Honeynet Project: Innsbruck Junior CTF
http://bit.ly/30TArp2
Submitted May 29, 2019 at 07:56PM by mhils
via reddit http://bit.ly/2X81hYd
http://bit.ly/30TArp2
Submitted May 29, 2019 at 07:56PM by mhils
via reddit http://bit.ly/2X81hYd
reddit
r/netsec - Honeynet Project: Innsbruck Junior CTF
0 votes and 0 comments so far on Reddit
The Nansh0u Campaign: signed rootkit, exposed infrastructure and PE exploits in a massive MS-SQL & PHPMyAdmin attack campaign
http://bit.ly/2EFN9xY
Submitted May 29, 2019 at 07:55PM by ophirharpaz
via reddit http://bit.ly/2XkTiY5
http://bit.ly/2EFN9xY
Submitted May 29, 2019 at 07:55PM by ophirharpaz
via reddit http://bit.ly/2XkTiY5
Guardicore - Data Center and Cloud Security
The Nansh0u Campaign: Hackers Arsenal Grows Stronger
Read how Guardicore Labs revealed an end-to-end attack campaign infrastructure, designed to scan, brute-force and infect tens of thousands of MS-SQL and PHPMyAdmin servers on the internet.
A Data Wallet for secure 'Data Renting' of valuable and sensitive data sets
http://bit.ly/2VGW78S
Submitted May 29, 2019 at 08:51PM by blrm
via reddit http://bit.ly/2W1sIS0
http://bit.ly/2VGW78S
Submitted May 29, 2019 at 08:51PM by blrm
via reddit http://bit.ly/2W1sIS0
Medium
iExec V3: Data Wallet for Enterprises to Rent Data and AI Models Using Blockchain
Lyon, 15 May 2019: iExec has released its V3, which introduces a new Data Wallet feature that makes secure data renting possible. With…
Building Facebook's service encryption infrastructure
http://bit.ly/2I3m7la
Submitted May 29, 2019 at 08:00PM by npoole
via reddit http://bit.ly/2MgxwUh
http://bit.ly/2I3m7la
Submitted May 29, 2019 at 08:00PM by npoole
via reddit http://bit.ly/2MgxwUh
Facebook Code
Building Facebook's service encryption infrastructure - Facebook Code
How we built our service encryption infrastructure to optimize for operability and performance, while satisfying the right security model for each service.
Is this plausible? "SIM Port Hack"
http://bit.ly/2EokWM9
Submitted May 29, 2019 at 11:05PM by BusyWheel
via reddit http://bit.ly/2Qz6cPf
http://bit.ly/2EokWM9
Submitted May 29, 2019 at 11:05PM by BusyWheel
via reddit http://bit.ly/2Qz6cPf
Medium
The Most Expensive Lesson Of My Life: Details of SIM port hack
I lost north of $100,000 last Wednesday. It evaporated over a 24 hour timespan in a “SIM port attack” that drained my Coinbase account.
Interesting read on hash weakness (Not sure if this was shared before)
http://bit.ly/2MhNOfA
Submitted May 30, 2019 at 06:36AM by nyxx88
via reddit http://bit.ly/2Wv1tn7
http://bit.ly/2MhNOfA
Submitted May 30, 2019 at 06:36AM by nyxx88
via reddit http://bit.ly/2Wv1tn7
Medium
The moment when you realize every server in the world is vulnerable
The story of a major hash table vulnerability, and how it took a decade to uncover and resolve.
A Debugging Primer with CVE-2019-0708
http://bit.ly/2YWAuyE
Submitted May 30, 2019 at 05:24AM by pwnplusplus
via reddit http://bit.ly/2Mgzfsq
http://bit.ly/2YWAuyE
Submitted May 30, 2019 at 05:24AM by pwnplusplus
via reddit http://bit.ly/2Mgzfsq
Medium
A Debugging Primer with CVE-2019–0708
The purpose of this post is to share how one would use a debugger to identify the relevant code path that can trigger the crash. I hope…
I finally wrote up my notes on hacking iOS Xamarin apps with Frida!
http://bit.ly/2HLAyeL
Submitted May 30, 2019 at 03:58PM by fridgehead
via reddit http://bit.ly/2Z0aO4i
http://bit.ly/2HLAyeL
Submitted May 30, 2019 at 03:58PM by fridgehead
via reddit http://bit.ly/2Z0aO4i
reddit
r/netsec - I finally wrote up my notes on hacking iOS Xamarin apps with Frida!
0 votes and 3 comments so far on Reddit
My HackTheBox CTF Methodology - From fresh box to root! - 0x00sec
http://bit.ly/2JKdQ8U
Submitted May 30, 2019 at 06:16PM by Evil1337
via reddit http://bit.ly/2WAvkKY
http://bit.ly/2JKdQ8U
Submitted May 30, 2019 at 06:16PM by Evil1337
via reddit http://bit.ly/2WAvkKY
0x00sec - The Home of the Hacker
My HackTheBox CTF Methodology - From fresh box to root!
Hey 0x00ers! I’m so sorry that it’s been such a long time since I’ve dropped an article here! I’ve been writing for my current company navisec.io @ delta.navisec.io and I’ve not had the chance to drop a good article for 0x00sec for a little while. Today…
Windows-Based Exploitation —VulnServer TRUN Command Buffer Overflow
http://bit.ly/2QwTUHi
Submitted May 30, 2019 at 06:45PM by Eta-Meson
via reddit http://bit.ly/2Milv0u
http://bit.ly/2QwTUHi
Submitted May 30, 2019 at 06:45PM by Eta-Meson
via reddit http://bit.ly/2Milv0u
Medium
Windows-Based Exploitation —VulnServer TRUN Command Buffer Overflow
Reversing using IDA Pro and inject shellcode with Python
BlueKeep Exploit POC (minus payload)
http://bit.ly/2MipIRC
Submitted May 30, 2019 at 07:29PM by got_nations
via reddit http://bit.ly/2HK05F3
http://bit.ly/2MipIRC
Submitted May 30, 2019 at 07:29PM by got_nations
via reddit http://bit.ly/2HK05F3
GitHub
Ekultek/BlueKeep
Proof of concept for CVE-2019-0708. Contribute to Ekultek/BlueKeep development by creating an account on GitHub.
When all else fails - find a 0-day [InfluxDB authentication bypass]
http://bit.ly/2HOwcUp
Submitted May 30, 2019 at 07:13PM by zoh4rs
via reddit http://bit.ly/2Mk3GOv
http://bit.ly/2HOwcUp
Submitted May 30, 2019 at 07:13PM by zoh4rs
via reddit http://bit.ly/2Mk3GOv
Komodosec | Cyber Security Consulting infrastructure and Application
When all else fails - find a 0-day
How a failing red-team engagement led us to find a silly zero day. And why “insecure by default” is still an issue in 2019.
Coding a WebAssembly CTF Challenge
http://bit.ly/2JSrmaX
Submitted May 30, 2019 at 08:36PM by chicksdigthelongrun
via reddit http://bit.ly/2QBornf
http://bit.ly/2JSrmaX
Submitted May 30, 2019 at 08:36PM by chicksdigthelongrun
via reddit http://bit.ly/2QBornf
Medium
Coding a WebAssembly CTF Challenge
I recently wrote a CTF challenge for my coworkers. The challenge was written using WebAssembly (WASM), a language I initially knew nothing about. I found the language specification and various API…
Breaking Out of Rkt containers - 3 New Unpatched CVEs
http://bit.ly/2Qyb8nH
Submitted May 30, 2019 at 09:25PM by YuvalAvra
via reddit http://bit.ly/2WFryAl
http://bit.ly/2Qyb8nH
Submitted May 30, 2019 at 09:25PM by YuvalAvra
via reddit http://bit.ly/2WFryAl
Twistlock
Breaking Out of rkt - 3 New Unpatched CVEs | Twistlock
CoreOs rkt contains 3 new unpatched CVEs,
Docker Bug Allows Root Access to Host File System
https://duo.sc/2KaqXjb
Submitted May 30, 2019 at 11:33PM by Lunarghini
via reddit http://bit.ly/2Kb3ePQ
https://duo.sc/2KaqXjb
Submitted May 30, 2019 at 11:33PM by Lunarghini
via reddit http://bit.ly/2Kb3ePQ
Decipher
Docker Bug Allows Root Access to Host File System
A vulnerability in all versions of the Docker platform can give an attacker full read and write access to the host file system.
Recorded Future threat intelligence firm acquired by Insight Partners for $780M
http://bit.ly/2ECTsmb
Submitted May 30, 2019 at 11:14PM by mintpomegranate
via reddit http://bit.ly/2HLvWoZ
http://bit.ly/2ECTsmb
Submitted May 30, 2019 at 11:14PM by mintpomegranate
via reddit http://bit.ly/2HLvWoZ
Xconomy
Recorded Future Bought for $780M in Latest Boston Cybersecurity Deal
Recorded Future is being acquired by tech investor Insight Partners in a $780 million all-cash deal, the cyber-threat intelligence company announced this
Implementing a New CPU Architecture for Ghidra
http://bit.ly/2YUhAZ9
Submitted May 30, 2019 at 11:54PM by guedou
via reddit http://bit.ly/30YjlWS
http://bit.ly/2YUhAZ9
Submitted May 30, 2019 at 11:54PM by guedou
via reddit http://bit.ly/30YjlWS
Google Docs
flashre - BeeRump
Implementing a New CPU Architecture for Ghidra @guedou BeeRump Before the talk zoom the presenter notes CTRL + ALT + / || CTRL + F4
The time I was hacked by Mr. Sh
http://bit.ly/2EH3cfi
Submitted May 31, 2019 at 03:37AM by SlightlyCyborg
via reddit http://bit.ly/30XaEwc
http://bit.ly/2EH3cfi
Submitted May 31, 2019 at 03:37AM by SlightlyCyborg
via reddit http://bit.ly/30XaEwc
Medium
The time I was hacked by Mr. Sh
In 2017, I zero-to-one’d a YouTube search site that helps users navigate channels with really long videos using an index on caption data.
A new super light protocol resistant to Eclipse Attacks
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
diode.io
Blockquick Super Light Blockchain Client For Trustless Time
- Click here if you just want to read the Paper -In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a…
My thoughts after my first (real) attempt at Hackthebox - Beginner Guides - 0x00sec
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
0x00sec - The Home of the Hacker
My thoughts after my first (real) attempt at Hackthebox
After my previous post I’ve been thinking about the next step, should I start a series where I implement all OWASP TOP10 vulnerabilities and then break them? It could’ve happened, but I decided to try myself at hackthebox. I had an account for almost…
I made this tool to look for all the build logs of CI tools such as Travis-CI which can then be used to find sensitive information
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
GitHub
darshkpatel/BuildScour
Python tool which scours popular CI tools build logs - darshkpatel/BuildScour