RCE in CGI Servlet – Apache Tomcat on Windows – CVE-2019-0232
http://bit.ly/2vubCl3
Submitted May 01, 2019 at 04:38PM by nightwatchcyber
via reddit http://bit.ly/2Vvgl4L
http://bit.ly/2vubCl3
Submitted May 01, 2019 at 04:38PM by nightwatchcyber
via reddit http://bit.ly/2Vvgl4L
Nightwatch Cybersecurity
Remote Code Execution (RCE) in CGI Servlet – Apache Tomcat on Windows – CVE-2019-0232
Summary Apache Tomcat has a vulnerability in the CGI Servlet which can be exploited to achieve remote code execution (RCE). This is only exploitable when running on Windows in a non-default configu…
Packaging the PwnedPassword data set
http://bit.ly/2URzqK3
Submitted May 01, 2019 at 05:12PM by fish-
via reddit http://bit.ly/2LhoHsF
http://bit.ly/2URzqK3
Submitted May 01, 2019 at 05:12PM by fish-
via reddit http://bit.ly/2LhoHsF
Why I deactivated Tesla app access
http://bit.ly/2J7qJZI
Submitted May 01, 2019 at 06:25PM by Pokaw0
via reddit http://bit.ly/2IUaOhY
http://bit.ly/2J7qJZI
Submitted May 01, 2019 at 06:25PM by Pokaw0
via reddit http://bit.ly/2IUaOhY
reddit
r/netsec - Why I deactivated Tesla app access
0 votes and 2 comments so far on Reddit
lor-axe: Multithreaded Slow HTTP DOS tool for stress testing web-servers. Written in 100% Safe Rust
http://bit.ly/2Y0zwRn
Submitted May 01, 2019 at 08:51PM by ajmwagar
via reddit http://bit.ly/2GXxU5o
http://bit.ly/2Y0zwRn
Submitted May 01, 2019 at 08:51PM by ajmwagar
via reddit http://bit.ly/2GXxU5o
GitHub
ajmwagar/lor-axe
🪓 a multi-threaded, low-bandwidth HTTP DOS tool. Contribute to ajmwagar/lor-axe development by creating an account on GitHub.
Remote Code Execution on most Dell computers
http://bit.ly/2VD63PQ
Submitted May 02, 2019 at 12:00AM by hacker_rodeo
via reddit http://bit.ly/2UTgytV
http://bit.ly/2VD63PQ
Submitted May 02, 2019 at 12:00AM by hacker_rodeo
via reddit http://bit.ly/2UTgytV
d4stiny.github.io
Remote Code Execution on most Dell computers
What computer do you use? Who made it? Have you ever thought about what came with your computer? When we think of Remote Code Execution (RCE) vulnerabilities in mass, we might think of vulnerabilities in the operating system, but another attack vector to…
Data Exfiltration via GCP Storage Buckets (PoC)
http://bit.ly/2PFclco
Submitted May 02, 2019 at 01:48AM by myover
via reddit http://bit.ly/2LgEGHC
http://bit.ly/2PFclco
Submitted May 02, 2019 at 01:48AM by myover
via reddit http://bit.ly/2LgEGHC
Praetorian
Cloud Data Exfiltration via GCP Storage Buckets and How to Prevent It
On a recent engagement, we gained the ability to execute code on a pod which we compromised through a SQL injection vulnerability. With the SQL injection, we could write pickled python objects to a table in a database and those objects would be unpickled…
Zero to Hero Pentesting
http://bit.ly/2DHEb2N
Submitted May 02, 2019 at 02:25AM by DorkNowitzki41
via reddit http://bit.ly/2XYeOBF
http://bit.ly/2DHEb2N
Submitted May 02, 2019 at 02:25AM by DorkNowitzki41
via reddit http://bit.ly/2XYeOBF
Cybersecurity Training | The Cyber Mentor
Zero to Hero Pentesting | Cybersecurity Training | The Cyber Mentor
The Cyber Mentor provides cybersecurity and penetration testing training via Twitch, YouTube, and more.
A free repo of AWS Security Configuration Items
https://asecure.cloud
Submitted May 02, 2019 at 02:23AM by elitistAlmond
via reddit http://bit.ly/2GWgHcs
https://asecure.cloud
Submitted May 02, 2019 at 02:23AM by elitistAlmond
via reddit http://bit.ly/2GWgHcs
asecure.cloud
ASecureCloud: Your AI-Powered Cloud Advisor
Build, secure and operate your AWS cloud environments
Insane bad security for download server from O&O "ShutUp10" tool
http://bit.ly/2LingdC
Submitted May 02, 2019 at 03:51AM by rediii123
via reddit http://bit.ly/2JacrYu
http://bit.ly/2LingdC
Submitted May 02, 2019 at 03:51AM by rediii123
via reddit http://bit.ly/2JacrYu
Azure Security Logging – part 2: security-logging capabilities of Azure resources
http://bit.ly/2ISO2GI
Submitted May 02, 2019 at 02:59PM by daanraman
via reddit http://bit.ly/2VDfqPK
http://bit.ly/2ISO2GI
Submitted May 02, 2019 at 02:59PM by daanraman
via reddit http://bit.ly/2VDfqPK
NVISO Labs
Azure Security Logging – part 2: security-logging capabilities of Azure resources
In this second blog post in a series about Azure Security Logging, we will focus on some of the key services that are used in most Azure deployments. We go into detail how logging can be enabled, w…
Strong password dilemma: tips on securing your data online
http://bit.ly/2VMsv9z
Submitted May 02, 2019 at 07:12PM by ArchieJackson
via reddit http://bit.ly/2Y8FMH1
http://bit.ly/2VMsv9z
Submitted May 02, 2019 at 07:12PM by ArchieJackson
via reddit http://bit.ly/2Y8FMH1
Medium
Strong password dilemma: tips on securing your data online
Problems with passwords in 2019
Why You Shouldn't Use a Password Manager For Your Linode Account
http://bit.ly/2UVz6K3
Submitted May 02, 2019 at 06:25PM by utku1337
via reddit http://bit.ly/2Y2Eddk
http://bit.ly/2UVz6K3
Submitted May 02, 2019 at 06:25PM by utku1337
via reddit http://bit.ly/2Y2Eddk
Utkusen
Why You Shouldn't Use a Password Manager For Your Linode Account
I was trying to find an anomaly on popular password managers. After a while, I realized that the most popular password managers such as Lastpass, 1password, Dashlane are supporting form autofill on subdomains by default. Which means, when I use a password…
BadWPAD, DNS suffix and wpad.pl / wpadblocking.com case
http://bit.ly/2GQQ0EJ
Submitted May 02, 2019 at 09:19PM by adamziaja_com
via reddit http://bit.ly/2V7hQGG
http://bit.ly/2GQQ0EJ
Submitted May 02, 2019 at 09:19PM by adamziaja_com
via reddit http://bit.ly/2V7hQGG
blog.redteam.pl
BadWPAD, DNS suffix and wpad.pl / wpadblocking.com case
Techblog o cyberbezpieczeństwie
TCP/IP over Amazon Cloudwatch Logs
http://bit.ly/2Vgd9uw
Submitted May 02, 2019 at 11:08PM by nexxai
via reddit http://bit.ly/2GXUmv0
http://bit.ly/2Vgd9uw
Submitted May 02, 2019 at 11:08PM by nexxai
via reddit http://bit.ly/2GXUmv0
Medium
TCP/IP over Amazon Cloudwatch Logs
Running network services inside AWS Lambda Functions
Process Injection and Process Hollowing Tool Release (Vulcan)
http://bit.ly/2VE8HoI
Submitted May 02, 2019 at 10:32PM by myover
via reddit http://bit.ly/2LhIb0d
http://bit.ly/2VE8HoI
Submitted May 02, 2019 at 10:32PM by myover
via reddit http://bit.ly/2LhIb0d
Praetorian
Process Injection and Process Hollowing (ATT&CK T1055 & T1093)
We are releasing Vulcan, a tool to make it easy and fast to test various forms of injection. All of the techniques included are already public. Vulcan brings them together in a single tool to test endpoint detection and response (EDR) coverage so that you…
An Old Cisco OpenSSH Bug
http://bit.ly/2JaJknJ
Submitted May 02, 2019 at 07:32PM by corp_account
via reddit http://bit.ly/2Vb1f4J
http://bit.ly/2JaJknJ
Submitted May 02, 2019 at 07:32PM by corp_account
via reddit http://bit.ly/2Vb1f4J
Medium
An Old Cisco OpenSSH Bug
From support issue to 0day… sort of.
GitHub - tg12/SecurityHeaders_GovUK: A scan of all .gov.uk sites for the most common security headers
http://bit.ly/2GRP8j8
Submitted May 02, 2019 at 10:10PM by Quick_Stick
via reddit http://bit.ly/2vATIwW
http://bit.ly/2GRP8j8
Submitted May 02, 2019 at 10:10PM by Quick_Stick
via reddit http://bit.ly/2vATIwW
GitHub
tg12/SecurityHeaders_GovUK
A scan of all .gov.uk sites for the most common security headers or lack of - tg12/SecurityHeaders_GovUK
Open source SIRP with Elasticsearch and TheHive
http://bit.ly/2IW8Xt6
Submitted May 03, 2019 at 02:55AM by HurdyDurdy
via reddit http://bit.ly/2JbsqFw
http://bit.ly/2IW8Xt6
Submitted May 03, 2019 at 02:55AM by HurdyDurdy
via reddit http://bit.ly/2JbsqFw
reddit
r/netsec - Open source SIRP with Elasticsearch and TheHive
0 votes and 0 comments so far on Reddit
<b>CCDC Red Team Live Q&A - 5/3 @ 12PM CST!</b>
<strong>Note: Submit your questions via Sli.do Q&A!!!</strong>Hey <a href="/r/netsec">/r/netsec! Dave and I are excited to announce a new Q&A with the Red Team! Thanks to <a href="/r/netsec">/r/netsec mods for supporting this event!Dave and myself are hosting the event and he's written a little denoscription below about what to expect!Dave's Introduction (<a href="/u/NCCDC_DCowen">/u/NCCDC_DCowen)Hello Reddit! My name is David Cowen and since 2007 I’ve been the captain of the <a href="https://nationalccdc.org">National Collegiate Cyber Defense Competition Red Team (also known as NCCDC). CCDC is a network security defense contest where student teams are pitted against real world information security professionals. Student teams or blue teams defend their networks while the security professionals or red team attempts to break in. CCDC is a competition open to any college (2 or 4 year) who gets together a team of up to 12 full time students, of which two can be graduate students. Eight of those team members can compete in a CCDC event, and the events usually last 10-25 hours of gameplay over two days.Teams first qualify locally and then can move on to regionals. There are 10 regionals around the US and the winning team from each is flown to the National Championship (NCCDC) to face my team.My team consists of professional penetration testers, reverse engineers, social engineers, security software developers and other security professionals who get to ignore the normal rules of the world for a weekend and try their dirtiest tricks against the best college teams in the nation. How dirty? In the real world we can’t just go around leaving custom malware and wiping systems but in NCCDC we can! It’s the ability to play a real bad guy that brings in very motivated attackers to be on my team. CCDC, and specifically NCCDC, is different from other computer security contests as the red team is the only attacker. The student teams (blue teams) are there to defend their network while achieving business objectives given to them by organizers posing as their CEO.The scenario differs but usually follows this basic scenario, you and your team have just taken over an already active IT infrastructure. The prior IT team was fired and you have to quickly jump in and get things in shape. At the exact time as the teams start entering their rooms and securing their systems, the red team is given the IP addresses of the teams and nothing else. We both walk in blind, the blue team gets a packet about their network including passwords while the red team gets a list of IP address ranges and from that point on it’s a race to see who will win. Our objective is to emulate sophisticated threats that, just like the real world, don't play by the rules. We apply this mindset to all teams and act as the adversarial force. The team that can demonstrate the best proficiency in responding, remediating, and eradicating our intrusions wins.This year, myself and Alex Levinson, one of my core Red Team members, are going to do a Livestream AMA on the Forensic Lunch podcast! In order to help anyone that can't listen in live, we've put up a sli.do where you can submit, and vote on questions ahead of time. The podcast will also be recorded and published for anyone unable to attend.We're looking forward to having an amazing discussion with anyone interested on Friday!David CowenNational CCDC Red Team CaptainWhoDavid Cowen, Red Team CaptainDavid Cowen, CISSP, is a partner at <a href="https://www.g-cpartners.com">G-C Partners, LLC based in Dallas, Texas. Mr. Cowen is one of the authors of <a href="https://www.amazon.com/Hacking-Exposed-Computer-Forensics-Second/dp/0071626778">Hacking Exposed: Computer Forensics first and second editions, the third edition of the <a href="https://www.amazon.com/Anti-Hacker-Tool-Third-Mike-Shema-ebook/dp/B005EPU86M/ref=sr_1_1?keywords=anti-hacker+tool+kit&qid=1556545701&s=books&sr=1-1-catcorr">Anti-Hacker…
<strong>Note: Submit your questions via Sli.do Q&A!!!</strong>Hey <a href="/r/netsec">/r/netsec! Dave and I are excited to announce a new Q&A with the Red Team! Thanks to <a href="/r/netsec">/r/netsec mods for supporting this event!Dave and myself are hosting the event and he's written a little denoscription below about what to expect!Dave's Introduction (<a href="/u/NCCDC_DCowen">/u/NCCDC_DCowen)Hello Reddit! My name is David Cowen and since 2007 I’ve been the captain of the <a href="https://nationalccdc.org">National Collegiate Cyber Defense Competition Red Team (also known as NCCDC). CCDC is a network security defense contest where student teams are pitted against real world information security professionals. Student teams or blue teams defend their networks while the security professionals or red team attempts to break in. CCDC is a competition open to any college (2 or 4 year) who gets together a team of up to 12 full time students, of which two can be graduate students. Eight of those team members can compete in a CCDC event, and the events usually last 10-25 hours of gameplay over two days.Teams first qualify locally and then can move on to regionals. There are 10 regionals around the US and the winning team from each is flown to the National Championship (NCCDC) to face my team.My team consists of professional penetration testers, reverse engineers, social engineers, security software developers and other security professionals who get to ignore the normal rules of the world for a weekend and try their dirtiest tricks against the best college teams in the nation. How dirty? In the real world we can’t just go around leaving custom malware and wiping systems but in NCCDC we can! It’s the ability to play a real bad guy that brings in very motivated attackers to be on my team. CCDC, and specifically NCCDC, is different from other computer security contests as the red team is the only attacker. The student teams (blue teams) are there to defend their network while achieving business objectives given to them by organizers posing as their CEO.The scenario differs but usually follows this basic scenario, you and your team have just taken over an already active IT infrastructure. The prior IT team was fired and you have to quickly jump in and get things in shape. At the exact time as the teams start entering their rooms and securing their systems, the red team is given the IP addresses of the teams and nothing else. We both walk in blind, the blue team gets a packet about their network including passwords while the red team gets a list of IP address ranges and from that point on it’s a race to see who will win. Our objective is to emulate sophisticated threats that, just like the real world, don't play by the rules. We apply this mindset to all teams and act as the adversarial force. The team that can demonstrate the best proficiency in responding, remediating, and eradicating our intrusions wins.This year, myself and Alex Levinson, one of my core Red Team members, are going to do a Livestream AMA on the Forensic Lunch podcast! In order to help anyone that can't listen in live, we've put up a sli.do where you can submit, and vote on questions ahead of time. The podcast will also be recorded and published for anyone unable to attend.We're looking forward to having an amazing discussion with anyone interested on Friday!David CowenNational CCDC Red Team CaptainWhoDavid Cowen, Red Team CaptainDavid Cowen, CISSP, is a partner at <a href="https://www.g-cpartners.com">G-C Partners, LLC based in Dallas, Texas. Mr. Cowen is one of the authors of <a href="https://www.amazon.com/Hacking-Exposed-Computer-Forensics-Second/dp/0071626778">Hacking Exposed: Computer Forensics first and second editions, the third edition of the <a href="https://www.amazon.com/Anti-Hacker-Tool-Third-Mike-Shema-ebook/dp/B005EPU86M/ref=sr_1_1?keywords=anti-hacker+tool+kit&qid=1556545701&s=books&sr=1-1-catcorr">Anti-Hacker…
Amazon
Hacking Exposed Computer Forensics, Second Edition: Computer Forensics Secrets & Solutions: 8601406057296: Computer Science Books…
How to Reverse Malware on macOS Without Getting Infected | Part 1
http://bit.ly/2ZGVCtR
Submitted May 03, 2019 at 11:16AM by jeandrew
via reddit http://bit.ly/2H6hjLB
http://bit.ly/2ZGVCtR
Submitted May 03, 2019 at 11:16AM by jeandrew
via reddit http://bit.ly/2H6hjLB
SentinelOne
How to Reverse Malware on macOS Without Getting Infected | Part 1
Ever wanted to learn how to reverse malware on Apple macOS? This is the place to start! Join us in this 3-part series on macOS reverse engineering skills.
Story of a Hundred Vulnerable Jenkins Plugins
http://bit.ly/2UY86to
Submitted May 03, 2019 at 10:14AM by digicat
via reddit http://bit.ly/2GY8Jj4
http://bit.ly/2UY86to
Submitted May 03, 2019 at 10:14AM by digicat
via reddit http://bit.ly/2GY8Jj4
reddit
r/netsec - Story of a Hundred Vulnerable Jenkins Plugins
0 votes and 0 comments so far on Reddit