Multithreaded powershell noscript to exfiltrate data securely
http://bit.ly/2VTy46G
Submitted May 23, 2019 at 03:43AM by p3nt4
via reddit http://bit.ly/2YC1TWi
http://bit.ly/2VTy46G
Submitted May 23, 2019 at 03:43AM by p3nt4
via reddit http://bit.ly/2YC1TWi
GitHub
p3nt4/MagicCopy
Powershell noscript to exfiltrate large files quickly and securely - p3nt4/MagicCopy
Love is in the air: Reverse Engineering a shitty drone :: EzequielTBH Blog's
http://bit.ly/2VJWKK2
Submitted May 23, 2019 at 07:52AM by EzequielTBH
via reddit http://bit.ly/2wnFW1n
http://bit.ly/2VJWKK2
Submitted May 23, 2019 at 07:52AM by EzequielTBH
via reddit http://bit.ly/2wnFW1n
ezequieltbh.me
Love is in the air: Reverse Engineering a shitty drone
On March 9, 2018, (hey, better late than never :), Security Jam, a security meeting/conference, was held, where speakers present their Research in a relaxed environment.
Last year I was lucky enough to be able to participate as a Speaker giving a talk called:…
Last year I was lucky enough to be able to participate as a Speaker giving a talk called:…
New Zero-Day Exploit for Bug in Windows 10 Task Scheduler
http://bit.ly/30CuqwH
Submitted May 23, 2019 at 10:43AM by 0x2dend
via reddit http://bit.ly/2HJZXUW
http://bit.ly/30CuqwH
Submitted May 23, 2019 at 10:43AM by 0x2dend
via reddit http://bit.ly/2HJZXUW
BleepingComputer
New Zero-Day Exploit for Bug in Windows 10 Task Scheduler
Exploit developer SandboxEscaper has quietly dropped a new zero-day exploit for the Windows operating system just a week after Microsoft's monthly cycle of security updates.
Fun With Custom URI Schemes, featuring another Origin RCE
http://bit.ly/2YGOwEn
Submitted May 23, 2019 at 10:41AM by bigsn00p
via reddit http://bit.ly/2VXBcia
http://bit.ly/2YGOwEn
Submitted May 23, 2019 at 10:41AM by bigsn00p
via reddit http://bit.ly/2VXBcia
zeropwn.github.io
Fun With Custom URI Schemes
Take a look into how custom URI schemes can be used to leverage underlying vulnerabilities in applications.
Insights as incident responders on Business Email Compromises
http://bit.ly/2Mjb64P
Submitted May 23, 2019 at 02:19PM by Bobbygehim
via reddit http://bit.ly/2YKbYRg
http://bit.ly/2Mjb64P
Submitted May 23, 2019 at 02:19PM by Bobbygehim
via reddit http://bit.ly/2YKbYRg
Linkedin
Responding to a Business Email Compromise - Part 3
This three-part blog series is about Business Email Compromises (BEC) targeting Office 365 environments and our insights as incident responders. The first post can be found here and contains an introduction to BEC attacks and the challenges that often arise…
Why Reverse Tabnabbing Matters (an Example on Reddit)
http://bit.ly/2X9zEhe
Submitted May 23, 2019 at 01:32PM by RedTeamPentesting
via reddit http://bit.ly/2EsZ1nf
http://bit.ly/2X9zEhe
Submitted May 23, 2019 at 01:32PM by RedTeamPentesting
via reddit http://bit.ly/2EsZ1nf
reddit
r/netsec - Why Reverse Tabnabbing Matters (an Example on Reddit)
0 votes and 1 comment so far on Reddit
Abusing jQuery for CSS powered timing attacks | Blog
http://bit.ly/2HQsSXE
Submitted May 23, 2019 at 05:58PM by minecrater1
via reddit http://bit.ly/2wgU64g
http://bit.ly/2HQsSXE
Submitted May 23, 2019 at 05:58PM by minecrater1
via reddit http://bit.ly/2wgU64g
portswigger.net
Abusing jQuery for CSS powered timing attacks | Blog
Arthur Saftnes did some quite awesome research last year on timing attacks with jQuery CSS selectors, in fact it was probably my favourite blog post from last year. It's a common design pattern for we
BadWPAD wpad.software case and DNS threat hunting
http://bit.ly/2YQ15NP
Submitted May 23, 2019 at 11:08PM by adamziaja_com
via reddit http://bit.ly/30Fibj1
http://bit.ly/2YQ15NP
Submitted May 23, 2019 at 11:08PM by adamziaja_com
via reddit http://bit.ly/30Fibj1
blog.redteam.pl
BadWPAD wpad.software case and DNS threat hunting
red team, blue team, penetration testing, red teaming, threat hunting, digital forensics, incident response, cyber security, IT security
Is there a technical term for these "light codes"? I looked around on Wikipedia and could find any mention, seems like an interesting stego technique
http://bit.ly/2HyBqTU
Submitted May 23, 2019 at 11:08PM by MaroonOriole77
via reddit http://bit.ly/2VKvY40
http://bit.ly/2HyBqTU
Submitted May 23, 2019 at 11:08PM by MaroonOriole77
via reddit http://bit.ly/2VKvY40
reddit
r/UnresolvedMysteries - Light code found hidden within Zodiac Killers My name is letter that came with a bomb diagram.
3,658 votes and 296 comments so far on Reddit
Counting Outdated Honeypots: Legal and Useful
http://bit.ly/2WYP8F2
Submitted May 24, 2019 at 08:01AM by amv42
via reddit http://bit.ly/2Eq37fx
http://bit.ly/2WYP8F2
Submitted May 24, 2019 at 08:01AM by amv42
via reddit http://bit.ly/2Eq37fx
reddit
r/honeypot - Counting Outdated Honeypots: Legal and Useful
5 votes and 2 comments so far on Reddit
Having some fun with HTTP 301 cache poisoning
http://bit.ly/2JEwSOa
Submitted May 24, 2019 at 06:24PM by piotrd_
via reddit http://bit.ly/2EvIy1t
http://bit.ly/2JEwSOa
Submitted May 24, 2019 at 06:24PM by piotrd_
via reddit http://bit.ly/2EvIy1t
blog.duszynski.eu
Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
This blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources.
Combined with the “Client Domain Hooking” attack, this…
Combined with the “Client Domain Hooking” attack, this…
A brief analysis on CVE-2019-11815
http://bit.ly/2HAHKtZ
Submitted May 24, 2019 at 10:23PM by staz0t
via reddit http://bit.ly/2YPepC1
http://bit.ly/2HAHKtZ
Submitted May 24, 2019 at 10:23PM by staz0t
via reddit http://bit.ly/2YPepC1
reddit
r/netsec - A brief analysis on CVE-2019-11815
0 votes and 1 comment so far on Reddit
Cryptography Dispatches - a new newsletter by Filippo Valsorda @FiloSottile
http://bit.ly/2VNYB0j
Submitted May 24, 2019 at 11:50PM by gbrayut
via reddit http://bit.ly/30EwJzn
http://bit.ly/2VNYB0j
Submitted May 24, 2019 at 11:50PM by gbrayut
via reddit http://bit.ly/30EwJzn
buttondown.email
Cryptography Dispatches
Cryptography Dispatches is [Filippo Valsorda](https://blog.filippo.io/hi)'s newsletter. It tries to bring longer form discussion of the cryptography engineering topics touched on [@FiloSottile](https://twitter.com/FiloSottile), but broader breath than those…
MacOS X GateKeeper Bypass
http://bit.ly/2JAOvON
Submitted May 25, 2019 at 12:28AM by filippo_cavallarin
via reddit http://bit.ly/2X3Siap
http://bit.ly/2JAOvON
Submitted May 25, 2019 at 12:28AM by filippo_cavallarin
via reddit http://bit.ly/2X3Siap
How I hacked into a college’s website again!
http://bit.ly/2W0oKOy
Submitted May 25, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2YGtm9s
http://bit.ly/2W0oKOy
Submitted May 25, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2YGtm9s
Medium
How I hacked into a college’s website again!
This is a follow up article to the previous piece that I wrote - How I hacked into a college’s website to obtain the student’s database.
LeakLooker v2 — Find more open servers and source code leaks
http://bit.ly/2QqBg3N
Submitted May 25, 2019 at 04:26PM by Mysterii8
via reddit http://bit.ly/2K5uEGL
http://bit.ly/2QqBg3N
Submitted May 25, 2019 at 04:26PM by Mysterii8
via reddit http://bit.ly/2K5uEGL
Medium
LeakLooker v2 — Find more open servers and source code leaks
TL;DR LeakLooker has more to offer, now you can hunt for Gitlab, Jenkins, SonarQube, Samba and Rsync. In addition, it supports custom…
HackTheBox: Chaos write-up by Khaotic
http://bit.ly/2X4bAwx
Submitted May 25, 2019 at 08:29PM by Khaoticdude
via reddit http://bit.ly/2QqfJrP
http://bit.ly/2X4bAwx
Submitted May 25, 2019 at 08:29PM by Khaoticdude
via reddit http://bit.ly/2QqfJrP
Khaotic Developments
Hack The Box: Chaos
Jump Ahead: Enum – Initial Creds – Rev. Shell – User – Root – Resources – Special Thanks TL;DR; Overall, I really enjoyed this box! Other than initial enumeratio…
Hack The Box - Chaos Write-up by 0xRick
http://bit.ly/2EyCsgH
Submitted May 25, 2019 at 08:28PM by Ahm3d_H3sham
via reddit http://bit.ly/2wjDZTg
http://bit.ly/2EyCsgH
Submitted May 25, 2019 at 08:28PM by Ahm3d_H3sham
via reddit http://bit.ly/2wjDZTg
0xRick Owned Root !
Hack The Box - Chaos
Quick Summary Hey guys today Chaos retired and here’s my write-up about it. Chaos was a CTF-style machine, I can’t say that it simulated a real life situation. I had fun solving this box, some steps were straightforward others were very tricky. About main…
Canva users advised to change your password
http://bit.ly/2M61OJ4
Submitted May 26, 2019 at 10:14AM by WebHostingSaver
via reddit http://bit.ly/2WnJy1P
http://bit.ly/2M61OJ4
Submitted May 26, 2019 at 10:14AM by WebHostingSaver
via reddit http://bit.ly/2WnJy1P
www.cyber.gov.au
Canva users advised to change your password | Cyber.gov.au
The Australian Cyber Security Centre (ACSC) is aware of a security incident affecting the Australian online design platform, Canva.
Unpacking ASIC firmware: AntMiner Exploited
http://bit.ly/2YNPMpi
Submitted May 26, 2019 at 04:55PM by serhack
via reddit http://bit.ly/30TZPuW
http://bit.ly/2YNPMpi
Submitted May 26, 2019 at 04:55PM by serhack
via reddit http://bit.ly/30TZPuW
serhack.me
Unpacking ASIC firmware: AntMiner Exploited - SerHack Security Engineer
Unpacking and reverse engineering of Bitmain AntMiner Z11 firmware.
PoC: Encrypting Shellcode Into Invisible Unicode Characters
http://bit.ly/2EC3eFc
Submitted May 26, 2019 at 09:04PM by sectronex
via reddit http://bit.ly/2HAvTfw
http://bit.ly/2EC3eFc
Submitted May 26, 2019 at 09:04PM by sectronex
via reddit http://bit.ly/2HAvTfw
www.vallejo.cc
PoC: Encrypting Shellcode Into Invisible Unicode Characters
Malware has been using unicode since time ago, to hide / obfuscate urls, filenames, noscripts, etc... Right-to-left Override character (e2 80 ...