Exploits_GitHub.pdf
978 KB
"How security professionals are being attacked: A study of malicious CVE proof of concept exploits in GitHub", 2022.
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚
CVE, which stands for Common Vulnerabilities and Exposures1, is a list of publicly disclosed security flaws in software or systems, which have been assigned individual CVE IDs.
]-> Tool: https://github.com/SoftwareSecurityLab/UbSym
📚
Widevine.pdf
386 KB
#tools
#Offensive_security
"Exploring Widevine for Fun and Profit", 2022.
]-> Widevine Key Ladder Script (Python3):
https://github.com/Avalonswanderer/widevine_key_ladder
]-> A tool to trace Widevine execution in Android and dump buffers: https://github.com/Avalonswanderer/wideXtractor
Nowadays, people prefer media consumption on over-thetop platforms (OTT), such as Netflix and Amazon Prime, that distribute multimedia content over the Internet, allowing users to play them whenever they wish. Such ease of viewing the same videos across devices creates challenges for content producers and owners.
#Offensive_security
"Exploring Widevine for Fun and Profit", 2022.
]-> Widevine Key Ladder Script (Python3):
https://github.com/Avalonswanderer/widevine_key_ladder
]-> A tool to trace Widevine execution in Android and dump buffers: https://github.com/Avalonswanderer/wideXtractor
Nowadays, people prefer media consumption on over-thetop platforms (OTT), such as Netflix and Amazon Prime, that distribute multimedia content over the Internet, allowing users to play them whenever they wish. Such ease of viewing the same videos across devices creates challenges for content producers and owners.
FlowDroid.pdf
1.2 MB
#Mobile_Security
#Sec_code_review
"Demystifying Hidden Sensitive Operations in Android apps", 2022.
]-> FlowDroid Static Data Flow Analysis Tool:
https://github.com/secure-software-engineering/FlowDroid
Android is the most adopted mobile operating systems in terms of users, applications and developers . However, its popularity means that legitimate developers must co-exist with malware writers.
#Sec_code_review
"Demystifying Hidden Sensitive Operations in Android apps", 2022.
]-> FlowDroid Static Data Flow Analysis Tool:
https://github.com/secure-software-engineering/FlowDroid
Android is the most adopted mobile operating systems in terms of users, applications and developers . However, its popularity means that legitimate developers must co-exist with malware writers.
vpn_dos.pdf
777.1 KB
#Research
"Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing", 2022.
In today’s Internet ecosystem, enterprise networks are often
dispersed over several locations, such as corporate branches, data centers, and infrastructure hosted by cloud providers. VPN systems are an integral part of these setups, serving as the glue that securely connects the different locations by encrypting and authenticating traffic between pairs of endpoints over an untrusted network such as the Internet. Given this role, VPN protocols are as ubiquitous in emerging SD-WAN deployments as they are in more traditional site-to-site connections. Moreover, the recent shift to remote work has led to a surge in VPN use .
"Evaluating Susceptibility of VPN Implementations to DoS Attacks Using Adversarial Testing", 2022.
In today’s Internet ecosystem, enterprise networks are often
dispersed over several locations, such as corporate branches, data centers, and infrastructure hosted by cloud providers. VPN systems are an integral part of these setups, serving as the glue that securely connects the different locations by encrypting and authenticating traffic between pairs of endpoints over an untrusted network such as the Internet. Given this role, VPN protocols are as ubiquitous in emerging SD-WAN deployments as they are in more traditional site-to-site connections. Moreover, the recent shift to remote work has led to a surge in VPN use .
LD_PRELOAD.pdf
129.7 KB
"This will only hurt for a moment": Code injection on Linux and macOS with LD_PRELOAD.
📚 t.iss.one/Library_Sec
📚 t.iss.one/Library_Sec
Android_webview.pdf
749.2 KB
#Mobile_Security
"Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView", 2022.
Browser fingerprinting is an effective method to identify individuals based on information accessible through browser settings without storing information locally, e.g., in cookies.
📚 t.iss.one/Library_Sec
"Our fingerprints don't fade from the Apps we touch: Fingerprinting the Android WebView", 2022.
Browser fingerprinting is an effective method to identify individuals based on information accessible through browser settings without storing information locally, e.g., in cookies.
📚 t.iss.one/Library_Sec
The_Web_Application_Hacker's_Handbook_Finding_and_Exploiting_Security.pdf
13.5 MB
The Web Application
Hacker’s Handbook. Finding and Exploiting Security Flaws.
Dafydd Stuttard, Marcus Pinto
#BugBounty
📚 t.iss.one/Library_Sec
Hacker’s Handbook. Finding and Exploiting Security Flaws.
Dafydd Stuttard, Marcus Pinto
#BugBounty
📚 t.iss.one/Library_Sec
DNS_Sec.pdf
3.7 MB
"Security Of The Domain Name System: An Introduction for Policy Makers", 2022.
Enhancing the digital security of communication networks is critical to strengthen trust in the ongoing digital transformation and to ensure the smooth functioning of our digitally dependent economies and societies.
The COVID-19 pandemic highlighted the crucial role played by communication networks in enabling economic and social resiliency, in particular as organisations in many OECD countries switched to teleworking to ensure business continuity during lock-down orders.
#DNS #DNSSEC
📚 t.iss.one/Library_Sec
Enhancing the digital security of communication networks is critical to strengthen trust in the ongoing digital transformation and to ensure the smooth functioning of our digitally dependent economies and societies.
The COVID-19 pandemic highlighted the crucial role played by communication networks in enabling economic and social resiliency, in particular as organisations in many OECD countries switched to teleworking to ensure business continuity during lock-down orders.
#DNS #DNSSEC
📚 t.iss.one/Library_Sec
Pre_hijacked_accounts.pdf
642.4 KB
Pre-hijacked accounts: An Empirical Study of Security Failures in User Account Creation on the Web , 2022.
User accounts have become a ubiquitous feature of websites
and other online services. Correspondingly, such accounts
have become valuable targets for attackers, and companies invest significant resources to prevent account hijacking attacks, in which an attacker gains unauthorized access to the victim’s account. Previous work on this topic has studied various techniques that could be used for account hijacking, for example, the use of Cross-Site Request Forgery (CSRF) to trick victims into changing their account passwords to an attacker-controlled value .
📚 t.iss.one/Library_Sec
User accounts have become a ubiquitous feature of websites
and other online services. Correspondingly, such accounts
have become valuable targets for attackers, and companies invest significant resources to prevent account hijacking attacks, in which an attacker gains unauthorized access to the victim’s account. Previous work on this topic has studied various techniques that could be used for account hijacking, for example, the use of Cross-Site Request Forgery (CSRF) to trick victims into changing their account passwords to an attacker-controlled value .
📚 t.iss.one/Library_Sec
DNS_Securing.pdf
1.4 MB
Securing name resolution in the IoT: DNS over CoAP , 2022.
SIAMHAN.pdf
5 MB
"SIAMHAN: IPv6 Address Correlation Attacks on TLS Encrypted Traffic via Siamese Heterogeneous Graph Attention Network", 2022.
https://github.com/CuiTianyu961030/SiamHAN
https://github.com/CuiTianyu961030/SiamHAN
AnyConnect_Sec_Analysis.pdf
248.6 KB
#reversing
"Very Pwnable Network: Cisco AnyConnect Security Analysis", 2022.
When corporations build an internal network, they often stick to the same vendor for all components due to compatibility reasons. A vendor should offer a variety of solutions meeting all the customer’s needs. Creating and maintaining such a product range is a huge effort, and, thus, the corporate network landscape is dominated by very few vendors. Cisco’s market share including VPNs and other enterprise network equipment is around 50 % [1]. Thus, users connecting to corporate VPNs will likely face a setup that requires them to install the Cisco AnyConnect client.
📚
"Very Pwnable Network: Cisco AnyConnect Security Analysis", 2022.
When corporations build an internal network, they often stick to the same vendor for all components due to compatibility reasons. A vendor should offer a variety of solutions meeting all the customer’s needs. Creating and maintaining such a product range is a huge effort, and, thus, the corporate network landscape is dominated by very few vendors. Cisco’s market share including VPNs and other enterprise network equipment is around 50 % [1]. Thus, users connecting to corporate VPNs will likely face a setup that requires them to install the Cisco AnyConnect client.
📚
Autofill_iOS_Android.pdf
3.1 MB
#Malware_analysis
"The Emperor’s New Autofill Framework: A Security Analysis of Autofill on iOS and Android", 2021.
"The Emperor’s New Autofill Framework: A Security Analysis of Autofill on iOS and Android", 2021.
Understanding_a_Payloads_Life.pdf
4.7 MB
Understanding a Payload's Life (Featuring Meterpreter & other guests)
#payload
📚 t.iss.one/library_Sec
#payload
📚 t.iss.one/library_Sec