RPI4 KVM for Malware Analysis https://honeypot.lol/posts/rpi4-kvm-for-malware-analysis/
Expert discloses new iPhone lock screen vulnerability in iOS 15 https://securityaffairs.co/wordpress/122740/hacking/lock-screen-vulnerability.html
Security Affairs
Expert discloses new iPhone lock screen vulnerability in iOS 15
The security researcher Jose Rodriguez discovered a new lock screen vulnerability for iOS 15 (& iOS 14.8) that has yet to be fixed.
Patching A Java .class File https://blog.didierstevens.com/2021/09/26/patching-a-java-class-file/
Didier Stevens
Patching A Java .class File
010 Editor is one of few commercial applications that I use daily. It’s a powerful binary editor with scripting and templates. I recently had to patch a Java .class file: extend a string insi…
Made in China: OSX.ZuRu — trojanized apps spread malware, via sponsored search results https://objective-see.com/blog/blog_0x66.html
objective-see.org
Made in China: OSX.ZuRu
trojanized apps spread malware, via sponsored search results
Repository of Python scripts mainly written for malware research purposes https://github.com/fboldewin/misc_malware
GitHub
GitHub - fboldewin/misc_malware
Contribute to fboldewin/misc_malware development by creating an account on GitHub.
How malware gets into the App Store and why Apple can't stop that https://habr.com/en/amp/post/580272/
Habr
How malware gets into the App Store and why Apple can't stop that
Only after I had published a post detailing three iOS 0-day vulnerabilities and expressing my frustration with Apple Security Bounty Program, I received a reply from Apple:We saw your blog post...
Always-on Processor magic: How Find My works while iPhone is powered off https://naehrdine.blogspot.com/2021/09/always-on-processor-magic-how-find-my.html
Blogspot
Always-on Processor magic: How Find My works while iPhone is powered off
Wireless and firmware hacking, PhD life, Technology
Analysis of CVE-2021-30860 — the flaw and fix of a zero-click vulnerability, exploited in the wild https://objective-see.com/blog/blog_0x67.html
objective-see.org
Analysis of CVE-2021-30860
the flaw and fix of a zero-click vulnerability, exploited in the wild
Drive-By Compromise: A Tale Of Four WiFi Routers https://blog.includesecurity.com/2021/09/drive-by-compromise-a-tale-of-four-routers/
Include Security Research Blog
Drive-By Compromise: A Tale Of Four Wifi Routers - Include Security Research Blog
Determining the overall security posture of consumer electronics is an exceedingly hard task. In this post, we analyze four 'budget' devices.
POC for scanning ProxyShell (CVE-2021-34523,CVE-2021-34473,CVE-2021-31207) https://github.com/mithridates1313/ProxyShell_POC
GitHub
GitHub - mithridates1313/ProxyShell_POC: POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207)
POC for scanning ProxyShell(CVE-2021-34523,CVE-2021-34473,CVE-2021-31207) - mithridates1313/ProxyShell_POC
New Android Malware Steals Financial Data from 378 Banking and Wallet Apps https://thehackernews.com/2021/09/new-android-malware-steals-financial.html
Karkinos - Penetration Testing and Hacking CTF's Swiss Army Knife https://hakin9.org/karkinos-penetration-testing-and-hacking-ctfs-swiss-army-knife/
Hakin9 - IT Security Magazine
Karkinos - Penetration Testing and Hacking CTF's Swiss Army Knife
Karkinos is a light-weight 'Swiss Army Knife' for penetration testing and/or hacking CTF's. Currently, Karkinos offers the following:
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor https://www.microsoft.com/security/blog/2021/09/27/foggyweb-targeted-nobelium-malware-leads-to-persistent-backdoor/
Microsoft News
FoggyWeb: Targeted NOBELIUM malware leads to persistent backdoor
In-depth analysis of newly detected NOBELIUM malware: a post-exploitation backdoor that Microsoft Threat Intelligence Center (MSTIC) refers to as FoggyWeb. NOBELIUM uses FoggyWeb to remotely exfiltrate the configuration database of compromised AD FS servers…
Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation https://www.darkreading.com/endpoint/notorious-spyware-tool-found-hiding-beneath-four-layers-of-obfuscation
Darkreading
Notorious Spyware Tool Found Hiding Beneath Four Layers of Obfuscation
FinFisher (aka FinSpy) surveillance software now goes to extreme lengths to duck analysis and discovery, researchers found in a months-long investigation.
An Intro to Fuzzing (AKA Fuzz Testing) https://labs.bishopfox.com/tech-blog/an-intro-to-fuzzing-aka-fuzz-testing
Bishop Fox
Fuzz Testing for blackbox security analysis
Learn about fuzzing testing, who should fuzz, what types of fuzzers exist, how to write a good harness to perform blackbox analysis on a given program.
Into the art of Binary Exploitation 0x000002 [Sorcery of ROP] https://7h3h4ckv157.medium.com/into-the-art-of-binary-exploitation-0x000002-sorcery-of-rop-b4658238ee62
Medium
Into the art of Binary Exploitation 0x000002 [Sorcery of ROP]
Hey Hackers, ✋✋
Crucial’s MOD Utility LPE – CVE-2021-41285 https://voidsec.com/crucial-mod-utility-lpe-cve-2021-41285/
VoidSec
Crucial’s MOD Utility LPE - CVE-2021-41285 - VoidSec
Crucial's Ballistix MOD Utility v.<= 2.0.2.5 is affected by multiple Privilege Escalation (LPE) vulnerabilities in the MODAPI.sys driver.
Pwncat - Fancy Reverse And Bind Shell Handler https://www.kitploit.com/2021/10/pwncat-fancy-reverse-and-bind-shell.html
KitPloit - PenTest & Hacking Tools
Pwncat - Fancy Reverse And Bind Shell Handler