Dragonblood - several design flaws discovered in WPA3
http://bit.ly/2G2ovrs
Submitted April 11, 2019 at 03:08AM by omegga
via reddit http://bit.ly/2Ge3Kue
http://bit.ly/2G2ovrs
Submitted April 11, 2019 at 03:08AM by omegga
via reddit http://bit.ly/2Ge3Kue
Better Exfiltration via HTML Injection
http://bit.ly/2UU5sct
Submitted April 11, 2019 at 08:15AM by Mempodipper
via reddit http://bit.ly/2KoAvsJ
http://bit.ly/2UU5sct
Submitted April 11, 2019 at 08:15AM by Mempodipper
via reddit http://bit.ly/2KoAvsJ
Medium
Better Exfiltration via HTML Injection
This is a story about how I (re)discovered an exploitation technique and took a bug with fairly limited impact to a 5 digit bounty by…
AV WARS: Fighting fire with fire [AV Bypass Technique]
http://bit.ly/2D6cCjG
Submitted April 11, 2019 at 01:54PM by zoh4rs
via reddit http://bit.ly/2U69gTn
http://bit.ly/2D6cCjG
Submitted April 11, 2019 at 01:54PM by zoh4rs
via reddit http://bit.ly/2U69gTn
Komodo | Cyber Security Consulting
AV WARS: Fighting fire with fire [AV Bypass Technique]
Back when I started doing red team engagements for Komodo, bypassing AV solutions was quick and trivial, almost a ‘non-brainer.’ Just change some strings, recom
I'll Be Back - Adding Session Termination to Your IR Plan
http://bit.ly/2P8hDwU
Submitted April 11, 2019 at 06:08PM by IndySecMan
via reddit http://bit.ly/2UTTf7g
http://bit.ly/2P8hDwU
Submitted April 11, 2019 at 06:08PM by IndySecMan
via reddit http://bit.ly/2UTTf7g
Blogspot
I'll Be Back - Adding Session Termination to Your IR Plan
Information Security / Cyber Security Thoughts, Opinions, and Ideas!
New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
http://bit.ly/2D9pqFX
Submitted April 11, 2019 at 10:34PM by mughinn
via reddit http://bit.ly/2Uvr2EK
http://bit.ly/2D9pqFX
Submitted April 11, 2019 at 10:34PM by mughinn
via reddit http://bit.ly/2Uvr2EK
Elevenpaths
New research: we discover how to avoid SmartScreen via COM Hijacking and with no privileges
COM Hijacking technique has a simple theoretical basis, similar to the DLL Hijacking one: What does it happen when an application searches for a non-existent COM object on the computer where it is being executed? Or when such object exists but it cannot be…
Ad Exploit Activity Up by 428% since March: 70% of a site’s users are exposed to an 'at-risk-ad' every month
http://bit.ly/2v4Zp5X
Submitted April 11, 2019 at 11:51PM by DEVCON3PJS
via reddit http://bit.ly/2Pcr0vD
http://bit.ly/2v4Zp5X
Submitted April 11, 2019 at 11:51PM by DEVCON3PJS
via reddit http://bit.ly/2Pcr0vD
reddit
r/netsec - Ad Exploit Activity Up by 428% since March: 70% of a site’s users are exposed to an 'at-risk-ad' every month
0 votes and 0 comments so far on Reddit
BGP perforating wound
http://bit.ly/2v0jt9G
Submitted April 11, 2019 at 11:44PM by atomlib_com
via reddit http://bit.ly/2P7n6Uv
http://bit.ly/2v0jt9G
Submitted April 11, 2019 at 11:44PM by atomlib_com
via reddit http://bit.ly/2P7n6Uv
Habr
BGP perforating wound
It was an ordinary Thursday on 4.04.2019. Except that at some point of the midday timeline an AS60280 belonging to Belarus’ NTEC leaked 18600 prefixes o...
Security Enhanced Linux (SELinux): From Concepts to Code Flow by J.C. Scaly
http://bit.ly/2v0nJ9i
Submitted April 12, 2019 at 12:03AM by scalys7
via reddit http://bit.ly/2uXl6oF
http://bit.ly/2v0nJ9i
Submitted April 12, 2019 at 12:03AM by scalys7
via reddit http://bit.ly/2uXl6oF
Google Docs
Security Enhanced Linux (SELinux).pdf
The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack | Imperva
http://bit.ly/2VHJvKQ
Submitted April 11, 2019 at 11:52PM by vitalysim
via reddit http://bit.ly/2GgTuRQ
http://bit.ly/2VHJvKQ
Submitted April 11, 2019 at 11:52PM by vitalysim
via reddit http://bit.ly/2GgTuRQ
Blog
The Ping is the Thing: Popular HTML5 Feature Used to Trick Chinese Mobile Users into Joining Latest DDoS Attack | Imperva
DDoS attacks have always been a major threat to network infrastructure and web applications. Attackers are always creating new ways to exploit legitimate services for malicious purposes, forcing us to constantly research DDoS attacks in our CDN to build advanced…
New type of a hijack BGP attack in the wild
http://bit.ly/2Ie1dT2
Submitted April 12, 2019 at 01:03AM by atomlib_com
via reddit http://bit.ly/2Uyu2Ab
http://bit.ly/2Ie1dT2
Submitted April 12, 2019 at 01:03AM by atomlib_com
via reddit http://bit.ly/2Uyu2Ab
Habr
Bad news, everyone! New hijack attack in the wild
On March 13, a proposal for the RIPE anti-abuse working group was submitted, stating that a BGP hijacking event should be treated as a policy violation. In case...
Exploiting an Exposed Docker.Sock
http://bit.ly/2G6guBP
Submitted April 12, 2019 at 05:30AM by Dejanz
via reddit http://bit.ly/2UBhRmh
http://bit.ly/2G6guBP
Submitted April 12, 2019 at 05:30AM by Dejanz
via reddit http://bit.ly/2UBhRmh
Dejandayoff
The Danger of Exposing Docker.Sock
Exposing /var/run/docker.sock could lead to full environment takeover.
Ledger Backup Pack bundle offer - Ledger Nano X + Ledger Nano S (50%)
http://bit.ly/2UhHxDX
Submitted April 12, 2019 at 06:39AM by ledgerfan
via reddit http://bit.ly/2X6cdoW
http://bit.ly/2UhHxDX
Submitted April 12, 2019 at 06:39AM by ledgerfan
via reddit http://bit.ly/2X6cdoW
Ledger
Ledger Backup Pack bundle offer - Ledger Nano X + Ledger Nano S
Securely manage your assets on-the-go from your smartphone with the Ledger Nano X, and keep the Ledger Nano S for at-home use or in a safe storage as a backup device.
$177.5 M Settlement Proposal: The Second Possible Big Dent In Yahoo’s Treasury For 2013-16 Data Breach Incident
http://bit.ly/2GhodhK
Submitted April 12, 2019 at 09:27AM by Samrat1402
via reddit http://bit.ly/2UdLd50
http://bit.ly/2GhodhK
Submitted April 12, 2019 at 09:27AM by Samrat1402
via reddit http://bit.ly/2UdLd50
Lamanguste
$177.5 M Settlement Proposal: The Second Possible Big Dent In Yahoo’s Treasury For 2013-16 Data Breach Incident
Yahoo today has been learnt offering $177.5 Million to settle a lawsuit related to its 2013 data breach incident which compromised 3 billion user records, the biggest data breach in the history of man
Safety of Your Personal Data Online Is a Life-And-Death Issue
http://bit.ly/2Il0zDp
Submitted April 12, 2019 at 06:13PM by WideFee
via reddit http://bit.ly/2DdbMkY
http://bit.ly/2Il0zDp
Submitted April 12, 2019 at 06:13PM by WideFee
via reddit http://bit.ly/2DdbMkY
Surfshark
Dr. A. Estwick: Safety of Your Personal Data Online Is a Life-And-Death Issue - Surfshark
Cybercrime is real, and your personal data can be used by malicious parties for whatever reasons they have.
A reviewed list on where to find malicious samples
http://bit.ly/2KwX8LH
Submitted April 12, 2019 at 06:30PM by ThisIsLibra
via reddit http://bit.ly/2X59sEg
http://bit.ly/2KwX8LH
Submitted April 12, 2019 at 06:30PM by ThisIsLibra
via reddit http://bit.ly/2X59sEg
reddit
r/netsec - A reviewed list on where to find malicious samples
0 votes and 0 comments so far on Reddit
Apple’s App-Site Association - The New robots.txt
http://bit.ly/2ULhPra
Submitted April 12, 2019 at 07:43PM by digicat
via reddit http://bit.ly/2VDKKug
http://bit.ly/2ULhPra
Submitted April 12, 2019 at 07:43PM by digicat
via reddit http://bit.ly/2VDKKug
ThreatIngestor: a flexible, config-driven framework for harvesting/managing threat intelligence.
http://bit.ly/2U95sRe
Submitted April 12, 2019 at 08:22PM by amusciano
via reddit http://bit.ly/2P7jdPn
http://bit.ly/2U95sRe
Submitted April 12, 2019 at 08:22PM by amusciano
via reddit http://bit.ly/2P7jdPn
GitHub
InQuest/ThreatIngestor
Extract and aggregate threat intelligence. Contribute to InQuest/ThreatIngestor development by creating an account on GitHub.
Credential stuffing attack - Gather information about leaked emails from Pastebin.
http://bit.ly/2P4ZMXH
Submitted April 13, 2019 at 12:09AM by Mysterii8
via reddit http://bit.ly/2VKGlGc
http://bit.ly/2P4ZMXH
Submitted April 13, 2019 at 12:09AM by Mysterii8
via reddit http://bit.ly/2VKGlGc
Medium
Advanced credential stuffing with PEPE
Collect info about email addresses from Pastebin dumps.
VirusTotal for Investigators
http://bit.ly/2KvvEWF
Submitted April 13, 2019 at 11:25AM by digicat
via reddit http://bit.ly/2PbWX7e
http://bit.ly/2KvvEWF
Submitted April 13, 2019 at 11:25AM by digicat
via reddit http://bit.ly/2PbWX7e
reddit
r/netsec - VirusTotal for Investigators
0 votes and 0 comments so far on Reddit
Hack The Box - Redcross Writeup by 0xdf
http://bit.ly/2X6Ccwj
Submitted April 13, 2019 at 08:54PM by Ipp
via reddit http://bit.ly/2VNPWvX
http://bit.ly/2X6Ccwj
Submitted April 13, 2019 at 08:54PM by Ipp
via reddit http://bit.ly/2VNPWvX
0xdf hacks stuff
HTB: RedCross
RedCross was a maze, with a lot to look at and multiple paths at each stage. I’ll start by enumerating a website, and showing two different ways to get a cookie to use to gain access to the admin panel. Then, I’ll get a shell on the box as penelope, either…
Hack The Box - RedCross write-up by 0xRick
http://bit.ly/2Iizdh7
Submitted April 13, 2019 at 08:54PM by Ahm3d_H3sham
via reddit http://bit.ly/2DfCtFU
http://bit.ly/2Iizdh7
Submitted April 13, 2019 at 08:54PM by Ahm3d_H3sham
via reddit http://bit.ly/2DfCtFU
0xRick Owned Root !
Hack The Box - RedCross
Quick Summary Hey guys today RedCross retired and here is my write-up about it. To get an initial shell on this box there are two ways , first one is to exploit an authenticated RCE which gives you a shell as www-data , then escalate to root. The second way…