purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
https://github.com/praetorian-inc/purple-team-attack-automation
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs
https://github.com/praetorian-inc/purple-team-attack-automation
GitHub
GitHub - praetorian-inc/purple-team-attack-automation: Praetorian's public release of our Metasploit automation of MITRE ATT&CK™…
Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs - praetorian-inc/purple-team-attack-automation
Jailbreaking Subaru StarLink
subaru-starlink-research
https://github.com/sgayou/subaru-starlink-research/blob/master/doc/README.md
subaru-starlink-research
https://github.com/sgayou/subaru-starlink-research/blob/master/doc/README.md
GitHub
subaru-starlink-research/doc/README.md at master · sgayou/subaru-starlink-research
Subaru StarLink persistent root code execution. Contribute to sgayou/subaru-starlink-research development by creating an account on GitHub.
Forwarded from Noise Security Bit
Несколько интересных уязвимостей были обнародованы для WiFi чипов компании Broadcom. Чтобы вы понимали это один из самых популярных на рынке производителей в этом сегменте (используется Apple, Microsoft, Dell...). Все уязвимости были найдены в исходном коде драйвера brcmfmac (open sourced). И связаны в основном с неправильной обработкой и парсингом фреймов сетевых пакетов на канальном уровне (не требует аутентификации в сети для реализации атаки). Большинство найденных уязвимостей это переполнение/повреждение памяти в куче (heap buffer overflow) с последующей возможностью, контролируемого атакующим, удаленного выполнения кода. Все четыре уязвимости были найдены исследователями из компании Quarkslab.
Full details: https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Advisory: https://www.kb.cert.org/vuls/id/166939/
Full details: https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
Advisory: https://www.kb.cert.org/vuls/id/166939/
Quarkslab
Reverse-engineering Broadcom wireless chipsets - Quarkslab's blog
Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide…
RCE in EA's Origin Desktop Client
https://blog.underdogsecurity.com/rce_in_origin_client/
https://blog.underdogsecurity.com/rce_in_origin_client/
Реверс песочницы iOS https://census-labs.com/media/sandbox-argp-csw2019-public.pdf
Forwarded from r0 Crew (Channel)
Some part of FIN7 (aka CARBANK) source code has leaked to VirusTotal:
https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html
#malware #source #leak #fin7 #darw1n
https://www.fireeye.com/blog/threat-research/2019/04/carbanak-week-part-one-a-rare-occurrence.html
#malware #source #leak #fin7 #darw1n
Google Cloud Blog
CARBANAK Week Part One: A Rare Occurrence | Google Cloud Blog
We kick off CARBANAK Week with the first post in our four-part blog series.
Вводные уроки по анализу и устройству вредоносов на основе PE-файлов
https://twitter.com/binitamshah/status/1120642036997197824?s=21
https://twitter.com/binitamshah/status/1120642036997197824?s=21
Twitter
Binni Shah
Malware Theory - PE Malformations and Anomalies : https://t.co/dvmSQuyoZq Basic Structure of PE Files : https://t.co/fqRWJR6xjZ Memory Mapping of PE Files : https://t.co/6t6Ujh5xzt Oligomorphic, Polymorphic and Metamorphic Viruses : https://t.co/pYlaAQQ78C…
Анализ изменений в Android-приложениях
https://blog.quarkslab.com/android-application-diffing-engine-overview.html
https://blog.quarkslab.com/android-application-diffing-engine-overview.html
Quarkslab
Android Application Diffing: Engine Overview
WDExtract - Extract Windows Defender database from vdm files and unpack it
https://www.kernelmode.info/forum/viewtopic.php?f=11&t=5508
https://www.kernelmode.info/forum/viewtopic.php?f=11&t=5508
DNS based threat hunting and DoH (DNS over HTTPS)
https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html
https://blog.redteam.pl/2019/04/dns-based-threat-hunting-and-doh.html
blog.redteam.pl
DNS based threat hunting and DoH (DNS over HTTPS)
red team, blue team, penetration testing, red teaming, threat hunting, digital forensics, incident response, cyber security, IT security
Uncovering CVE-2019-0232: A Remote Code Execution Vulnerability in Apache Tomcat
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/
https://blog.trendmicro.com/trendlabs-security-intelligence/uncovering-cve-2019-0232-a-remote-code-execution-vulnerability-in-apache-tomcat/
Trend Micro
CVE-2019-0232: RCE Vulnerability in Apache Tomcat
CVE-2019-0232 is a vulnerability in Apache Tomcat that could allow attackers to execute arbitrary commands by abusing an operating system command injection brought about by a Tomcat CGI Servlet input validation error.
Forwarded from r0 Crew (Channel)
How to reverse malware on macOS:
Part 1: https://www.sentinelone.com/blog/how-to-reverse-macos-malware-part-one/
Part 2: https://www.sentinelone.com/blog/how-to-reverse-macos-malware-part-two/
Part 3: https://www.sentinelone.com/blog/how-to-reverse-malware-on-macos-without-getting-infected-part-3/
#malware #macos #newbie #reverse #dukeBarman
Part 1: https://www.sentinelone.com/blog/how-to-reverse-macos-malware-part-one/
Part 2: https://www.sentinelone.com/blog/how-to-reverse-macos-malware-part-two/
Part 3: https://www.sentinelone.com/blog/how-to-reverse-malware-on-macos-without-getting-infected-part-3/
#malware #macos #newbie #reverse #dukeBarman
SentinelOne
How to Reverse Malware on macOS Without Getting Infected | Part 1
Ever wanted to learn how to reverse malware on Apple macOS? This is the place to start! Join us in this 3-part series on macOS reverse engineering skills.
Facebook Messenger Worm
https://www.kernelmode.info/forum/viewtopic.php?p=32871
https://www.kernelmode.info/forum/viewtopic.php?p=32871