VMware Fusion 11 - Guest VM RCE - CVE-2019-5514
https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/
https://theevilbit.github.io/posts/vmware_fusion_11_guest_vm_rce_cve-2019-5514/
theevilbit.github.io
CVE-2019-5514 - VMware Fusion 11 - Guest VM RCE
TL;DR Link to heading You can run an arbitrary command on a VMware Fusion guest VM through a website without any priory knowledge. Basically VMware Fusion is starting up a websocket listening only on the localhost. You can fully control all the VMs (also…
Evil Clippy: MS Office maldoc assistant
https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant/
https://outflank.nl/blog/2019/05/05/evil-clippy-ms-office-maldoc-assistant/
autoBOF: a Journey into Automation, Exploit Development, and Buffer Overflows
https://0x00sec.org/t/autobof-a-journey-into-automation-exploit-development-and-buffer-overflows/13415
https://0x00sec.org/t/autobof-a-journey-into-automation-exploit-development-and-buffer-overflows/13415
Forwarded from r0 Crew (Channel)
SAFE (Self Attentive Function Embedding) - compute binary function embeddings to find out if two functions are similar or not. Based on radare2. github: https://github.com/gadiluna/SAFE Article: https://medium.com/@massarelli/safe-self-attentive-function-embedding-d80abbfea794 #reverse #radare2 #dukeBarman
GitHub
GitHub - gadiluna/SAFE: SAFE: Self-Attentive Function Embeddings for binary similarity
SAFE: Self-Attentive Function Embeddings for binary similarity - gadiluna/SAFE
Security Data Science Learning Resources
https://medium.com/@jason_trost/security-data-science-learning-resources-8f7586995040
https://medium.com/@jason_trost/security-data-science-learning-resources-8f7586995040
Medium
Security Data Science Learning Resources
This short post catalogs some resources that may be useful for those interested in security data science. It is not meant to be an…
Статья по эксплуатации уязвимостей в JIT компиляторах
https://www.phrack.org/papers/jit_exploitation.html
https://www.phrack.org/papers/jit_exploitation.html
Active Directory Kill Chain Attack & Defense
https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md
https://github.com/infosecn1nja/AD-Attack-Defense/blob/master/README.md
GitHub
AD-Attack-Defense/README.md at master · infosecn1nja/AD-Attack-Defense
Attack and defend active directory using modern post exploitation adversary tradecraft activity - infosecn1nja/AD-Attack-Defense
Подробный анализ Turla LightNeuron - бэкдор, нацеленный на работу с MS Exchange
https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf
https://www.welivesecurity.com/wp-content/uploads/2019/05/ESET-LightNeuron.pdf
iCULeak
Tool To Find And Extract Credentials From Phone Configuration Files Hosted On Cisco CUCM
https://github.com/llt4l/iCULeak.py
Tool To Find And Extract Credentials From Phone Configuration Files Hosted On Cisco CUCM
https://github.com/llt4l/iCULeak.py
GitHub
GitHub - llt4l/iCULeak.py: Tool to find and extract credentials from phone configuration files hosted on CUCM
Tool to find and extract credentials from phone configuration files hosted on CUCM - llt4l/iCULeak.py
D1T2_Automated_Discovery_of_Logical.pdf
17.3 MB
Battle of windows service: Automated discovery of logical privilege escalation bugs