAVe
Submitted April 09, 2019 at 04:44PM by Griffnut
via reddit http://bit.ly/2U7Yfki
http://bit.ly/2Z0oAVe
Submitted April 09, 2019 at 04:44PM by Griffnut
via reddit http://bit.ly/2U7Yfki
In.security Cyber Security Technical Services & Training
An intro into abusing and identifying WMI Event Subnoscriptions for persistence | In.security Cyber Security Technical Services &…
CVE-2019-0227: Remote Code Execution in Apache Axis
http://bit.ly/2D5pjLD
Submitted April 09, 2019 at 07:35PM by hackers_and_builders
via reddit http://bit.ly/2YXd8JW
http://bit.ly/2D5pjLD
Submitted April 09, 2019 at 07:35PM by hackers_and_builders
via reddit http://bit.ly/2YXd8JW
Rhino Security Labs
CVE-2019-0227: Expired Domain to RCE in Apache Axis
CVE-2019-0227, a vulnerability where an insecure HTTP request or an expired hard coded domain can be used to achieve RCE in Apache Axis 1.4
5 Surprisingly Easy Ways We Let People Steal Our Identity.
http://bit.ly/2I8kVQ0
Submitted April 09, 2019 at 08:23PM by carloscancab
via reddit http://bit.ly/2WY2jWk
http://bit.ly/2I8kVQ0
Submitted April 09, 2019 at 08:23PM by carloscancab
via reddit http://bit.ly/2WY2jWk
Medium
“5 Surprisingly Easy Ways We Let People Steal Our Identity.”(From our Forums.)
Text originally published by Lyton Atinga on the Cyber Secure Central Forums.
Attacking exposed Selenium Grids (tool for enumeration + RCE in nodes)
http://bit.ly/2uVvBJ3
Submitted April 09, 2019 at 08:20PM by gid0rah
via reddit http://bit.ly/2I7keGL
http://bit.ly/2uVvBJ3
Submitted April 09, 2019 at 08:20PM by gid0rah
via reddit http://bit.ly/2I7keGL
Tarlogic Security - Cyber Security and Ethical hacking
Attacking QA platforms: Selenium Grid
During the course of a Red Team exercise serveral QA assets where discovered. In particular the usage of the Selenium Grid platform without authentication caught the team's attention.The aim for this article is to explain how a QA platform exposed to the…
RCE in Confluence via Widget connector
https://chybeta.github.io/2019/04/06/Analysis-for-%E3%80%90CVE-2019-3396%E3%80%91-SSTI-and-RCE-in-Confluence-Server-via-Widget-Connector/
Submitted April 09, 2019 at 04:46PM by bugdiscloseguy
via reddit http://bit.ly/2UvPMg9
https://chybeta.github.io/2019/04/06/Analysis-for-%E3%80%90CVE-2019-3396%E3%80%91-SSTI-and-RCE-in-Confluence-Server-via-Widget-Connector/
Submitted April 09, 2019 at 04:46PM by bugdiscloseguy
via reddit http://bit.ly/2UvPMg9
Chybeta
【CVE-2019-3396】:SSTI and RCE in Confluence Server via Widget Connector
Twitter: chybeta
Verizon FiOS Router Authenticated Command Injection
http://bit.ly/2UHKc9G
Submitted April 09, 2019 at 09:56PM by lynerc
via reddit http://bit.ly/2FZuv4i
http://bit.ly/2UHKc9G
Submitted April 09, 2019 at 09:56PM by lynerc
via reddit http://bit.ly/2FZuv4i
Medium
Verizon Fios Router Authenticated Command Injection
Rooting the Verizon Fios Quantum Gateway
Cuppa CMS unauthenticated RCE
http://bit.ly/2Z1Eyyb
Submitted April 09, 2019 at 10:28PM by mthbernardes
via reddit http://bit.ly/2Z0Nd43
http://bit.ly/2Z1Eyyb
Submitted April 09, 2019 at 10:28PM by mthbernardes
via reddit http://bit.ly/2Z0Nd43
GitHub
mthbernardes/CuppaCMS
Contribute to mthbernardes/CuppaCMS development by creating an account on GitHub.
How regular expression and fuzzing change my approach for finding vulnerabilities (Series part 1.)
http://bit.ly/2Kntmcd
Submitted April 10, 2019 at 12:52AM by beyonderdabas
via reddit http://bit.ly/2UFAV1R
http://bit.ly/2Kntmcd
Submitted April 10, 2019 at 12:52AM by beyonderdabas
via reddit http://bit.ly/2UFAV1R
securityviacode.in
How regular expression and fuzzing change my approach for finding vulnerabilities (Series part 1.)
So I m starting my blog with this technical writeup. I have tried to write this blog for a long time. but as I was coding and reading different books in Freetime. it took me a bit of time but here am I with this.
Running a .NET Assembly in Memory with Meterpreter
http://bit.ly/2U65idx
Submitted April 10, 2019 at 01:21AM by myover
via reddit http://bit.ly/2Z1fNlW
http://bit.ly/2U65idx
Submitted April 10, 2019 at 01:21AM by myover
via reddit http://bit.ly/2Z1fNlW
Praetorian
Running a .NET Assembly in Memory with Meterpreter
In this blog post I will discuss leveraging Meterpreter’s powershell module to execute .NET assemblies in-memory. Metasploit and Meterpreter are effective and useful tools, but occasionally one encounters a situation where they lack features. Cobalt Strike…
Red Team & Penetration Testing using Intel AMT: The DEATHMETAL suite
http://bit.ly/2WTqwwI
Submitted April 10, 2019 at 01:23AM by coalfirelabs
via reddit http://bit.ly/2WX8VUI
http://bit.ly/2WTqwwI
Submitted April 10, 2019 at 01:23AM by coalfirelabs
via reddit http://bit.ly/2WX8VUI
Coalfire.com
The Death Metal Suite
Intel Active Management Technology (AMT) is a feature provided by Intel for remote administration. Death Metal is a toolkit designed to exploit AMT’s legitimate features, as the AMT framework’s functionality, designed for innocent system administration purposes…
DACL Permissions Overwrite Privilege Escalation (CVE-2019-0841)
http://bit.ly/2D6Drnw
Submitted April 10, 2019 at 02:05AM by Pr0bes
via reddit http://bit.ly/2P0BjT2
http://bit.ly/2D6Drnw
Submitted April 10, 2019 at 02:05AM by Pr0bes
via reddit http://bit.ly/2P0BjT2
reddit
r/netsec - DACL Permissions Overwrite Privilege Escalation (CVE-2019-0841)
0 votes and 0 comments so far on Reddit
EVERYTHING A HACKER NEEDS TO KNOW ABOUT GETTING BUSTED BY THE FEDS (1996)
http://bit.ly/2BRUHi0
Submitted April 10, 2019 at 06:51AM by 5tinger
via reddit http://bit.ly/2WXlTSw
http://bit.ly/2BRUHi0
Submitted April 10, 2019 at 06:51AM by 5tinger
via reddit http://bit.ly/2WXlTSw
phrack.org
.:: Phrack Magazine ::.
Phrack staff website.
Leveraging EL Injection for RCE
http://bit.ly/2VzbiwH
Submitted April 10, 2019 at 01:04PM by ZephrX112
via reddit http://bit.ly/2FW6IC0
http://bit.ly/2VzbiwH
Submitted April 10, 2019 at 01:04PM by ZephrX112
via reddit http://bit.ly/2FW6IC0
ZeroSec - Adventures In Information Security
Leveraging Expression Language Injection (EL Injection) for RCE
Expression Language injection or EL Injection for short is an attack vector I'd never heard of until recently. This post talks about leveraging EL for RCE.
Android Cloak and Dagger Attack
http://bit.ly/2Ge4WxF
Submitted April 10, 2019 at 05:54PM by jamaican420guy
via reddit http://bit.ly/2uZ6N34
http://bit.ly/2Ge4WxF
Submitted April 10, 2019 at 05:54PM by jamaican420guy
via reddit http://bit.ly/2uZ6N34
Medium
Cloak and Dagger — Mobile Malware Techniques Demystified
The cloak and dagger attack exploits a combination of drawing over other apps and the large amount of access to other apps given to…
Azure Security Logging – part I: defining you logging strategy
http://bit.ly/2v25kIZ
Submitted April 10, 2019 at 06:33PM by daanraman
via reddit http://bit.ly/2G1hmro
http://bit.ly/2v25kIZ
Submitted April 10, 2019 at 06:33PM by daanraman
via reddit http://bit.ly/2G1hmro
NVISO Labs
Azure Security Logging – part I: defining your logging strategy
In this first blog post in a series about Azure Security Logging, we will give a general overview of the types of logs available for Azure services including their storage options. We will also dis…
Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability - Microsoft Security
http://bit.ly/2UOickB
Submitted April 10, 2019 at 09:19PM by Sofakingjewish
via reddit http://bit.ly/2uZ9stk
http://bit.ly/2UOickB
Submitted April 10, 2019 at 09:19PM by Sofakingjewish
via reddit http://bit.ly/2uZ9stk
Microsoft Security Blog
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog
A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
Nagios XI 5.5.10: XSS to # writeup
http://bit.ly/2uYuW9Q
Submitted April 10, 2019 at 06:42PM by smaury
via reddit http://bit.ly/2IaMzMg
http://bit.ly/2uYuW9Q
Submitted April 10, 2019 at 06:42PM by smaury
via reddit http://bit.ly/2IaMzMg
Shielder
Nagios XI 5.5.10: XSS to # - Shielder
Technical post about vulnerabilies in Nagios XI 5.5.10 which allow a remote attacker to gain root privileges on the system through an XSS, RCE and LPE.