Monzo's real-time incident response and reporting tool
http://bit.ly/2Y7h3m6
Submitted May 04, 2019 at 06:11PM by digicat
via reddit http://bit.ly/2H2mX2r
http://bit.ly/2Y7h3m6
Submitted May 04, 2019 at 06:11PM by digicat
via reddit http://bit.ly/2H2mX2r
reddit
r/blueteamsec - Monzo's real-time incident response and reporting tool
0 votes and 1 comment so far on Reddit
Hack The Box - BigHead Write-up by 0xRick
http://bit.ly/2WnLi87
Submitted May 04, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2GZuhM2
http://bit.ly/2WnLi87
Submitted May 04, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2GZuhM2
0xRick Owned Root !
Hack The Box - BigHead
Quick Summary Hey guys, Today BigHead retired and here’s my write-up about it. As you can see it’s an insane box, actually it’s hard to summarize this box as it included a lot of steps to achieve different goals. Most of the steps require deep enumeration…
CVE-2018-18500: Write-after-free vulnerability in Firefox, analysis and exploitation
http://bit.ly/2ItUAfs
Submitted May 04, 2019 at 04:48AM by 9129894
via reddit http://bit.ly/2vzPENF
http://bit.ly/2ItUAfs
Submitted May 04, 2019 at 04:48AM by 9129894
via reddit http://bit.ly/2vzPENF
reddit
r/netsec - CVE-2018-18500: Write-after-free vulnerability in Firefox, analysis and exploitation
1 vote and 0 comments so far on Reddit
Creating a PortScanner in C
http://bit.ly/2LjQys3
Submitted May 05, 2019 at 02:48AM by Scrabbilisk
via reddit http://bit.ly/2DLEo5a
http://bit.ly/2LjQys3
Submitted May 05, 2019 at 02:48AM by Scrabbilisk
via reddit http://bit.ly/2DLEo5a
GeeksforGeeks
Creating a PortScanner in C - GeeksforGeeks
Picture a bay where lots of private boats are docked. The location is called a seaport, literally a port at or on the sea. Everyone… Read More »
BadWPAD and wpad.pl / wpadblocking.com case (part 2)
http://bit.ly/2J2jhzI
Submitted May 05, 2019 at 05:19PM by adamziaja_com
via reddit http://bit.ly/2JhXYJK
http://bit.ly/2J2jhzI
Submitted May 05, 2019 at 05:19PM by adamziaja_com
via reddit http://bit.ly/2JhXYJK
blog.redteam.pl
BadWPAD and wpad.pl / wpadblocking.com case (part 2)
red team, blue team, penetration testing, red teaming, threat hunting, digital forensics, incident response, cyber security, IT security
UUTCF 2019 WriteUps
http://bit.ly/2vGoZ1v
Submitted May 05, 2019 at 10:01PM by Eta-Meson
via reddit http://bit.ly/2DLHjdZ
http://bit.ly/2vGoZ1v
Submitted May 05, 2019 at 10:01PM by Eta-Meson
via reddit http://bit.ly/2DLHjdZ
Medium
UUTCTF 2019 WriteUps
In this post I am going to walk you through 3 CTF challenges from UUTCTF 2019, 2 Forensics and 1 Misc. I was so excited to solve these…
INFILTRATE 2019 Slides on Reverse Engineering With Ghidra [PDF, 16 MB]
http://bit.ly/2GY7cbB
Submitted May 06, 2019 at 06:37AM by 0xAlexei
via reddit http://bit.ly/2VIDP6t
http://bit.ly/2GY7cbB
Submitted May 06, 2019 at 06:37AM by 0xAlexei
via reddit http://bit.ly/2VIDP6t
reddit
r/netsec - INFILTRATE 2019 Slides on Reverse Engineering With Ghidra [PDF, 16 MB]
0 votes and 0 comments so far on Reddit
CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD
http://bit.ly/2ZI4Wxw
Submitted May 06, 2019 at 12:31PM by infosec-jobs
via reddit http://bit.ly/2H5A96z
http://bit.ly/2ZI4Wxw
Submitted May 06, 2019 at 12:31PM by infosec-jobs
via reddit http://bit.ly/2H5A96z
Lawrence Teo
CarolinaCon 15: Writing Exploit-Resistant Code With OpenBSD
On April 27, 2019, I gave a talk on how to use OpenBSD to write better software at CarolinaCon 15 in Charlotte.
Undetectable C# & C++ Reverse Shells
http://bit.ly/2WtmNGC
Submitted May 06, 2019 at 03:37PM by ericnyamu
via reddit http://bit.ly/2Vi30ND
http://bit.ly/2WtmNGC
Submitted May 06, 2019 at 03:37PM by ericnyamu
via reddit http://bit.ly/2Vi30ND
Medium
Undetectable C# & C++ Reverse Shells
Technical overview of different way to spawn a reverse shell on a victim machine
CVE-2019–5418: on WAF bypass and caching
http://bit.ly/2DR7Bfg
Submitted May 06, 2019 at 03:36PM by ericnyamu
via reddit http://bit.ly/2H0knIS
http://bit.ly/2DR7Bfg
Submitted May 06, 2019 at 03:36PM by ericnyamu
via reddit http://bit.ly/2H0knIS
PentesterLab
CVE-2019–5418: on WAF bypass and caching
If you follow PentesterLab on Twitter, you probably saw the following tweet:
CVE-2019-7286 Part II: Gaining PC Control
http://bit.ly/2WnfMXS
Submitted May 06, 2019 at 03:35PM by ericnyamu
via reddit http://bit.ly/2VjrA0w
http://bit.ly/2WnfMXS
Submitted May 06, 2019 at 03:35PM by ericnyamu
via reddit http://bit.ly/2VjrA0w
ZecOps Blog
CVE-2019-7286 Part II: Gaining PC Control - ZecOps Blog
VMware Fusion 11 - Guest VM RCE
http://bit.ly/2DR7EaW
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2Jp8b7c
http://bit.ly/2DR7EaW
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2Jp8b7c
theevilbit.github.io
VMware Fusion 11 - Guest VM RCE - CVE-2019-5514
UAC Bypass in System Reset Binary via DLL Hijacking
http://bit.ly/2WnfOis
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2J2FDBq
http://bit.ly/2WnfOis
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2J2FDBq
Active Cyber
UAC Bypass in System Reset Binary via DLL Hijacking
To continue our journey in the realm of bypassing UAC (see previous work here ), we’ve decided to investigate Windows Server 2019. Please note this blog post is not a UAC primer but if you need...
Exploiting CSRF on JSON endpoints with Flash and redirects
http://bit.ly/2RXQ0WU
Submitted May 06, 2019 at 03:30PM by ericnyamu
via reddit http://bit.ly/2Jp8f6W
http://bit.ly/2RXQ0WU
Submitted May 06, 2019 at 03:30PM by ericnyamu
via reddit http://bit.ly/2Jp8f6W
Appsecco
Exploiting CSRF on JSON endpoints with Flash and redirects
A quick walkthrough of the setup required to exploit a CSRF vulnerability on a JSON endpoint using a third party attacker controlled…
Security focused Q&A
http://bit.ly/2Pgr5y7
Submitted May 06, 2019 at 03:29PM by ericnyamu
via reddit http://bit.ly/2J2ln2u
http://bit.ly/2Pgr5y7
Submitted May 06, 2019 at 03:29PM by ericnyamu
via reddit http://bit.ly/2J2ln2u
Medium
Security focused Q&A
The security of our network is of paramount concern to us, thus we are starting a series of posts that discuss our robust design. For a…
Dell KACE K1000 Remote Code Execution - the Story of Bug K1-18652
http://bit.ly/2DN3joP
Submitted May 06, 2019 at 03:28PM by ericnyamu
via reddit http://bit.ly/2JkbPzx
http://bit.ly/2DN3joP
Submitted May 06, 2019 at 03:28PM by ericnyamu
via reddit http://bit.ly/2JkbPzx
RCE Security
Dell KACE K1000 Remote Code Execution - the Story of Bug K1-18652
Remote Code Execution Techniques and more.
Using Win95 kernel32.dll exports like a virus.
http://bit.ly/2WnfPmw
Submitted May 06, 2019 at 03:26PM by ericnyamu
via reddit http://bit.ly/2DPHTYi
http://bit.ly/2WnfPmw
Submitted May 06, 2019 at 03:26PM by ericnyamu
via reddit http://bit.ly/2DPHTYi
log.vexation.ca
Using kernel32.dll exports like a virus
Dynamically finding the Win95 kernel32.dll base address and exported APIs.
Exploiting Deserialisation in ASP.NET via ViewState | Soroush Dalili
http://bit.ly/2DR7L6m
Submitted May 06, 2019 at 03:24PM by ericnyamu
via reddit http://bit.ly/2Wwjqig
http://bit.ly/2DR7L6m
Submitted May 06, 2019 at 03:24PM by ericnyamu
via reddit http://bit.ly/2Wwjqig
reddit
r/netsec - Exploiting Deserialisation in ASP.NET via ViewState | Soroush Dalili
0 votes and 0 comments so far on Reddit
autoBOF: a Journey into Automation, Exploit Development, and Buffer Overflows
http://bit.ly/2Vizpnd
Submitted May 06, 2019 at 04:29PM by Evil1337
via reddit http://bit.ly/2VQod0A
http://bit.ly/2Vizpnd
Submitted May 06, 2019 at 04:29PM by Evil1337
via reddit http://bit.ly/2VQod0A
Malicious DLL execution using Apple's APSDaemon.exe signed binary
http://bit.ly/2VnUrRK
Submitted May 06, 2019 at 04:28PM by Evil1337
via reddit http://bit.ly/2vCzqDs
http://bit.ly/2VnUrRK
Submitted May 06, 2019 at 04:28PM by Evil1337
via reddit http://bit.ly/2vCzqDs
Hack the JWT Token
http://bit.ly/2ZWiA05
Submitted May 06, 2019 at 06:03PM by atomlib_com
via reddit http://bit.ly/2ZWla6k
http://bit.ly/2ZWiA05
Submitted May 06, 2019 at 06:03PM by atomlib_com
via reddit http://bit.ly/2ZWla6k
Habr
Hack the JWT Token
For Educational Purposes Only! Intended for Hackers Penetration testers. Issue The algorithm HS256 uses the secret key to sign and verify each message. The...