Analyzing a watering hole campaign using macOS exploits
https://blog.google/threat-analysis-group/analyzing-watering-hole-campaign-using-macos-exploits/
https://blog.google/threat-analysis-group/analyzing-watering-hole-campaign-using-macos-exploits/
Google
Analyzing a watering hole campaign using macOS exploits
To protect our users, TAG routinely hunts for 0-day vulnerabilities exploited in-the-wild. In late August 2021, TAG discovered watering hole attacks targeting visitors t…
A virtual journey: From hardware virtualization to Hyper-V's Virtual Trust Levels
https://blog.quarkslab.com/a-virtual-journey-from-hardware-virtualization-to-hyper-vs-virtual-trust-levels.html
https://blog.quarkslab.com/a-virtual-journey-from-hardware-virtualization-to-hyper-vs-virtual-trust-levels.html
Quarkslab
A virtual journey: From hardware virtualization to Hyper-V's Virtual Trust Levels - Quarkslab's blog
A step by step approach to reverse engineer Hyper-V and have a low level insight into Virtual Trust Levels.
MUI: Visualizing symbolic execution with Manticore and Binary Ninja
https://blog.trailofbits.com/2021/11/17/mui-visualizing-symbolic-execution-with-manticore-and-binary-ninja/
https://blog.trailofbits.com/2021/11/17/mui-visualizing-symbolic-execution-with-manticore-and-binary-ninja/
The Trail of Bits Blog
MUI: Visualizing symbolic execution with Manticore and Binary Ninja
During my summer internship, I had the wonderful opportunity to work on the Manticore User Interface (MUI). The MUI project aims to combine the strength of both Manticore, a powerful symbolic execution library, and Binary Ninja, a popular binary analysis…
USENIX Security '21 - SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning
https://www.youtube.com/watch?v=72Ngu3305TU
https://www.youtube.com/watch?v=72Ngu3305TU
YouTube
USENIX Security '21 - SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning
USENIX Security '21 - SyzVegas: Beating Kernel Fuzzing Odds with Reinforcement Learning
Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V. Krishnamurthy, and Nael Abu-Ghazaleh, University of California, Riverside
Fuzzing embeds a large number…
Daimeng Wang, Zheng Zhang, Hang Zhang, Zhiyun Qian, Srikanth V. Krishnamurthy, and Nael Abu-Ghazaleh, University of California, Riverside
Fuzzing embeds a large number…
Sandboxing Antimalware Products for Fun and Profit
https://elastic.github.io/security-research/whitepapers/2022/02/02.sandboxing-antimalware-products-for-fun-and-profit/article/
https://elastic.github.io/security-research/whitepapers/2022/02/02.sandboxing-antimalware-products-for-fun-and-profit/article/
Beaconfuzz - A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery - https://fuzzinglabs.com/wp-content/uploads/2022/02/Beaconfuzz_OffensiveCon2022_patrick_ventuzelo.pdf
👍2
The Death of “Please Enable Macros” and What it Means
https://research.checkpoint.com/2022/the-death-of-please-enable-macros-and-what-it-means/
https://research.checkpoint.com/2022/the-death-of-please-enable-macros-and-what-it-means/
Check Point Research
The Death of "Please Enable Macros" and What it Means - Check Point Research
Introduction On the 7th of February, Microsoft announced an impending change to its ubiquitous suite of Office apps. In Microsoft’s own words: “VBA macros obtained from the internet will now be blocked by default”. The change is expected to begin rolling…
FitM, the Fuzzer-in-the-Middle, is a AFL++-based coverage-guided fuzzer for stateful, binary-only client-server applications
https://github.com/FGSect/FitM
https://github.com/FGSect/FitM
GitHub
GitHub - fgsect/FitM: FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot…
FitM, the Fuzzer in the Middle, can fuzz client and server binaries at the same time using userspace snapshot-fuzzing and network emulation. It's fast and comparably easy to set up. - fgsect/FitM
Go Fuzz Testing - The Basics - https://blog.fuzzbuzz.io/go-fuzzing-basics/
GraphFuzz: experimental framework for building structure-aware, library API fuzzers - https://github.com/hgarrereyn/GraphFuzz
GitHub
GitHub - hgarrereyn/GraphFuzz: GraphFuzz is an experimental framework for building structure-aware, library API fuzzers.
GraphFuzz is an experimental framework for building structure-aware, library API fuzzers. - hgarrereyn/GraphFuzz
OffensiveCon22 - Patrick Ventuzelo - Beaconfuzz - https://www.youtube.com/watch?v=nERNZ5mL46Q
YouTube
OffensiveCon22 - Patrick Ventuzelo - Beaconfuzz
Beaconfuzz - A Journey into Ethereum 2.0 Blockchain Fuzzing and Vulnerability Discovery
https://www.offensivecon.org/speakers/2022/patrick-ventuzelo.html
https://www.offensivecon.org/speakers/2022/patrick-ventuzelo.html
OffensiveCon22 - Tamas K Lengyel and Bálint Varga-Perke - Case Studies of Fuzzing with Xen - https://www.youtube.com/watch?v=EFrIfXd3KZQ
YouTube
OffensiveCon22 - Tamas K Lengyel and Bálint Varga-Perke - Case Studies of Fuzzing with Xen
https://www.offensivecon.org/speakers/2022/tamas-k-lengyel-and-b%C3%A1lint-varga-perke.html