fuxploider
File upload vulnerability scanner and exploitation tool
https://github.com/almandin/fuxploider
File upload vulnerability scanner and exploitation tool
https://github.com/almandin/fuxploider
GitHub
GitHub - almandin/fuxploider: File upload vulnerability scanner and exploitation tool.
File upload vulnerability scanner and exploitation tool. - almandin/fuxploider
Designing The Adversary Simulation Lab
https://www.mdsec.co.uk/2020/04/designing-the-adversary-simulation-lab/
https://www.mdsec.co.uk/2020/04/designing-the-adversary-simulation-lab/
MDSec
Designing The Adversary Simulation Lab - MDSec
As some of you will know, we have recently entered into the Red Team training space. Before deciding to create our course now known as “Adversary Simulation and Red Team...
Forwarded from Neuron Hackspace
[Мастер-класс] Практические атаки на интерфейс USB
Сегодня 19 апреля в 19:00 по мск на Youtube пройдет онлайн трансляция мастер-класса по практическими атаками на стек USB. Все атаки будут показаны на реальном оборудовании в прямом эфире, во время трансляции можно будет задавать вопросы докладчику.
Докладчик: Андрей xairy Коновалов
Инженер-программист, работает в Google. Разрабатывает инструменты поиска багов в ядре Linux. Обнаружил множество уязвимостей в ядре Linux, в том числе CVE-2017-7308 в сетевом стеке и CVE-2016-2384 драйвере USB-MIDI. Его блог: xairy.github.io
Ссылка на трансляцию:
youtu.be/0bMxAdq1adc
Сервер Discord:
neuronspace.ru/discord
Donate:
neuronspace.ru/donate
Задавать вопросы можно в чате на Youtube или голосом через Discord.
Сегодня 19 апреля в 19:00 по мск на Youtube пройдет онлайн трансляция мастер-класса по практическими атаками на стек USB. Все атаки будут показаны на реальном оборудовании в прямом эфире, во время трансляции можно будет задавать вопросы докладчику.
Докладчик: Андрей xairy Коновалов
Инженер-программист, работает в Google. Разрабатывает инструменты поиска багов в ядре Linux. Обнаружил множество уязвимостей в ядре Linux, в том числе CVE-2017-7308 в сетевом стеке и CVE-2016-2384 драйвере USB-MIDI. Его блог: xairy.github.io
Ссылка на трансляцию:
youtu.be/0bMxAdq1adc
Сервер Discord:
neuronspace.ru/discord
Donate:
neuronspace.ru/donate
Задавать вопросы можно в чате на Youtube или голосом через Discord.
Dissecting the Windows Defender Driver - WdFilter
https://www.n4r1b.com/posts/2020/04/dissecting-the-windows-defender-driver-wdfilter-part-4/
https://www.n4r1b.com/posts/2020/04/dissecting-the-windows-defender-driver-wdfilter-part-4/
N4R1B
Dissecting the Windows Defender Driver - WdFilter (Part 4)
In this series of posts I'll be explaining how the Windows Defender main Driver works, in this fourth post we will be focusing on how WdFilter handles different registry operations
Forwarded from Noise Security Bit (AM)
Hardwear.io Virtual Con на удивление может затмить многие офлайн эвенты!
Посмотрите сами на доклады 👁:
🧨 LVI: Hijacking Transient Execution with Load Value Injection
🧨 Firmly Rooted in Hardware: Practical protection from firmware attacks in hardware supply chain
🧨 Capturing Mask ROMs
🧨 Hints from Hardware Security for solving real-world challenges
Мероприятие абсолютно бесплатное🚀
👇👇👇
https://hardwear.io/virtual-con-2020/
Посмотрите сами на доклады 👁:
🧨 LVI: Hijacking Transient Execution with Load Value Injection
🧨 Firmly Rooted in Hardware: Practical protection from firmware attacks in hardware supply chain
🧨 Capturing Mask ROMs
🧨 Hints from Hardware Security for solving real-world challenges
Мероприятие абсолютно бесплатное🚀
👇👇👇
https://hardwear.io/virtual-con-2020/
hardwear.io
Hardwear.io Virtual Conference 2020 | Hacking, Community and Hope
30th April and 1st May 2020 | 10:00 am to 1:00 pm PDT (GMT-7) | Let's talk Hardware Security
Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant
https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/
https://www.volexity.com/blog/2020/04/21/evil-eye-threat-actor-resurfaces-with-ios-exploit-and-updated-implant/
Volexity
Evil Eye Threat Actor Resurfaces with iOS Exploit and Updated Implant
In September 2019, Volexity published Digital Crackdown: Large-Scale Surveillance and Exploitation of Uyghurs, which described a series of attacks against Uyghurs from multiple Chinese APT actors. The most notable threat […]
Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus works without disassembling these binaries, which is an advantage for binaries that are complex to disassemble and where common tools miss functions. In addition, the binary-only approach makes it very fast and run within a few seconds.
https://github.com/seemoo-lab/polypyus
https://github.com/seemoo-lab/polypyus
GitHub
GitHub - seemoo-lab/polypyus
Contribute to seemoo-lab/polypyus development by creating an account on GitHub.
Offensive OSINT s01e04 - Intelligence gathering on critical infrastructure in Southeast Asia
https://www.offensiveosint.io/offensive-osint-s01e03-intelligence-gathering-on-critical-infrastructure-in-southeast-asia/
https://www.offensiveosint.io/offensive-osint-s01e03-intelligence-gathering-on-critical-infrastructure-in-southeast-asia/
Offensive OSINT
Offensive OSINT s01e04 - Intelligence gathering on critical infrastructure in Southeast Asia
This is the second part of my investigation into critical infrastructure around
the world. This article should have been a presentation on ICS Conference in
Singapore, however due to Coronavirus it will be a virtual event. I'm not
interested in participating…
the world. This article should have been a presentation on ICS Conference in
Singapore, however due to Coronavirus it will be a virtual event. I'm not
interested in participating…
Defeating ASLR Part 1
https://bkaraceylan.github.io/hack/binary-exploitation/2020/05/01/defeating-aslr-part-1.html
https://bkaraceylan.github.io/hack/binary-exploitation/2020/05/01/defeating-aslr-part-1.html
Your awesome title
Defeating ASLR Part I
Second part of this series contains the exploitation process. This is the first post of a two part series. In this post we’re going to learn a bit about virtual memory, dynamic linking, position indepentend code, and ASLR protection. All of these topics are…
Splunk Attack Range in a virtualized Ubuntu Guest VM — Guide
https://medium.com/@julian.wieg/splunk-attack-range-in-a-virtualized-ubuntu-guest-vm-guide-c6587f43c15
https://medium.com/@julian.wieg/splunk-attack-range-in-a-virtualized-ubuntu-guest-vm-guide-c6587f43c15
Medium
Splunk Attack Range in a virtualized Ubuntu Guest VM — Guide
A quick helper to get this fantastic project running locally: https://github.com/splunk/attack_range
Privilege escalation (UAC bypass) in ChangePK
https://medium.com/@mattharr0ey/privilege-escalation-uac-bypass-in-changepk-c40b92818d1b
https://medium.com/@mattharr0ey/privilege-escalation-uac-bypass-in-changepk-c40b92818d1b
Medium
Privilege escalation (UAC bypass) in ChangePK
Introduction It’s been a long time since I decided to to be away from Twitter for a while for self-improvements reasons and finding…
Analyzing a trio of RCE bugs in Intel wireless adapters
https://www.thezdi.com/blog/2020/5/4/analyzing-a-trio-of-remote-code-execution-bugs-in-intel-wireless-adapters
https://www.thezdi.com/blog/2020/5/4/analyzing-a-trio-of-remote-code-execution-bugs-in-intel-wireless-adapters
Zero Day Initiative
Zero Day Initiative — Analyzing a Trio of Remote Code Execution Bugs in Intel Wireless Adapters
Earlier this month, we published three memory corruption bugs ( ZDI-20-494 , ZDI-20-495 , and ZDI-20-496 - collectively referred to as CVE-2020-0558) affecting two Windows Wi-Fi drivers for various Intel dual-band wireless adapters. According to the vendor…
Bugs on the Windshield: Fuzzing the Windows Kernel
https://research.checkpoint.com/2020/bugs-on-the-windshield-fuzzing-the-windows-kernel/
https://research.checkpoint.com/2020/bugs-on-the-windshield-fuzzing-the-windows-kernel/
Check Point Research
Bugs on the Windshield: Fuzzing the Windows Kernel - Check Point Research
Research By: Netanel Ben-Simon and Yoav Alon Background: In our previous research, we used WinAFL to fuzz user-space applications running on Windows, and found over 50 vulnerabilities in Adobe Reader and Microsoft Edge. For our next challenge, we decided…