ByteShield pinned «Reversing for dummies - x86 assembly and C code (Beginner/ADHD friendly) · 0x44.cc https://0x44.cc/reversing/2021/07/21/reversing-x86-and-c-code-for-beginners.html»
This media is not supported in your browser
VIEW IN TELEGRAM
You started this war, but we will draw its end.
Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Finding SSRFs in Azure DevOps - Part 2 #SSRF #AzureDevOps #AzureSecurity #DNSRebinding #SourceCodeDebugging https://binsec.no/posts/2025/05/finding-ssrfs-in-devops-part2
Binary Security AS
Finding SSRFs in Azure DevOps - Part 2
Binary Security was previously rewarded for three Server-Side Request Forgery (SSRF) vulnerabilities in Azure DevOps, which you can read about here. Now we have found another SSRF vulnerability that we also reported to Microsoft. We then bypassed Microsoft’s…
Forwarded from Source Byte
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example by cocomelonc
#APT34 (aka OILRIG) is known to use code injection techniques to interact with macOS and Linux systems, leveraging vulnerabilities and weaknesses in the system’s security mechanisms to inject code into running processes.
#APT10 (aka Red Apollo), another advanced Chinese group, has been known to use techniques like process injection and DLL hijacking to manipulate and monitor systems. This is conceptually similar to DYLD_INSERT_LIBRARIES because it involves injecting malicious code into existing applications.