Stealing Downloads from Slack Users
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 06:58PM by corp_account
via reddit http://bit.ly/2JMhoXA
http://bit.ly/2WaJAtM
Submitted May 17, 2019 at 06:58PM by corp_account
via reddit http://bit.ly/2JMhoXA
Medium
Stealing Downloads from Slack Users
I’m going to go over an interesting feature abuse that could have been used to steal and even manipulate downloads from Slack users using the Slack desktop app on Windows. The vulnerability was…
25,000+ Linksys WiFi routers are vulnerable to disclosing sensitive information about connected devices through a JNAP/ HTTP request.
http://bit.ly/2VoaYjE
Submitted May 17, 2019 at 09:49PM by _TjBrett_
via reddit http://bit.ly/2EhcSwR
http://bit.ly/2VoaYjE
Submitted May 17, 2019 at 09:49PM by _TjBrett_
via reddit http://bit.ly/2EhcSwR
BleepingComputer
Linksys Smart Wi-Fi Routers Leak Info of Connected Devices
More than 25,000 Linksys Smart Wi-Fi routers are currently impacted by an information disclosure vulnerability which allows remote and unauthenticated access to a vast array of sensitive device information.
Twitter disclosed on HackerOne: Twitter ID exposure via error-based...
http://bit.ly/2VtLnWA
Submitted May 18, 2019 at 01:38AM by terjanq
via reddit http://bit.ly/2Jpet7T
http://bit.ly/2VtLnWA
Submitted May 18, 2019 at 01:38AM by terjanq
via reddit http://bit.ly/2Jpet7T
HackerOne
Twitter disclosed on HackerOne: Twitter ID exposure via error-based...
Twitter ID Confirmator
===
## Summary
Recently I discovered a privacy-related vulnerability in Twitter. An attacker exploiting this vulnerability can identify a user when they visit a malicious...
===
## Summary
Recently I discovered a privacy-related vulnerability in Twitter. An attacker exploiting this vulnerability can identify a user when they visit a malicious...
Exploit for Linksys JNAP info leak vulnerability published as sn0int module
http://bit.ly/2QaDPaf
Submitted May 18, 2019 at 02:56PM by kpcyrd
via reddit http://bit.ly/2WMnScM
http://bit.ly/2QaDPaf
Submitted May 18, 2019 at 02:56PM by kpcyrd
via reddit http://bit.ly/2WMnScM
reddit
r/sn0int - kpcyrd/cve-2014-8244 0.1.0 - Get connected devices from linksys router via JNAP information leak
0 votes and 1 comment so far on Reddit
Hack The Box - Conceal Write-up by 0xRick
http://bit.ly/2JqC9ZF
Submitted May 18, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2Wbq5RM
http://bit.ly/2JqC9ZF
Submitted May 18, 2019 at 08:32PM by Ahm3d_H3sham
via reddit http://bit.ly/2Wbq5RM
0xRick Owned Root !
Hack The Box - Conceal
Quick Summary Hey guys today Conceal retired and here’s my write-up about it. Conceal was a straightforward fun box, The only tricky part about it is gaining IPSEC connection to gain access to some filtered services. That first part involved some guessing…
Reverse Engineering the iClicker Base Station
http://bit.ly/2JR2ak3
Submitted May 18, 2019 at 09:36PM by ammar2
via reddit http://bit.ly/2Js6E1k
http://bit.ly/2JR2ak3
Submitted May 18, 2019 at 09:36PM by ammar2
via reddit http://bit.ly/2Js6E1k
Ammar's Blog
Reverse Engineering the iClicker Base Station
My blog, mostly about programming
Reverse Shell Cheatsheet
http://bit.ly/2WfFQag
Submitted May 19, 2019 at 02:04AM by mycall
via reddit http://bit.ly/2JP2xM3
http://bit.ly/2WfFQag
Submitted May 19, 2019 at 02:04AM by mycall
via reddit http://bit.ly/2JP2xM3
GitHub
swisskyrepo/PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF - swisskyrepo/PayloadsAllTheThings
Reversing Golang Binaries: Part-2
http://bit.ly/2Qci3CE
Submitted May 19, 2019 at 12:06PM by nishan8583
via reddit http://bit.ly/2w8HEn0
http://bit.ly/2Qci3CE
Submitted May 19, 2019 at 12:06PM by nishan8583
via reddit http://bit.ly/2w8HEn0
Medium
Reversing Golang Binaries: Part-2
In the previous article I Disassembled a simple password validator go program. In this one lets go a big bigger. I will try to reverse a…
New research: How effective is basic account hygiene at preventing hijacking
http://bit.ly/2Hns6lz
Submitted May 19, 2019 at 11:58AM by digicat
via reddit http://bit.ly/2Q7GocQ
http://bit.ly/2Hns6lz
Submitted May 19, 2019 at 11:58AM by digicat
via reddit http://bit.ly/2Q7GocQ
Google Online Security Blog
New research: How effective is basic account hygiene at preventing hijacking
Posted by Kurt Thomas and Angelika Moscicki Every day, we protect users from hundreds of thousands of account hijacking attempts. Most at...
Building a Basic Honeypot
http://bit.ly/2VBLS0G
Submitted May 19, 2019 at 06:54PM by skeeto
via reddit http://bit.ly/2JQmaDo
http://bit.ly/2VBLS0G
Submitted May 19, 2019 at 06:54PM by skeeto
via reddit http://bit.ly/2JQmaDo
reddit
r/netsec - Building a Basic Honeypot
0 votes and 0 comments so far on Reddit
[HOW-TO] Azure Apps for Command and Control - Remember all those subdomain takeovers?
http://bit.ly/2YCVASw
Submitted May 18, 2019 at 02:51PM by vysec
via reddit http://bit.ly/2w4kQF3
http://bit.ly/2YCVASw
Submitted May 18, 2019 at 02:51PM by vysec
via reddit http://bit.ly/2w4kQF3
vincentyiu.co.uk
Azure Apps for Command and Control
Azure Apps are often subject to subdomain takeovers, or you might even want to use Azure Apps for Command and Control!
Half a Million Routers Infected by VPNFilter Malware - ArcTitan
http://bit.ly/2EmfbyG
Submitted May 19, 2019 at 09:02PM by khdeeja234
via reddit http://bit.ly/2WRWOst
http://bit.ly/2EmfbyG
Submitted May 19, 2019 at 09:02PM by khdeeja234
via reddit http://bit.ly/2WRWOst
ArcTitan
Half a Million Routers Infected by VPNFilter Malware - ArcTitan
What is believed to be a nation-state sponsored hacking group has managed to infect around half a million routers with VPNFilter malware. VPNFilter is a modular malware that can carry out various functions, including the reviewing all communications, beginning…
Mapping Iran's Rana Institute to MITRE Pre-ATT&CK and ATT&CK
http://bit.ly/2JG7IOb
Submitted May 19, 2019 at 10:36PM by digicat
via reddit http://bit.ly/2VD3KIs
http://bit.ly/2JG7IOb
Submitted May 19, 2019 at 10:36PM by digicat
via reddit http://bit.ly/2VD3KIs
Digital Shadows
Mapping Iran's Rana Institute to MITRE Pre-ATT&CK™ and ATT&CK™ | Digital Shadows
The internet has been aflame with discussions around three leaks of internal information from APT groups attributed with the Islamic Republic of Iran. One of these leaks was written up by the security firm ClearSky and details what appears to be an offensive…
Work Diary - Research work & Deployment of Security Policies
http://bit.ly/2JOBfFz
Submitted May 20, 2019 at 03:58AM by Eta-Meson
via reddit http://bit.ly/2JsKr2S
http://bit.ly/2JOBfFz
Submitted May 20, 2019 at 03:58AM by Eta-Meson
via reddit http://bit.ly/2JsKr2S
Medium
Work Diary - Research work & Deployment of Security Policies
I just recently joined a startup and have been a part of their InfoSec team. Recently this thought popped up in my mind that I should…
Damn Vulnerable Crypto Wallet - An extremely insecure Ethereum cryptowallet
http://bit.ly/2HIvB51
Submitted May 20, 2019 at 09:41AM by w0lf_101
via reddit http://bit.ly/2VQ8Lm8
http://bit.ly/2HIvB51
Submitted May 20, 2019 at 09:41AM by w0lf_101
via reddit http://bit.ly/2VQ8Lm8
GitLab
Bad Bounty Repo / dvcw
How I hacked into my college’s database!
http://bit.ly/2Ju2jL5
Submitted May 21, 2019 at 03:58AM by Eta-Meson
via reddit http://bit.ly/2YBaXe4
http://bit.ly/2Ju2jL5
Submitted May 21, 2019 at 03:58AM by Eta-Meson
via reddit http://bit.ly/2YBaXe4
Medium
How I hacked into a college’s database!
This article is being re-published originally written by me one year back.
Creating a covert channel over the Telegram messenger
http://bit.ly/2w8XRIH
Submitted May 21, 2019 at 04:09AM by Labunsky
via reddit http://bit.ly/2wbU25A
http://bit.ly/2w8XRIH
Submitted May 21, 2019 at 04:09AM by Labunsky
via reddit http://bit.ly/2wbU25A
Medium
Even more secret Telegrams
We used to think of Telegram as a reliable and secure transmission medium for messages of any sort. But under the hood, it has a rather…
Sojobo - Yet another binary analysis framework
http://bit.ly/2HsSGtF
Submitted May 21, 2019 at 01:59AM by aparata_s4tan
via reddit http://bit.ly/2YBPemd
http://bit.ly/2HsSGtF
Submitted May 21, 2019 at 01:59AM by aparata_s4tan
via reddit http://bit.ly/2YBPemd
Blogspot
Sojobo - Yet another binary analysis framework
Twitter: @s4tan Sojobo GitHub project: https://github.com/enkomio/Sojobo Sojobo is a new binary analysis framework written in .NET and b...
CVE-2019-3568: WhatsApp 0 day analysis
http://bit.ly/2HpPlLQ
Submitted May 21, 2019 at 10:35AM by digicat
via reddit http://bit.ly/2WQ99NT
http://bit.ly/2HpPlLQ
Submitted May 21, 2019 at 10:35AM by digicat
via reddit http://bit.ly/2WQ99NT
reddit
r/netsec - CVE-2019-3568: WhatsApp 0 day analysis
0 votes and 5 comments so far on Reddit
Incident response at your fingertips with Microsoft Defender ATP live response
http://bit.ly/2HuUrH2
Submitted May 21, 2019 at 12:30PM by digicat
via reddit http://bit.ly/2YGqDgi
http://bit.ly/2HuUrH2
Submitted May 21, 2019 at 12:30PM by digicat
via reddit http://bit.ly/2YGqDgi
TECHCOMMUNITY.MICROSOFT.COM
Incident response at your fingertips with Microsoft Defender ATP live response
Conducting a thorough forensic investigation of compromised machines is integral to incident response. However, it can be a challenging task because it requires the device to be in the corporate network and for additional software to be deployed, or for SecOps…
Linux privilege escalation via LXD & relayed UNIX socket credentials
http://bit.ly/2w7D4FF
Submitted May 21, 2019 at 04:20PM by initstring
via reddit http://bit.ly/2LVqwf8
http://bit.ly/2w7D4FF
Submitted May 21, 2019 at 04:20PM by initstring
via reddit http://bit.ly/2LVqwf8
Shenanigans Labs
Linux Privilege Escalation via LXD & Hijacked UNIX Socket Credentials
Linux systems running LXD are vulnerable to privilege escalation via multiple attack paths, two of which are published in my “lxd_root” GitHub repository. This blog will go into the details of what I think is a very interesting path - abusing relayed UNIX…