Real World CVE-2022-24834 Exploitation on an Alpine mallocng Heap
https://research.nccgroup.com/2024/06/11/pumping-iron-on-the-musl-heap-real-world-cve-2022-24834-exploitation-on-an-alpine-mallocng-heap/
https://research.nccgroup.com/2024/06/11/pumping-iron-on-the-musl-heap-real-world-cve-2022-24834-exploitation-on-an-alpine-mallocng-heap/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Fuzzing embedded systems - Part 1, Introduction
As a result I developed a fuzzer to search for vulnerabilities in CGI binaries and a Binary Ninja plugin to search for ROP chains in MIPS binaries, as well as an exploit for one of the crashes triaged.
https://blog.sparrrgh.me/fuzzing/embedded/2024/06/05/fuzzing-embedded-systems-1.html
As a result I developed a fuzzer to search for vulnerabilities in CGI binaries and a Binary Ninja plugin to search for ROP chains in MIPS binaries, as well as an exploit for one of the crashes triaged.
https://blog.sparrrgh.me/fuzzing/embedded/2024/06/05/fuzzing-embedded-systems-1.html
Я стал замечать, что использую chatgpt все больше и больше в повседневной работе. А вы используете chatgpt в работе?
Final Results
57%
Да
34%
Нет
9%
Нет, но хочу
Adventures of Ox64 BL808 RISC-V SBC with Apache NuttX RTOS (видео)
Guide to Hardware Debug Ports (классный гайд)
Attacking Samsung Galaxy A* Boot Chain (слайды). Видео
ROPing Routers from scratch: Step-by-step Tenda Ac8v4 Mips 0day Flow-control ROP -> RCE (мощный чувак и блог)
new persistence method macOS
Guide to Hardware Debug Ports (классный гайд)
Attacking Samsung Galaxy A* Boot Chain (слайды). Видео
ROPing Routers from scratch: Step-by-step Tenda Ac8v4 Mips 0day Flow-control ROP -> RCE (мощный чувак и блог)
new persistence method macOS
This media is not supported in your browser
VIEW IN TELEGRAM
Когда напиздил статей с твитера и несешь в телегу
Order of Six Angles
Fuzzing embedded systems - Part 1, Introduction As a result I developed a fuzzer to search for vulnerabilities in CGI binaries and a Binary Ninja plugin to search for ROP chains in MIPS binaries, as well as an exploit for one of the crashes triaged. htt…
охуенная статья, жаль что сам фаззинг будет только в следующих частях, но затравка интересная. Спросил у автора когда будет вторая часть, его ответ:
I think the second part will come out in around a month. I have to fix the code of the fuzzer to make it a little more pretty and write the article :D
I think the second part will come out in around a month. I have to fix the code of the fuzzer to make it a little more pretty and write the article :D
Я изучаю фазинг и как раз вышло видео с воркшопом
https://www.youtube.com/live/gTISW-5Uy6I?si=sKLw02ws2mco7rza
чтобы паралельно проходить этот воркшоп есть соответствующие материалы на гитхабе
https://github.com/20urc3/Talks/tree/main/Off-By-One
https://www.youtube.com/live/gTISW-5Uy6I?si=sKLw02ws2mco7rza
чтобы паралельно проходить этот воркшоп есть соответствующие материалы на гитхабе
https://github.com/20urc3/Talks/tree/main/Off-By-One
YouTube
Introduction to Fuzzing
Join 2ourc3 (source) and myself for a session on fuzzing binaries in modern times!
a write-up of analyzing a memory dump of a ViewState Deserialization attack
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging%20Case%20Studies/Debug%20Case%20Study%3A%20ViewState%20Deserialization%20Exploitation
https://github.com/DebugPrivilege/InsightEngineering/tree/main/Debugging%20Case%20Studies/Debug%20Case%20Study%3A%20ViewState%20Deserialization%20Exploitation
GitHub
InsightEngineering/Debugging Case Studies/Debug Case Study: ViewState Deserialization Exploitation at main · DebugPrivilege/In…
Hardcore Debugging. Contribute to DebugPrivilege/InsightEngineering development by creating an account on GitHub.
Презентация find bugs in the linux kernel
https://github.com/sam4k/talk-slides/blob/main/so_you_wanna_find_bugs_in_the_linux_kernel.pdf
https://github.com/sam4k/talk-slides/blob/main/so_you_wanna_find_bugs_in_the_linux_kernel.pdf
GitHub
talk-slides/so_you_wanna_find_bugs_in_the_linux_kernel.pdf at main · sam4k/talk-slides
Contribute to sam4k/talk-slides development by creating an account on GitHub.
Catching Your Favorite C2 In Memory Using Stack & Thread Telemetry.
https://sabotagesec.com/gotta-catch-em-all-catching-your-favorite-c2-in-memory-using-stack-thread-telemetry/
https://sabotagesec.com/gotta-catch-em-all-catching-your-favorite-c2-in-memory-using-stack-thread-telemetry/
PE-LiteScan (or PELS) is a simple heuristic analyzer for common PE-anomalies, specifically focusing on the detection of packers and protectors. Designed for Windows and Linux.
https://github.com/DosX-dev/PE-LiteScan
https://github.com/DosX-dev/PE-LiteScan
GitHub
GitHub - DosX-dev/PE-LiteScan: A simple crossplatform heuristic PE-analyzer
A simple crossplatform heuristic PE-analyzer. Contribute to DosX-dev/PE-LiteScan development by creating an account on GitHub.
TikTag: Breaking ARM's Memory Tagging Extension with Speculative Execution
https://arxiv.org/abs/2406.08719
https://arxiv.org/abs/2406.08719
arXiv.org
TikTag: Breaking ARM's Memory Tagging Extension with...
ARM Memory Tagging Extension (MTE) is a new hardware feature introduced in ARMv8.5-A architecture, aiming to detect memory corruption vulnerabilities. The low overhead of MTE makes it an...
This vulnerability exploits the nuances of the OAuth protocol and iOS’s handling of Custom URL Schemes and Safari browser sessions to steal OAuth Authentication Codes from vulnerable OAuth implementations, thereby allowing an attacker to gain access to a victim’s account.
https://evanconnelly.github.io/post/ios-oauth/
https://evanconnelly.github.io/post/ios-oauth/
Evan Connelly
Mobile OAuth Attacks - iOS URL Scheme Hijacking Revamped
Summary
We (Julien Ahrens @MrTuxracer and myself @Evan_Connelly) identified nearly 30 popular apps, as well as a feature within iOS itself, vulnerable to an attack in which any installed iOS app from the Apple App Store could perform an account takeover of…
We (Julien Ahrens @MrTuxracer and myself @Evan_Connelly) identified nearly 30 popular apps, as well as a feature within iOS itself, vulnerable to an attack in which any installed iOS app from the Apple App Store could perform an account takeover of…