How regular expression and fuzzing change my approach for finding vulnerabilities (Series part 1.)
http://bit.ly/2Kntmcd
Submitted April 10, 2019 at 12:52AM by beyonderdabas
via reddit http://bit.ly/2UFAV1R
http://bit.ly/2Kntmcd
Submitted April 10, 2019 at 12:52AM by beyonderdabas
via reddit http://bit.ly/2UFAV1R
securityviacode.in
How regular expression and fuzzing change my approach for finding vulnerabilities (Series part 1.)
So I m starting my blog with this technical writeup. I have tried to write this blog for a long time. but as I was coding and reading different books in Freetime. it took me a bit of time but here am I with this.
Running a .NET Assembly in Memory with Meterpreter
http://bit.ly/2U65idx
Submitted April 10, 2019 at 01:21AM by myover
via reddit http://bit.ly/2Z1fNlW
http://bit.ly/2U65idx
Submitted April 10, 2019 at 01:21AM by myover
via reddit http://bit.ly/2Z1fNlW
Praetorian
Running a .NET Assembly in Memory with Meterpreter
In this blog post I will discuss leveraging Meterpreter’s powershell module to execute .NET assemblies in-memory. Metasploit and Meterpreter are effective and useful tools, but occasionally one encounters a situation where they lack features. Cobalt Strike…
Red Team & Penetration Testing using Intel AMT: The DEATHMETAL suite
http://bit.ly/2WTqwwI
Submitted April 10, 2019 at 01:23AM by coalfirelabs
via reddit http://bit.ly/2WX8VUI
http://bit.ly/2WTqwwI
Submitted April 10, 2019 at 01:23AM by coalfirelabs
via reddit http://bit.ly/2WX8VUI
Coalfire.com
The Death Metal Suite
Intel Active Management Technology (AMT) is a feature provided by Intel for remote administration. Death Metal is a toolkit designed to exploit AMT’s legitimate features, as the AMT framework’s functionality, designed for innocent system administration purposes…
DACL Permissions Overwrite Privilege Escalation (CVE-2019-0841)
http://bit.ly/2D6Drnw
Submitted April 10, 2019 at 02:05AM by Pr0bes
via reddit http://bit.ly/2P0BjT2
http://bit.ly/2D6Drnw
Submitted April 10, 2019 at 02:05AM by Pr0bes
via reddit http://bit.ly/2P0BjT2
reddit
r/netsec - DACL Permissions Overwrite Privilege Escalation (CVE-2019-0841)
0 votes and 0 comments so far on Reddit
EVERYTHING A HACKER NEEDS TO KNOW ABOUT GETTING BUSTED BY THE FEDS (1996)
http://bit.ly/2BRUHi0
Submitted April 10, 2019 at 06:51AM by 5tinger
via reddit http://bit.ly/2WXlTSw
http://bit.ly/2BRUHi0
Submitted April 10, 2019 at 06:51AM by 5tinger
via reddit http://bit.ly/2WXlTSw
phrack.org
.:: Phrack Magazine ::.
Phrack staff website.
Leveraging EL Injection for RCE
http://bit.ly/2VzbiwH
Submitted April 10, 2019 at 01:04PM by ZephrX112
via reddit http://bit.ly/2FW6IC0
http://bit.ly/2VzbiwH
Submitted April 10, 2019 at 01:04PM by ZephrX112
via reddit http://bit.ly/2FW6IC0
ZeroSec - Adventures In Information Security
Leveraging Expression Language Injection (EL Injection) for RCE
Expression Language injection or EL Injection for short is an attack vector I'd never heard of until recently. This post talks about leveraging EL for RCE.
Android Cloak and Dagger Attack
http://bit.ly/2Ge4WxF
Submitted April 10, 2019 at 05:54PM by jamaican420guy
via reddit http://bit.ly/2uZ6N34
http://bit.ly/2Ge4WxF
Submitted April 10, 2019 at 05:54PM by jamaican420guy
via reddit http://bit.ly/2uZ6N34
Medium
Cloak and Dagger — Mobile Malware Techniques Demystified
The cloak and dagger attack exploits a combination of drawing over other apps and the large amount of access to other apps given to…
Azure Security Logging – part I: defining you logging strategy
http://bit.ly/2v25kIZ
Submitted April 10, 2019 at 06:33PM by daanraman
via reddit http://bit.ly/2G1hmro
http://bit.ly/2v25kIZ
Submitted April 10, 2019 at 06:33PM by daanraman
via reddit http://bit.ly/2G1hmro
NVISO Labs
Azure Security Logging – part I: defining your logging strategy
In this first blog post in a series about Azure Security Logging, we will give a general overview of the types of logs available for Azure services including their storage options. We will also dis…
Analysis of a targeted attack exploiting the WinRar CVE-2018-20250 vulnerability - Microsoft Security
http://bit.ly/2UOickB
Submitted April 10, 2019 at 09:19PM by Sofakingjewish
via reddit http://bit.ly/2uZ9stk
http://bit.ly/2UOickB
Submitted April 10, 2019 at 09:19PM by Sofakingjewish
via reddit http://bit.ly/2uZ9stk
Microsoft Security Blog
Analysis of a targeted attack exploiting the WinRAR CVE-2018-20250 vulnerability | Microsoft Security Blog
A complex attack chain incorporating the CVE-2018-20250 exploit and multiple code execution techniques attempted to run a fileless PowerShell backdoor that could allow an adversary to take full control of compromised machines.
Nagios XI 5.5.10: XSS to # writeup
http://bit.ly/2uYuW9Q
Submitted April 10, 2019 at 06:42PM by smaury
via reddit http://bit.ly/2IaMzMg
http://bit.ly/2uYuW9Q
Submitted April 10, 2019 at 06:42PM by smaury
via reddit http://bit.ly/2IaMzMg
Shielder
Nagios XI 5.5.10: XSS to # - Shielder
Technical post about vulnerabilies in Nagios XI 5.5.10 which allow a remote attacker to gain root privileges on the system through an XSS, RCE and LPE.
A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password Spraying)
http://bit.ly/2UqDoh6
Submitted April 10, 2019 at 09:32PM by Evil1337
via reddit http://bit.ly/2GdSNsm
http://bit.ly/2UqDoh6
Submitted April 10, 2019 at 09:32PM by Evil1337
via reddit http://bit.ly/2GdSNsm
NaviSec Delta
A Pentester's Guide - Part 3 (OSINT, Breach Dumps, & Password Spraying)
Hey hackers! I noticed that a lot of people enjoyed my older OSINT articles (on
our old company website, we were formerly Sequoia Cyber Solutions).
Even to the point that the article got Reddit Gold on /r/netsec :)
If you've not read those, check them out…
our old company website, we were formerly Sequoia Cyber Solutions).
Even to the point that the article got Reddit Gold on /r/netsec :)
If you've not read those, check them out…
MAR-10135536-8 – North Korean Trojan: HOPLIGHT
http://bit.ly/2UMdLXs
Submitted April 11, 2019 at 01:41AM by beirtech
via reddit http://bit.ly/2Km5qFY
http://bit.ly/2UMdLXs
Submitted April 11, 2019 at 01:41AM by beirtech
via reddit http://bit.ly/2Km5qFY
reddit
r/netsec - MAR-10135536-8 – North Korean Trojan: HOPLIGHT
0 votes and 0 comments so far on Reddit
Dragonblood - several design flaws discovered in WPA3
http://bit.ly/2G2ovrs
Submitted April 11, 2019 at 03:08AM by omegga
via reddit http://bit.ly/2Ge3Kue
http://bit.ly/2G2ovrs
Submitted April 11, 2019 at 03:08AM by omegga
via reddit http://bit.ly/2Ge3Kue
Better Exfiltration via HTML Injection
http://bit.ly/2UU5sct
Submitted April 11, 2019 at 08:15AM by Mempodipper
via reddit http://bit.ly/2KoAvsJ
http://bit.ly/2UU5sct
Submitted April 11, 2019 at 08:15AM by Mempodipper
via reddit http://bit.ly/2KoAvsJ
Medium
Better Exfiltration via HTML Injection
This is a story about how I (re)discovered an exploitation technique and took a bug with fairly limited impact to a 5 digit bounty by…
AV WARS: Fighting fire with fire [AV Bypass Technique]
http://bit.ly/2D6cCjG
Submitted April 11, 2019 at 01:54PM by zoh4rs
via reddit http://bit.ly/2U69gTn
http://bit.ly/2D6cCjG
Submitted April 11, 2019 at 01:54PM by zoh4rs
via reddit http://bit.ly/2U69gTn
Komodo | Cyber Security Consulting
AV WARS: Fighting fire with fire [AV Bypass Technique]
Back when I started doing red team engagements for Komodo, bypassing AV solutions was quick and trivial, almost a ‘non-brainer.’ Just change some strings, recom
I'll Be Back - Adding Session Termination to Your IR Plan
http://bit.ly/2P8hDwU
Submitted April 11, 2019 at 06:08PM by IndySecMan
via reddit http://bit.ly/2UTTf7g
http://bit.ly/2P8hDwU
Submitted April 11, 2019 at 06:08PM by IndySecMan
via reddit http://bit.ly/2UTTf7g
Blogspot
I'll Be Back - Adding Session Termination to Your IR Plan
Information Security / Cyber Security Thoughts, Opinions, and Ideas!
New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
http://bit.ly/2D9pqFX
Submitted April 11, 2019 at 10:34PM by mughinn
via reddit http://bit.ly/2Uvr2EK
http://bit.ly/2D9pqFX
Submitted April 11, 2019 at 10:34PM by mughinn
via reddit http://bit.ly/2Uvr2EK
Elevenpaths
New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
COM Hijacking technique has a simple theoretical basis, similar to the DLL Hijacking one: What does it happen when an application searches for a non-existent COM object on the computer where it is being executed? Or when such object exists but it cannot be…
Ad Exploit Activity Up by 428% since March: 70% of a site’s users are exposed to an 'at-risk-ad' every month
http://bit.ly/2v4Zp5X
Submitted April 11, 2019 at 11:51PM by DEVCON3PJS
via reddit http://bit.ly/2Pcr0vD
http://bit.ly/2v4Zp5X
Submitted April 11, 2019 at 11:51PM by DEVCON3PJS
via reddit http://bit.ly/2Pcr0vD
reddit
r/netsec - Ad Exploit Activity Up by 428% since March: 70% of a site’s users are exposed to an 'at-risk-ad' every month
0 votes and 0 comments so far on Reddit
BGP perforating wound
http://bit.ly/2v0jt9G
Submitted April 11, 2019 at 11:44PM by atomlib_com
via reddit http://bit.ly/2P7n6Uv
http://bit.ly/2v0jt9G
Submitted April 11, 2019 at 11:44PM by atomlib_com
via reddit http://bit.ly/2P7n6Uv
Habr
BGP perforating wound
It was an ordinary Thursday on 4.04.2019. Except that at some point of the midday timeline an AS60280 belonging to Belarus’ NTEC leaked 18600 prefixes o...
Security Enhanced Linux (SELinux): From Concepts to Code Flow by J.C. Scaly
http://bit.ly/2v0nJ9i
Submitted April 12, 2019 at 12:03AM by scalys7
via reddit http://bit.ly/2uXl6oF
http://bit.ly/2v0nJ9i
Submitted April 12, 2019 at 12:03AM by scalys7
via reddit http://bit.ly/2uXl6oF
Google Docs
Security Enhanced Linux (SELinux).pdf
The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack | Imperva
http://bit.ly/2VHJvKQ
Submitted April 11, 2019 at 11:52PM by vitalysim
via reddit http://bit.ly/2GgTuRQ
http://bit.ly/2VHJvKQ
Submitted April 11, 2019 at 11:52PM by vitalysim
via reddit http://bit.ly/2GgTuRQ
Blog
The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack | Imperva
DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced…