Forwarded from Proxy Bar
Forwarded from Proxy Bar
Forwarded from Hacker News
Fixing a Buffer Overflow in Unix v4 Like It's 1973 (Score: 150+ in 21 hours)
Link: https://readhacker.news/s/6K43L
Comments: https://readhacker.news/c/6K43L
Link: https://readhacker.news/s/6K43L
Comments: https://readhacker.news/c/6K43L
sigma star gmbh
Fixing a Buffer Overflow in UNIX v4 Like It's 1973
This blog post shows how to fix a buffer overflow in the su progam of UNIX v4
Reverse Dungeon
https://www.youtube.com/watch?v=5eNtT2p12cM
SySS Tech Blog
Windows Local Privilege Escalation through the bitpixie Vulnerability
This blog post demonstrates how attackers can circumvent BitLocker drive encryption, how to protect against such attacks, and why acting now might pay off in the near future. The bitpixie vulnerability in Windows Boot Manager is caused by a flaw in the PXE…
Reverse Dungeon
Must read https://exploitreversing.com/2023/04/11/exploiting-reversing-er-series
Exploiting Reversing (ER) series:
Part 1 - Windows kernel drivers (1)
Part 2 - Windows kernel drivers (2)
Part 3 - Chrome
Part 4 - macOS/iOS
Part 5 - Hyper-V
Part 1 - Windows kernel drivers (1)
Part 2 - Windows kernel drivers (2)
Part 3 - Chrome
Part 4 - macOS/iOS
Part 5 - Hyper-V
Exploit Reversing
Exploiting Reversing (ER) series: article 01 | Windows kernel drivers – part 01
The first article (109 pages) in the Exploiting Reversing (ER) series, a step-by-step vulnerability research series on Windows, macOS, hypervisors and browsers, is available for reading on: (PDF): …
❤🔥2🐳2❤1
Forwarded from CyberSecurityTechnologies
red_report_2025.pdf
6.7 MB
#Analytics
#Threat_Research
"Red Report 2025:
The Top 10 Most Prevalent MITRE ATT&CK Techniques. SneakThief and The Perfect Heist".
// This year's findings highlight a new era of adversarial sophistication in infostealer attacks, epitomized by malware like "SneakThief," which executed in a kill chain what has come to be known as "The Perfect Heist." Although the SneakThief malware is a fictitious name in this scenario, its attack patterns reflect real-world incidents. This advanced threat leverages stealth, persistence, and automation to infiltrate networks, bypass defenses, and exfiltrate critical data
#Threat_Research
"Red Report 2025:
The Top 10 Most Prevalent MITRE ATT&CK Techniques. SneakThief and The Perfect Heist".
// This year's findings highlight a new era of adversarial sophistication in infostealer attacks, epitomized by malware like "SneakThief," which executed in a kill chain what has come to be known as "The Perfect Heist." Although the SneakThief malware is a fictitious name in this scenario, its attack patterns reflect real-world incidents. This advanced threat leverages stealth, persistence, and automation to infiltrate networks, bypass defenses, and exfiltrate critical data
❤1