World Of Security
مفتخریم شما را به بازدید از غرفه آشنا ایمن در ((هشتمین #نمایشگاه صنایع بومی پدافند غیر عامل)) دعوت نماییم. در این نمایشگاه علاوه بر استقبال از کلیه مشتریان و همکاران گرامی، بخش ویژه #استخدام با حضور مدیران فنی و منابع انسانی شرکت در غرفه ایجاد گردیده است…
دوستان در نمایشگاه پدافند. در خدمتتون هستیم. فرصت همکاری به صورت کارآموزی و استخدامی هم وجود داره
🔥4👍2
Forwarded from SecCode (Meisam Monsef)
This media is not supported in your browser
VIEW IN TELEGRAM
😁7
Robots.txt, Hash Cracking and Path Traversal - "Pizza Paradise" [INTIGRITI 1337UP CTF 2024]
https://www.youtube.com/watch?v=qPxKyYrf9p4
https://www.youtube.com/watch?v=qPxKyYrf9p4
YouTube
Robots.txt, Hash Cracking and Path Traversal - "Pizza Paradise" [INTIGRITI 1337UP CTF 2024]
🚩 Video walkthrough for the "Pizza Paradise" (web) challenge featured in our 1337UP LIVE (CTF) competition 2024! Players found themselves browsing a pizza delivery website, but in fact this was a front for a secretive government panel. The "secret" login…
👍1🔥1😁1
Rooting an Android POS "Smart Terminal" to steal credit card information
Paper: https://www.nohat.it/slides/2024/jannone.pdf
Presentation: https://www.youtube.com/watch?v=a9BFGlxP71Y
Paper: https://www.nohat.it/slides/2024/jannone.pdf
Presentation: https://www.youtube.com/watch?v=a9BFGlxP71Y
YouTube
No Hat 2024 - Jacopo Jannone - Exploring and Exploiting an Android “Smart POS” Payment Terminal
EXPLORING AND EXPLOITING AN ANDROID "SMART POS" PAYMENT TERMINAL
Today, credit card terminals are undergoing a drastic evolution, moving from specialized hardware and custom-built operating systems to Android devices similar to ordinary smartphones. While…
Today, credit card terminals are undergoing a drastic evolution, moving from specialized hardware and custom-built operating systems to Android devices similar to ordinary smartphones. While…
👍1
دوستان ایمن ترین پورتال های سازمانی ایران رو ممکنه پیشنهاد بدید برای خرید میخوام
@nashenas_tm
@nashenas_tm
Capital One Launches Public Bug Bounty Program with HackerOne
https://www.hackerone.com/customer-stories/capital-one-public-bug-bounty
https://www.hackerone.com/customer-stories/capital-one-public-bug-bounty
HackerOne
Capital One Launches Public Bug Bounty Program with HackerOne | HackerOne
We're excited to announce one of our latest public program offerings on the HackerOne platform, Capital One!
👍1
Reverse Engineering trojan telegram app
https://dozheiny.net/2024/11/15/Reverse-Engineering-Trojan-Telegram-clone.html
https://dozheiny.net/2024/11/15/Reverse-Engineering-Trojan-Telegram-clone.html
👍5🔥2
Automatically decode Android apps and searche for secrets
https://trufflesecurity.com/blog/cracking-open-apk-files-at-scale
https://trufflesecurity.com/blog/cracking-open-apk-files-at-scale
Trufflesecurity
Cracking Open APK Files at Scale ◆ Truffle Security Co.
TruffleHog now automatically decodes Android Package Kit (APK) files and searches them for secrets. It runs ~9x faster than using an external decompiler before calling TruffleHog.
👍4
Malimite: iOS decompiler designed to analyze and decode IPA files
Built on top of Ghidra to offer direct support for Swift, Objective-C, and iOS resources
https://github.com/LaurieWired/Malimite
Built on top of Ghidra to offer direct support for Swift, Objective-C, and iOS resources
https://github.com/LaurieWired/Malimite
GitHub
GitHub - LaurieWired/Malimite: iOS and macOS Decompiler
iOS and macOS Decompiler. Contribute to LaurieWired/Malimite development by creating an account on GitHub.
👍3
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)
https://labs.watchtowr.com/cleo-cve-2024-50623/
https://labs.watchtowr.com/cleo-cve-2024-50623/
watchTowr Labs
Cleo Harmony, VLTrader, and LexiCom - RCE via Arbitrary File Write (CVE-2024-50623)
We were having a nice uneventful week at watchTowr, when we got news of some ransomware operators using a zero-day exploit in Cleo MFT software - namely, LexiCom, VLTransfer, and Harmony - applications that many large enterprises rely on to share files securely.…
👍4