Forwarded from RME-DisCo @ UNIZAR [www.reversea.me]
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability #AndroidHacking #CVE20240044 #DataExfiltration #MobileHacker #Vulnerability https://www.mobile-hacker.com/2024/06/17/exfiltrate-sensitive-user-data-from-apps-on-android-12-and-13-using-cve-2024-0044-vulnerability/
Mobile Hacker
Exfiltrate sensitive user data from apps on Android 12 and 13 using CVE-2024-0044 vulnerability Mobile Hacker
With physical access to Android device with enabled ADB debugging running Android 12 or 13 before receiving March 2024 security patch, it is possible to access internal data of any user installed app by misusing CVE-2024-0044 vulnerability. Internal data…
The GhostWrite vulnerability affects the T-Head XuanTie C910 RISC-V CPU. This vulnerability allows unprivileged attackers, even those with limited access, to read and write any part of the computer’s memory and to control peripheral devices like network cards. GhostWrite renders the CPU’s security features ineffective and cannot be fixed without disabling around half of the CPU’s functionality.
https://ghostwriteattack.com/
https://ghostwriteattack.com/
QiAnXin Cyber Threat Report H1 2024 is released
https://ti.qianxin.com/uploads/2024/08/19/2274f632f6a1d8acd2f1801c24887edb.pdf
https://ti.qianxin.com/uploads/2024/08/19/2274f632f6a1d8acd2f1801c24887edb.pdf
Залутал два баджа, один за 2 место в Sans DFIR Netwars (ctf), и другой за первое место в ctf чисто по малвейр реверсу, который проводился среди учащихся на курсе sans for610
hyperv-1dayclass_CVE-2024-38080
https://hackyboiz.github.io/2024/09/01/pwndorei/hyperv-1dayclass_CVE-2024-38080/
https://hackyboiz.github.io/2024/09/01/pwndorei/hyperv-1dayclass_CVE-2024-38080/
TRACE is a digital forensic tool I developed as my final year project. It provides an intuitive interface for analyzing disk images and includes a range of functionalities to assist forensic examiners in extracting and viewing the contents of various image file formats.
https://github.com/Gadzhovski/TRACE-Forensic-Toolkit
https://github.com/Gadzhovski/TRACE-Forensic-Toolkit
GitHub
GitHub - Gadzhovski/TRACE-Forensic-Toolkit: Digital forensic analysis tool that provides a user-friendly interface for investigating…
Digital forensic analysis tool that provides a user-friendly interface for investigating disk images. - Gadzhovski/TRACE-Forensic-Toolkit
Пополнение в списке тулз для анализа вредоносных PDF! Давно ничего нового небыло
https://github.com/seekbytes/IPA/
https://github.com/seekbytes/IPA/
GitHub
GitHub - seekbytes/IPA: GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships…
GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for threat analysis. - seekbytes/IPA
Using Symbolic Execution to Devirtualise a Virtualised Binary
https://blog.deobfuscate.io/using-symbolic-execution-for-devirtualisation
https://blog.deobfuscate.io/using-symbolic-execution-for-devirtualisation
Reverse Engineering Blog
Using Symbolic Execution to Devirtualise a Virtualised Binary
Using symbolic execution to reverse engineer and devirtualise a binary using virtual machine obfuscation.
Advanced Cyberchef Techniques - Defeating Nanocore Obfuscation With Math and Flow Control
https://www.embeeresearch.io/advanced-cyberchef-techniques-defeating-nanocore-obfuscation-with-math-and-flow-control/
https://www.embeeresearch.io/advanced-cyberchef-techniques-defeating-nanocore-obfuscation-with-math-and-flow-control/
Embee Research
Advanced Cyberchef Techniques - Defeating Nanocore Obfuscation With Math and Flow Control
Applying Flow Control and Mathematical operators to deobfuscate a .vbs loader for Nanocore malware.
A Comprehensive Survey on Advanced Persistent Threat (APT) Detection Techniques
https://cdn.techscience.cn/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_52447/TSP_CMC_52447.pdf
https://cdn.techscience.cn/files/cmc/2024/TSP_CMC-80-2/TSP_CMC_52447/TSP_CMC_52447.pdf
A public secret : Research on the CVE-2024-30051 privilege escalation vulnerability in the wild
https://ti.qianxin.com/blog/articles/public-secret-research-on-the-cve-2024-30051-privilege-escalation-vulnerability-in-the-wild-en/
https://ti.qianxin.com/blog/articles/public-secret-research-on-the-cve-2024-30051-privilege-escalation-vulnerability-in-the-wild-en/
Qianxin
奇安信威胁情报中心
Nuxt.js project