Вышла статья Injecting Java in-memory payloads for post-exploitation. Я спросил мнение о ней у одного знающего чувака, он сказал "использование remote agents - это старая тема, еще 4 года назад я делал подобное". В любом случае очень интересно
Synacktiv
Injecting Java in-memory payloads for post-exploitation
Uncovering Hardcoded Root Password in VStarcam CB73 Security Camera
https://brownfinesecurity.com/blog/vstarcam-cb73-hardcoded-root-password/
https://brownfinesecurity.com/blog/vstarcam-cb73-hardcoded-root-password/
Brown Fine Security
Uncovering Hardcoded Root Password in VStarcam CB73 Security Camera
Firmware extraction and reverse engineering of VStarcam CB73 root password
Turning Outlook Into a C2 With One Registry Change
https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
https://trustedsec.com/blog/specula-turning-outlook-into-a-c2-with-one-registry-change
TrustedSec
Specula - Turning Outlook Into a C2 With One Registry Change
glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
https://blog.quarkslab.com/heap-exploitation-glibc-internals-and-nifty-tricks.html
Quarkslab
Heap exploitation, glibc internals and nifty tricks. - Quarkslab's blog
This is a writeup of a heap pwn challenge at HitconCTF Qualifiers 2024, which explains some glibc malloc internals and some heap exploitation tricks that can be used for getting a shell!
Chinese cybersecurity firm 360 Security Technology has helped Beijing uncover 54 “overseas, state-level” hacking groups, including operatives from the US Central Intelligence Agency (CIA) and National Security Agency (NSA),
https://www.scmp.com/tech/tech-trends/article/3272819/chinese-cybersecurity-firm-links-us-sanctions-its-role-uncovering-hackers-targeting-china
https://www.scmp.com/tech/tech-trends/article/3272819/chinese-cybersecurity-firm-links-us-sanctions-its-role-uncovering-hackers-targeting-china
South China Morning Post
Qihoo 360 CEO links US sanctions to its role in outing hackers targeting China
Chinese firm 360 Security Technology has helped Beijing uncover 54 hacking groups, including operatives from the CIA and NSA, its founder Zhou Hongyi said.
The tragedy of low-level exploitation
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
gynvael.coldwind.pl
FAQ: The tragedy of low-level exploitation
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability #AndroidHacking #CVE20240044 #DataExfiltration #MobileHacker #Vulnerability https://www.mobile-hacker.com/2024/06/17/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-using-cve-2024-0044-vulnerability/
Mobile Hacker
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability Mobile Hacker
With physical access to Android device with enabled ADB debugging running Android 12 or 13 before receiving March 2024 security patch, it is possible to access internal data of any user installed app by misusing CVE-2024-0044 vulnerability. Internal data…
The GhostWrite vulnerability affects the T-Head XuanTie C910 RISC-V CPU. This vulnerability allows unprivileged attackers, even those with limited access, to read and write any part of the computer’s memory and to control peripheral devices like network cards. GhostWrite renders the CPU’s security features ineffective and cannot be fixed without disabling around half of the CPU’s functionality.
https://ghostwriteattack.com/
https://ghostwriteattack.com/
QiAnXin Cyber Threat Report H1 2024 is released
https://ti.qianxin.com/uploads/2024/08/19/2274f632f6a1d8acd2f1801c24887edb.pdf
https://ti.qianxin.com/uploads/2024/08/19/2274f632f6a1d8acd2f1801c24887edb.pdf