Undetectable C# & C++ Reverse Shells
http://bit.ly/2WtmNGC
Submitted May 06, 2019 at 03:37PM by ericnyamu
via reddit http://bit.ly/2Vi30ND
http://bit.ly/2WtmNGC
Submitted May 06, 2019 at 03:37PM by ericnyamu
via reddit http://bit.ly/2Vi30ND
Medium
Undetectable C# & C++ Reverse Shells
Technical overview of different way to spawn a reverse shell on a victim machine
CVE-2019–5418: on WAF bypass and caching
http://bit.ly/2DR7Bfg
Submitted May 06, 2019 at 03:36PM by ericnyamu
via reddit http://bit.ly/2H0knIS
http://bit.ly/2DR7Bfg
Submitted May 06, 2019 at 03:36PM by ericnyamu
via reddit http://bit.ly/2H0knIS
PentesterLab
CVE-2019–5418: on WAF bypass and caching
If you follow PentesterLab on Twitter, you probably saw the following tweet:
CVE-2019-7286 Part II: Gaining PC Control
http://bit.ly/2WnfMXS
Submitted May 06, 2019 at 03:35PM by ericnyamu
via reddit http://bit.ly/2VjrA0w
http://bit.ly/2WnfMXS
Submitted May 06, 2019 at 03:35PM by ericnyamu
via reddit http://bit.ly/2VjrA0w
ZecOps Blog
CVE-2019-7286 Part II: Gaining PC Control - ZecOps Blog
VMware Fusion 11 - Guest VM RCE
http://bit.ly/2DR7EaW
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2Jp8b7c
http://bit.ly/2DR7EaW
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2Jp8b7c
theevilbit.github.io
VMware Fusion 11 - Guest VM RCE - CVE-2019-5514
UAC Bypass in System Reset Binary via DLL Hijacking
http://bit.ly/2WnfOis
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2J2FDBq
http://bit.ly/2WnfOis
Submitted May 06, 2019 at 03:31PM by ericnyamu
via reddit http://bit.ly/2J2FDBq
Active Cyber
UAC Bypass in System Reset Binary via DLL Hijacking
To continue our journey in the realm of bypassing UAC (see previous work here ), we’ve decided to investigate Windows Server 2019. Please note this blog post is not a UAC primer but if you need...
Exploiting CSRF on JSON endpoints with Flash and redirects
http://bit.ly/2RXQ0WU
Submitted May 06, 2019 at 03:30PM by ericnyamu
via reddit http://bit.ly/2Jp8f6W
http://bit.ly/2RXQ0WU
Submitted May 06, 2019 at 03:30PM by ericnyamu
via reddit http://bit.ly/2Jp8f6W
Appsecco
Exploiting CSRF on JSON endpoints with Flash and redirects
A quick walkthrough of the setup required to exploit a CSRF vulnerability on a JSON endpoint using a third party attacker controlled…
Security focused Q&A
http://bit.ly/2Pgr5y7
Submitted May 06, 2019 at 03:29PM by ericnyamu
via reddit http://bit.ly/2J2ln2u
http://bit.ly/2Pgr5y7
Submitted May 06, 2019 at 03:29PM by ericnyamu
via reddit http://bit.ly/2J2ln2u
Medium
Security focused Q&A
The security of our network is of paramount concern to us, thus we are starting a series of posts that discuss our robust design. For a…
Dell KACE K1000 Remote Code Execution - the Story of Bug K1-18652
http://bit.ly/2DN3joP
Submitted May 06, 2019 at 03:28PM by ericnyamu
via reddit http://bit.ly/2JkbPzx
http://bit.ly/2DN3joP
Submitted May 06, 2019 at 03:28PM by ericnyamu
via reddit http://bit.ly/2JkbPzx
RCE Security
Dell KACE K1000 Remote Code Execution - the Story of Bug K1-18652
Remote Code Execution Techniques and more.
Using Win95 kernel32.dll exports like a virus.
http://bit.ly/2WnfPmw
Submitted May 06, 2019 at 03:26PM by ericnyamu
via reddit http://bit.ly/2DPHTYi
http://bit.ly/2WnfPmw
Submitted May 06, 2019 at 03:26PM by ericnyamu
via reddit http://bit.ly/2DPHTYi
log.vexation.ca
Using kernel32.dll exports like a virus
Dynamically finding the Win95 kernel32.dll base address and exported APIs.
Exploiting Deserialisation in ASP.NET via ViewState | Soroush Dalili
http://bit.ly/2DR7L6m
Submitted May 06, 2019 at 03:24PM by ericnyamu
via reddit http://bit.ly/2Wwjqig
http://bit.ly/2DR7L6m
Submitted May 06, 2019 at 03:24PM by ericnyamu
via reddit http://bit.ly/2Wwjqig
reddit
r/netsec - Exploiting Deserialisation in ASP.NET via ViewState | Soroush Dalili
0 votes and 0 comments so far on Reddit
autoBOF: a Journey into Automation, Exploit Development, and Buffer Overflows
http://bit.ly/2Vizpnd
Submitted May 06, 2019 at 04:29PM by Evil1337
via reddit http://bit.ly/2VQod0A
http://bit.ly/2Vizpnd
Submitted May 06, 2019 at 04:29PM by Evil1337
via reddit http://bit.ly/2VQod0A
Malicious DLL execution using Apple's APSDaemon.exe signed binary
http://bit.ly/2VnUrRK
Submitted May 06, 2019 at 04:28PM by Evil1337
via reddit http://bit.ly/2vCzqDs
http://bit.ly/2VnUrRK
Submitted May 06, 2019 at 04:28PM by Evil1337
via reddit http://bit.ly/2vCzqDs
Hack the JWT Token
http://bit.ly/2ZWiA05
Submitted May 06, 2019 at 06:03PM by atomlib_com
via reddit http://bit.ly/2ZWla6k
http://bit.ly/2ZWiA05
Submitted May 06, 2019 at 06:03PM by atomlib_com
via reddit http://bit.ly/2ZWla6k
Habr
Hack the JWT Token
For Educational Purposes Only! Intended for Hackers Penetration testers. Issue The algorithm HS256 uses the secret key to sign and verify each message. The...
Optimizing Elasticsearch for security log collection – part 1: reducing the number of shards
http://bit.ly/2VMc50K
Submitted May 06, 2019 at 08:25PM by daanraman
via reddit http://bit.ly/2Y34yrU
http://bit.ly/2VMc50K
Submitted May 06, 2019 at 08:25PM by daanraman
via reddit http://bit.ly/2Y34yrU
NVISO Labs
Optimizing Elasticsearch for security log collection – part 1: reducing the number of shards
Nowadays, logs collection for security monitoring is about indexing, searching and datalakes; this is why at NVISO we use Elasticsearch for our threat hunting activities. Collecting, aggregating an…
Evil Clippy: MS Office maldoc assistant | Outflank Blog
http://bit.ly/300yzdx
Submitted May 06, 2019 at 09:41PM by lowdee
via reddit http://bit.ly/2LthMN2
http://bit.ly/300yzdx
Submitted May 06, 2019 at 09:41PM by lowdee
via reddit http://bit.ly/2LthMN2
outflank.nl
Evil Clippy: MS Office maldoc assistant | Outflank Blog
At BlackHat Asia we released Evil Clippy, a tool which assists red teamers and security testers in creating malicious MS Office documents. Amongst others, Evil Clippy can hide VBA macros, stomp VBA code (via p-code) and confuse popular macro analysis tools.…
OSINT Recon Great? - Unique Usernames Are Better Than Unique Passwords
http://curtbraz.com
Submitted May 06, 2019 at 10:36PM by IndySecMan
via reddit http://bit.ly/2J2uO21
http://curtbraz.com
Submitted May 06, 2019 at 10:36PM by IndySecMan
via reddit http://bit.ly/2J2uO21
reddit
r/netsec - OSINT Recon Great? - Unique Usernames Are Better Than Unique Passwords
0 votes and 0 comments so far on Reddit
WordPress 5.2: Mitigating Supply-Chain Attacks Against 33% of the Internet
http://bit.ly/2Vl9go0
Submitted May 07, 2019 at 06:04AM by sarciszewski
via reddit http://bit.ly/2VRxdmf
http://bit.ly/2Vl9go0
Submitted May 07, 2019 at 06:04AM by sarciszewski
via reddit http://bit.ly/2VRxdmf
Paragonie
WordPress 5.2: Mitigating Supply-Chain Attacks Against 33% of the Internet - Paragon Initiative Enterprises Blog
We wrote a cryptography library entirely in PHP to make your WordPress site secure against supply-chain attacks.
Legacy Outage: Why AS721 Experienced BGP Issues on May 5
http://bit.ly/2Jnq5HA
Submitted May 07, 2019 at 06:17PM by atomlib_com
via reddit http://bit.ly/2V68xlz
http://bit.ly/2Jnq5HA
Submitted May 07, 2019 at 06:17PM by atomlib_com
via reddit http://bit.ly/2V68xlz
Habr
Legacy Outage
Two days ago, May 5 of the year 2019 we saw a peculiar BGP outage, affecting autonomous systems in the customer cone of one very specific AS with the number 721...
MITM and XSS in Counter-Strike: Global Offensive
http://bit.ly/2V0WVQV
Submitted May 06, 2019 at 03:32PM by kkthxbye-
via reddit http://bit.ly/2LufkGh
http://bit.ly/2V0WVQV
Submitted May 06, 2019 at 03:32PM by kkthxbye-
via reddit http://bit.ly/2LufkGh
GitHub
csgo_bugs/README.md at master · kkthxbye-code/csgo_bugs
Random CSGO stuff. Contribute to kkthxbye-code/csgo_bugs development by creating an account on GitHub.
SSH Honey Keys
http://bit.ly/2Wv5ox0
Submitted May 07, 2019 at 09:05PM by kulinacs
via reddit http://bit.ly/2H6xPfs
http://bit.ly/2Wv5ox0
Submitted May 07, 2019 at 09:05PM by kulinacs
via reddit http://bit.ly/2H6xPfs
kulinacs.com
SSH Honey Keys
command="/usr/local/bin/honeykey kulinacs@honeypot",restrict ssh-rsa AAAAB3NzaCB6iakD kulinacs@honeypot
HostHunter: A Recon Tool for Hostname Discovery
http://bit.ly/2Lu8wZe
Submitted May 07, 2019 at 09:20PM by greenwolf247
via reddit http://bit.ly/302lKzn
http://bit.ly/2Lu8wZe
Submitted May 07, 2019 at 09:20PM by greenwolf247
via reddit http://bit.ly/302lKzn
GitHub
SpiderLabs/HostHunter
HostHunter a recon tool for discovering hostnames using OSINT techniques. - SpiderLabs/HostHunter