Building Facebook's service encryption infrastructure
http://bit.ly/2I3m7la
Submitted May 29, 2019 at 08:00PM by npoole
via reddit http://bit.ly/2MgxwUh
http://bit.ly/2I3m7la
Submitted May 29, 2019 at 08:00PM by npoole
via reddit http://bit.ly/2MgxwUh
Facebook Code
Building Facebook's service encryption infrastructure - Facebook Code
How we built our service encryption infrastructure to optimize for operability and performance, while satisfying the right security model for each service.
Is this plausible? "SIM Port Hack"
http://bit.ly/2EokWM9
Submitted May 29, 2019 at 11:05PM by BusyWheel
via reddit http://bit.ly/2Qz6cPf
http://bit.ly/2EokWM9
Submitted May 29, 2019 at 11:05PM by BusyWheel
via reddit http://bit.ly/2Qz6cPf
Medium
The Most Expensive Lesson Of My Life: Details of SIM port hack
I lost north of $100,000 last Wednesday. It evaporated over a 24 hour timespan in a “SIM port attack” that drained my Coinbase account.
Interesting read on hash weakness (Not sure if this was shared before)
http://bit.ly/2MhNOfA
Submitted May 30, 2019 at 06:36AM by nyxx88
via reddit http://bit.ly/2Wv1tn7
http://bit.ly/2MhNOfA
Submitted May 30, 2019 at 06:36AM by nyxx88
via reddit http://bit.ly/2Wv1tn7
Medium
The moment when you realize every server in the world is vulnerable
The story of a major hash table vulnerability, and how it took a decade to uncover and resolve.
A Debugging Primer with CVE-2019-0708
http://bit.ly/2YWAuyE
Submitted May 30, 2019 at 05:24AM by pwnplusplus
via reddit http://bit.ly/2Mgzfsq
http://bit.ly/2YWAuyE
Submitted May 30, 2019 at 05:24AM by pwnplusplus
via reddit http://bit.ly/2Mgzfsq
Medium
A Debugging Primer with CVE-2019–0708
The purpose of this post is to share how one would use a debugger to identify the relevant code path that can trigger the crash. I hope…
I finally wrote up my notes on hacking iOS Xamarin apps with Frida!
http://bit.ly/2HLAyeL
Submitted May 30, 2019 at 03:58PM by fridgehead
via reddit http://bit.ly/2Z0aO4i
http://bit.ly/2HLAyeL
Submitted May 30, 2019 at 03:58PM by fridgehead
via reddit http://bit.ly/2Z0aO4i
reddit
r/netsec - I finally wrote up my notes on hacking iOS Xamarin apps with Frida!
0 votes and 3 comments so far on Reddit
My HackTheBox CTF Methodology - From fresh box to root! - 0x00sec
http://bit.ly/2JKdQ8U
Submitted May 30, 2019 at 06:16PM by Evil1337
via reddit http://bit.ly/2WAvkKY
http://bit.ly/2JKdQ8U
Submitted May 30, 2019 at 06:16PM by Evil1337
via reddit http://bit.ly/2WAvkKY
0x00sec - The Home of the Hacker
My HackTheBox CTF Methodology - From fresh box to root!
Hey 0x00ers! I’m so sorry that it’s been such a long time since I’ve dropped an article here! I’ve been writing for my current company navisec.io @ delta.navisec.io and I’ve not had the chance to drop a good article for 0x00sec for a little while. Today…
Windows-Based Exploitation —VulnServer TRUN Command Buffer Overflow
http://bit.ly/2QwTUHi
Submitted May 30, 2019 at 06:45PM by Eta-Meson
via reddit http://bit.ly/2Milv0u
http://bit.ly/2QwTUHi
Submitted May 30, 2019 at 06:45PM by Eta-Meson
via reddit http://bit.ly/2Milv0u
Medium
Windows-Based Exploitation —VulnServer TRUN Command Buffer Overflow
Reversing using IDA Pro and inject shellcode with Python
BlueKeep Exploit POC (minus payload)
http://bit.ly/2MipIRC
Submitted May 30, 2019 at 07:29PM by got_nations
via reddit http://bit.ly/2HK05F3
http://bit.ly/2MipIRC
Submitted May 30, 2019 at 07:29PM by got_nations
via reddit http://bit.ly/2HK05F3
GitHub
Ekultek/BlueKeep
Proof of concept for CVE-2019-0708. Contribute to Ekultek/BlueKeep development by creating an account on GitHub.
When all else fails - find a 0-day [InfluxDB authentication bypass]
http://bit.ly/2HOwcUp
Submitted May 30, 2019 at 07:13PM by zoh4rs
via reddit http://bit.ly/2Mk3GOv
http://bit.ly/2HOwcUp
Submitted May 30, 2019 at 07:13PM by zoh4rs
via reddit http://bit.ly/2Mk3GOv
Komodosec | Cyber Security Consulting infrastructure and Application
When all else fails - find a 0-day
How a failing red-team engagement led us to find a silly zero day. And why “insecure by default” is still an issue in 2019.
Coding a WebAssembly CTF Challenge
http://bit.ly/2JSrmaX
Submitted May 30, 2019 at 08:36PM by chicksdigthelongrun
via reddit http://bit.ly/2QBornf
http://bit.ly/2JSrmaX
Submitted May 30, 2019 at 08:36PM by chicksdigthelongrun
via reddit http://bit.ly/2QBornf
Medium
Coding a WebAssembly CTF Challenge
I recently wrote a CTF challenge for my coworkers. The challenge was written using WebAssembly (WASM), a language I initially knew nothing about. I found the language specification and various API…
Breaking Out of Rkt containers - 3 New Unpatched CVEs
http://bit.ly/2Qyb8nH
Submitted May 30, 2019 at 09:25PM by YuvalAvra
via reddit http://bit.ly/2WFryAl
http://bit.ly/2Qyb8nH
Submitted May 30, 2019 at 09:25PM by YuvalAvra
via reddit http://bit.ly/2WFryAl
Twistlock
Breaking Out of rkt - 3 New Unpatched CVEs | Twistlock
CoreOs rkt contains 3 new unpatched CVEs,
Docker Bug Allows Root Access to Host File System
https://duo.sc/2KaqXjb
Submitted May 30, 2019 at 11:33PM by Lunarghini
via reddit http://bit.ly/2Kb3ePQ
https://duo.sc/2KaqXjb
Submitted May 30, 2019 at 11:33PM by Lunarghini
via reddit http://bit.ly/2Kb3ePQ
Decipher
Docker Bug Allows Root Access to Host File System
A vulnerability in all versions of the Docker platform can give an attacker full read and write access to the host file system.
Recorded Future threat intelligence firm acquired by Insight Partners for $780M
http://bit.ly/2ECTsmb
Submitted May 30, 2019 at 11:14PM by mintpomegranate
via reddit http://bit.ly/2HLvWoZ
http://bit.ly/2ECTsmb
Submitted May 30, 2019 at 11:14PM by mintpomegranate
via reddit http://bit.ly/2HLvWoZ
Xconomy
Recorded Future Bought for $780M in Latest Boston Cybersecurity Deal
Recorded Future is being acquired by tech investor Insight Partners in a $780 million all-cash deal, the cyber-threat intelligence company announced this
Implementing a New CPU Architecture for Ghidra
http://bit.ly/2YUhAZ9
Submitted May 30, 2019 at 11:54PM by guedou
via reddit http://bit.ly/30YjlWS
http://bit.ly/2YUhAZ9
Submitted May 30, 2019 at 11:54PM by guedou
via reddit http://bit.ly/30YjlWS
Google Docs
flashre - BeeRump
Implementing a New CPU Architecture for Ghidra @guedou BeeRump Before the talk zoom the presenter notes CTRL + ALT + / || CTRL + F4
The time I was hacked by Mr. Sh
http://bit.ly/2EH3cfi
Submitted May 31, 2019 at 03:37AM by SlightlyCyborg
via reddit http://bit.ly/30XaEwc
http://bit.ly/2EH3cfi
Submitted May 31, 2019 at 03:37AM by SlightlyCyborg
via reddit http://bit.ly/30XaEwc
Medium
The time I was hacked by Mr. Sh
In 2017, I zero-to-one’d a YouTube search site that helps users navigate channels with really long videos using an index on caption data.
A new super light protocol resistant to Eclipse Attacks
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
http://bit.ly/2WvagW8
Submitted May 31, 2019 at 08:08AM by yahsintw
via reddit http://bit.ly/2WfE61z
diode.io
Blockquick Super Light Blockchain Client For Trustless Time
- Click here if you just want to read the Paper -In the last two posts of this series, we first introduced the governance issues in PKI and then the circular dependency between establishing trust in PKI certificates and establishing the current time on a…
My thoughts after my first (real) attempt at Hackthebox - Beginner Guides - 0x00sec
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
http://bit.ly/2Mlz6nH
Submitted May 31, 2019 at 01:33PM by Evil1337
via reddit http://bit.ly/2HMwGdp
0x00sec - The Home of the Hacker
My thoughts after my first (real) attempt at Hackthebox
After my previous post I’ve been thinking about the next step, should I start a series where I implement all OWASP TOP10 vulnerabilities and then break them? It could’ve happened, but I decided to try myself at hackthebox. I had an account for almost…
I made this tool to look for all the build logs of CI tools such as Travis-CI which can then be used to find sensitive information
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
http://bit.ly/2KgHKkK
Submitted May 31, 2019 at 03:55PM by darshkpatel
via reddit http://bit.ly/2YWQu3x
GitHub
darshkpatel/BuildScour
Python tool which scours popular CI tools build logs - darshkpatel/BuildScour
Bypass default AppLocker rules - A post about a small discovery in AppLocker
http://bit.ly/2wEIHLT
Submitted May 31, 2019 at 05:50PM by oddvarmoe
via reddit http://bit.ly/30X1oZ0
http://bit.ly/2wEIHLT
Submitted May 31, 2019 at 05:50PM by oddvarmoe
via reddit http://bit.ly/30X1oZ0
Oddvar Moe's Blog
A small discovery about AppLocker
While I was prepping for a session a while back I made a a little special discovery about AppLocker. Turns out that the files that AppLocker uses under C:\Windows\System32\AppLocker can be used in …
Infosec career path
http://bit.ly/2Z00M36
Submitted May 31, 2019 at 09:08PM by trajanhorses
via reddit http://bit.ly/2MvEHbk
http://bit.ly/2Z00M36
Submitted May 31, 2019 at 09:08PM by trajanhorses
via reddit http://bit.ly/2MvEHbk
reddit
r/netsec - Infosec career path
0 votes and 1 comment so far on Reddit
Public DNS in Taiwan the latest victim to BGP hijack
http://bit.ly/2Wcog7Y
Submitted May 31, 2019 at 11:30PM by danyork
via reddit http://bit.ly/2I9Dota
http://bit.ly/2Wcog7Y
Submitted May 31, 2019 at 11:30PM by danyork
via reddit http://bit.ly/2I9Dota
MANRS
Public DNS in Taiwan the latest victim to BGP hijack
Yet another incident of Border Gateway Protocol (BGP) hijack, with the latest victim this time in Taiwan. Earlier this month (May 8), traffic going through a public DNS run by Taiwan Network Inform…