Counting Outdated Honeypots: Legal and Useful
http://bit.ly/2WYP8F2
Submitted May 24, 2019 at 08:01AM by amv42
via reddit http://bit.ly/2Eq37fx
http://bit.ly/2WYP8F2
Submitted May 24, 2019 at 08:01AM by amv42
via reddit http://bit.ly/2Eq37fx
reddit
r/honeypot - Counting Outdated Honeypots: Legal and Useful
5 votes and 2 comments so far on Reddit
Having some fun with HTTP 301 cache poisoning
http://bit.ly/2JEwSOa
Submitted May 24, 2019 at 06:24PM by piotrd_
via reddit http://bit.ly/2EvIy1t
http://bit.ly/2JEwSOa
Submitted May 24, 2019 at 06:24PM by piotrd_
via reddit http://bit.ly/2EvIy1t
blog.duszynski.eu
Permanent URL Hijack Through 301 HTTP Redirect Cache Poisoning
This blog post describes an interesting technique of abusing the standard HTTP 301 responses (“Permanent redirect”) to poison browser cache and achieve endpoint persistence for chosen non-TLS resources.
Combined with the “Client Domain Hooking” attack, this…
Combined with the “Client Domain Hooking” attack, this…
A brief analysis on CVE-2019-11815
http://bit.ly/2HAHKtZ
Submitted May 24, 2019 at 10:23PM by staz0t
via reddit http://bit.ly/2YPepC1
http://bit.ly/2HAHKtZ
Submitted May 24, 2019 at 10:23PM by staz0t
via reddit http://bit.ly/2YPepC1
reddit
r/netsec - A brief analysis on CVE-2019-11815
0 votes and 1 comment so far on Reddit
Cryptography Dispatches - a new newsletter by Filippo Valsorda @FiloSottile
http://bit.ly/2VNYB0j
Submitted May 24, 2019 at 11:50PM by gbrayut
via reddit http://bit.ly/30EwJzn
http://bit.ly/2VNYB0j
Submitted May 24, 2019 at 11:50PM by gbrayut
via reddit http://bit.ly/30EwJzn
buttondown.email
Cryptography Dispatches
Cryptography Dispatches is [Filippo Valsorda](https://blog.filippo.io/hi)'s newsletter. It tries to bring longer form discussion of the cryptography engineering topics touched on [@FiloSottile](https://twitter.com/FiloSottile), but broader breath than those…
MacOS X GateKeeper Bypass
http://bit.ly/2JAOvON
Submitted May 25, 2019 at 12:28AM by filippo_cavallarin
via reddit http://bit.ly/2X3Siap
http://bit.ly/2JAOvON
Submitted May 25, 2019 at 12:28AM by filippo_cavallarin
via reddit http://bit.ly/2X3Siap
How I hacked into a college’s website again!
http://bit.ly/2W0oKOy
Submitted May 25, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2YGtm9s
http://bit.ly/2W0oKOy
Submitted May 25, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2YGtm9s
Medium
How I hacked into a college’s website again!
This is a follow up article to the previous piece that I wrote - How I hacked into a college’s website to obtain the student’s database.
LeakLooker v2 — Find more open servers and source code leaks
http://bit.ly/2QqBg3N
Submitted May 25, 2019 at 04:26PM by Mysterii8
via reddit http://bit.ly/2K5uEGL
http://bit.ly/2QqBg3N
Submitted May 25, 2019 at 04:26PM by Mysterii8
via reddit http://bit.ly/2K5uEGL
Medium
LeakLooker v2 — Find more open servers and source code leaks
TL;DR LeakLooker has more to offer, now you can hunt for Gitlab, Jenkins, SonarQube, Samba and Rsync. In addition, it supports custom…
HackTheBox: Chaos write-up by Khaotic
http://bit.ly/2X4bAwx
Submitted May 25, 2019 at 08:29PM by Khaoticdude
via reddit http://bit.ly/2QqfJrP
http://bit.ly/2X4bAwx
Submitted May 25, 2019 at 08:29PM by Khaoticdude
via reddit http://bit.ly/2QqfJrP
Khaotic Developments
Hack The Box: Chaos
Jump Ahead: Enum – Initial Creds – Rev. Shell – User – Root – Resources – Special Thanks TL;DR; Overall, I really enjoyed this box! Other than initial enumeratio…
Hack The Box - Chaos Write-up by 0xRick
http://bit.ly/2EyCsgH
Submitted May 25, 2019 at 08:28PM by Ahm3d_H3sham
via reddit http://bit.ly/2wjDZTg
http://bit.ly/2EyCsgH
Submitted May 25, 2019 at 08:28PM by Ahm3d_H3sham
via reddit http://bit.ly/2wjDZTg
0xRick Owned Root !
Hack The Box - Chaos
Quick Summary Hey guys today Chaos retired and here’s my write-up about it. Chaos was a CTF-style machine, I can’t say that it simulated a real life situation. I had fun solving this box, some steps were straightforward others were very tricky. About main…
Canva users advised to change your password
http://bit.ly/2M61OJ4
Submitted May 26, 2019 at 10:14AM by WebHostingSaver
via reddit http://bit.ly/2WnJy1P
http://bit.ly/2M61OJ4
Submitted May 26, 2019 at 10:14AM by WebHostingSaver
via reddit http://bit.ly/2WnJy1P
www.cyber.gov.au
Canva users advised to change your password | Cyber.gov.au
The Australian Cyber Security Centre (ACSC) is aware of a security incident affecting the Australian online design platform, Canva.
Unpacking ASIC firmware: AntMiner Exploited
http://bit.ly/2YNPMpi
Submitted May 26, 2019 at 04:55PM by serhack
via reddit http://bit.ly/30TZPuW
http://bit.ly/2YNPMpi
Submitted May 26, 2019 at 04:55PM by serhack
via reddit http://bit.ly/30TZPuW
serhack.me
Unpacking ASIC firmware: AntMiner Exploited - SerHack Security Engineer
Unpacking and reverse engineering of Bitmain AntMiner Z11 firmware.
PoC: Encrypting Shellcode Into Invisible Unicode Characters
http://bit.ly/2EC3eFc
Submitted May 26, 2019 at 09:04PM by sectronex
via reddit http://bit.ly/2HAvTfw
http://bit.ly/2EC3eFc
Submitted May 26, 2019 at 09:04PM by sectronex
via reddit http://bit.ly/2HAvTfw
www.vallejo.cc
PoC: Encrypting Shellcode Into Invisible Unicode Characters
Malware has been using unicode since time ago, to hide / obfuscate urls, filenames, noscripts, etc... Right-to-left Override character (e2 80 ...
RCE Without Native Code: Exploitation of a Write-What-Where in Internet Explorer
http://bit.ly/2Em1qzK
Submitted May 27, 2019 at 12:13AM by joshuajpearce
via reddit http://bit.ly/2Xbl5tK
http://bit.ly/2Em1qzK
Submitted May 27, 2019 at 12:13AM by joshuajpearce
via reddit http://bit.ly/2Xbl5tK
Zero Day Initiative
RCE Without Native Code: Exploitation of a Write-What-Where in Internet Explorer
On the last day of 2018, I discovered a type confusion vulnerability in Internet Explorer that yields a clean write-what-where primitive. It patched this April as CVE-2019-0752 . As an exercise, I wrote a full exploit for this vulnerability using an original…
Work Diary - SystemBack & Third Party Security Tools
http://bit.ly/2woMPzb
Submitted May 27, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2JI6fYu
http://bit.ly/2woMPzb
Submitted May 27, 2019 at 10:56AM by Eta-Meson
via reddit http://bit.ly/2JI6fYu
Medium
Work Diary - SystemBack & Third Party Security Tools
I have recently joined a startup and have been a part of their InfoSec team. Recently this thought popped up in my mind that I should…
Endpoint Isolation with the Windows Firewall
http://bit.ly/2Hf6IiE
Submitted May 27, 2019 at 11:57AM by disclosure5
via reddit http://bit.ly/2WtDm8v
http://bit.ly/2Hf6IiE
Submitted May 27, 2019 at 11:57AM by disclosure5
via reddit http://bit.ly/2WtDm8v
Medium
Endpoint Isolation with the Windows Firewall
Over the last few weeks, I’ve had conversations with several individuals around mitigating lateral movement in a Windows environment. In…
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
http://bit.ly/2W2GXuV
Submitted May 27, 2019 at 01:24PM by _bend3r
via reddit http://bit.ly/2wpCCm4
http://bit.ly/2W2GXuV
Submitted May 27, 2019 at 01:24PM by _bend3r
via reddit http://bit.ly/2wpCCm4
Medium
Building a real-world web honeypot for CVE-2019–6340 (RCE in Drupal core)
A while ago I started a project for managing real-word web honeypots. I initially built it to manage some WordPress honeypots but after…
Tickey: extracting kerberos tickets from kernel keyring (post-explotation tool)
http://bit.ly/2WpsFnr
Submitted May 27, 2019 at 06:20PM by gid0rah
via reddit http://bit.ly/2McyfFW
http://bit.ly/2WpsFnr
Submitted May 27, 2019 at 06:20PM by gid0rah
via reddit http://bit.ly/2McyfFW
GitHub
TarlogicSecurity/tickey
Tool to extract Kerberos tickets from Linux kernel keys. - TarlogicSecurity/tickey
Update your Fortigates if you use SSLVPN. Major and minor vulnerabilities found
http://bit.ly/2wpKRyJ
Submitted May 27, 2019 at 09:17PM by Ungolive
via reddit http://bit.ly/2VOMQXH
http://bit.ly/2wpKRyJ
Submitted May 27, 2019 at 09:17PM by Ungolive
via reddit http://bit.ly/2VOMQXH
reddit
r/fortinet - Update your Fortigates if you use SSLVPN. Major and minor vulnerabilities found
0 votes and 1 comment so far on Reddit
Introduction to analysing full disk encryption solutions
http://bit.ly/2VYco4M
Submitted May 27, 2019 at 09:06PM by DiabloHorn
via reddit http://bit.ly/2WumFK5
http://bit.ly/2VYco4M
Submitted May 27, 2019 at 09:06PM by DiabloHorn
via reddit http://bit.ly/2WumFK5
DiabloHorn
Introduction to analysing full disk encryption solutions
I’ve written a couple of times on the subject of boot loaders and full disk encryption, but I haven’t really explored it in more detail. With this blog post I hope to dive a bit deeper …
h8mail v2: Password Breach Hunting locally or using premium services. Supports chasing down related email
http://bit.ly/2AE2yNq
Submitted May 28, 2019 at 05:31AM by khast3x
via reddit http://bit.ly/2JHMqAQ
http://bit.ly/2AE2yNq
Submitted May 28, 2019 at 05:31AM by khast3x
via reddit http://bit.ly/2JHMqAQ
GitHub
khast3x/h8mail
Password Breach Hunting and Email OSINT locally or using premium services. Supports chasing down related email - khast3x/h8mail
Frida 12.6 is out with major stability improvements on all platforms
http://bit.ly/2HFe3rW
Submitted May 28, 2019 at 06:19AM by oleavr
via reddit http://bit.ly/2YOEhhi
http://bit.ly/2HFe3rW
Submitted May 28, 2019 at 06:19AM by oleavr
via reddit http://bit.ly/2YOEhhi
Frida • A world-class dynamic instrumentation framework
Frida 12.6 Released
Inject JavaScript to explore native apps on Windows, macOS, GNU/Linux, iOS, Android, and QNX