Active Directory Privilege Escalation (CVE-2021–42278) https://www.hackingarticles.in/active-directory-privilege-escalation-cve-2021-42278/
Hacking Articles
Windows Privilege Escalation: sAMAccountName Spoofing - Hacking Articles
This post discusses how CVE-2021-42278 allows potential attackers to gain high privileged user access (domain controllers Administrator level access) via a low privileged user (any
NightSky Ransomware – just a Rook RW fork in VMProtect suit https://github.com/Dump-GUY/Malware-analysis-and-Reverse-engineering/blob/main/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit/NightSky_Ransomware%E2%80%93just_a_Rook_RW_fork_in_VMProtect_suit.md
GitHub
Malware-analysis-and-Reverse-engineering/NightSky_Ransomware–just_a_Rook_RW_fork_in_VMProtect_suit/NightSky_Ransomware–just_a_…
Some of my publicly available Malware analysis and Reverse engineering. - Dump-GUY/Malware-analysis-and-Reverse-engineering
Obfuscating Malicious, Macro-Enabled Word Docs https://depthsecurity.com/blog/obfuscating-malicious-macro-enabled-word-docs
Depth Security | A Konica Minolta Service
Obfuscating Malicious, Macro-Enabled Word Docs | Depth Security
Learn more about malicious word documents from the Depth Security team in this blog post. Depth Security provides an experienced take on the subject.
New contribution in @vxunderground, nice one » Playing around with COM objects - PART 1 by @T3nb3w https://papers.vx-underground.org/papers/VXUG/Mirrors/playing-around-com-objects-part-1.pdf
SpoofThatMail: Bash script to check if a domain or list of domains can be spoofed based in DMARC records https://github.com/v4d1/SpoofThatMail
GitHub
GitHub - v4d1/SpoofThatMail: Bash script to check if a domain or list of domains can be spoofed based in DMARC records
Bash script to check if a domain or list of domains can be spoofed based in DMARC records - v4d1/SpoofThatMail
Searching for Deserialization Protection Bypasses in Microsoft Exchange (CVE-2022–21969) https://medium.com/@frycos/searching-for-deserialization-protection-bypasses-in-microsoft-exchange-cve-2022-21969-bfa38f63a62d
Medium
Searching for Deserialization Protection Bypasses in Microsoft Exchange (CVE-2022–21969)
This story begins with a series of fails, but why? That is because of my special relationship with the Microsoft Exchange codebase…
Malicious modifications to open source projects affecting thousands – Sysdig Secure https://sysdig.com/blog/malicious-modifications-detection-sysdig/
Sysdig
Malicious modifications to open source projects affecting thousands - Sysdig Secure – Sysdig
Two extremely popular JavaScript open source packages, colors.js, and faker.js, were maliciously modified to the point of being unusable.
Running arm64 code on your Intel Mac 🖥 using Unicorn emulator https://danylokos.github.io/0x04/
🇺🇦 danylokos’s blog
Running arm64 code on your Intel Mac 🖥 using Unicorn emulator
Unicorn is a lightweight multi-platform, multi-architecture CPU emulator framework™ - official website. How is it useful? I’ve used it to trace and analyze heavily obfuscated and deeply nested code parts in iOS arm64 binaries. So it can be a very nice tool…
Building userDebug Android images for a Google Pixel (sailfish) https://www.linkedin.com/pulse/building-userdebug-android-images-google-pixel-sailfish-basanta
Linkedin
Building userDebug Android images for a Google Pixel (sailfish).
Beforehand, i'm sorry for my english writing. I'm in practice for improve it.
RCE in Adobe Acrobat Reader for android(CVE-2021-40724) https://hulkvision.github.io/blog/post1/
hulkvision.github.io
RCE in Adobe Acrobat Reader for android(CVE-2021-40724)
# Summary
While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability.
Abode reader was also using Google play core library for dynamic…
While testing Adobe Acrobat reader app , the app has a feature which allows user to open pdfs directly from http/https url. This feature was vulnerable to path traversal vulnerability.
Abode reader was also using Google play core library for dynamic…
Multidex trick to unpack Android/BianLian https://cryptax.medium.com/multidex-trick-to-unpack-android-bianlian-ed52eb791e56
Medium
Multidex trick to unpack Android/BianLian
This article explains how to unpack sample sha256 5b9049c392eaf83b12b98419f14ece1b00042592b003a17e4e6f0fb466281368 which was served from…
RSA, DH, and DSA in the Wild https://eprint.iacr.org/2022/048
An extremely casual code review of MetaMask’s crypto https://blog.cryptographyengineering.com/2022/01/14/an-extremely-casual-code-review-of-metamasks-crypto/
A Few Thoughts on Cryptographic Engineering
An extremely casual code review of MetaMask’s crypto
NB: This post describes a very casual code review of a few cryptography functions used by MetaMask. It does not describe any vulnerabilities. If you’re the kind of person who likes a meanderi…
Yet another technique for unpacking latest #Flubot malware samples by @Farenain with Frida, nice! Waiting for a more detailed post :) https://twitter.com/Farenain/status/1492164831616671749?s=20&t=p5q-247waThM0_W4AA12fQ
Twitter
Farenain
I've read the post cryptax.medium.com/multidex-trick… by @cryptax and it's true that is a little bit tricky to dump the file. It looks like some hooks are not working, for the last sample of #Flubot I could extract the file because the malware tries to delete…
Nanocore, Netwire and AsyncRAT spreading campaign uses public cloud infrastructure https://blog.talosintelligence.com/2022/01/nanocore-netwire-and-asyncrat-spreading.html
Cisco Talos Blog
Nanocore, Netwire and AsyncRAT spreading campaign uses public cloud infrastructure
* Cisco Talos discovered a malicious campaign in October 2021 delivering variants of Nanocore, Netwire and AsyncRATs targeting user's information.
* According to Cisco Secure product telemetry, the victims of this campaign are primarily distributed across…
* According to Cisco Secure product telemetry, the victims of this campaign are primarily distributed across…
APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit https://research.checkpoint.com/2022/apt35-exploits-log4j-vulnerability-to-distribute-new-modular-powershell-toolkit/
Check Point Research
APT35 exploits Log4j vulnerability to distribute new modular PowerShell toolkit - Check Point Research
Introduction With the emergence of the Log4j security vulnerability, we’ve already seen multiple threat actors, mostly financially motivated, immediately add it to their exploitation arsenal. It comes as no surprise that some nation-sponsored actors also…
Forensics Analysis of the NSO Group’s Pegasus Spyware https://lifars.com/2022/01/forensics-analysis-of-the-nso-groups-pegasus-spyware/
LIFARS, a SecurityScorecard company
Forensics Analysis of the NSO Group’s Pegasus Spyware
NSO’s Group Pegasus spyware was mentioned multiple times during 2021 in the media. It has been heavily analyzed by organizations such as Amnesty Forensics Analysis of the NSO Group’s Pegasus Spyware
North Korean hackers stole nearly $400M in cryptocurrency in 2021 https://therecord.media/north-korean-hackers-stole-nearly-400m-in-cryptocurrency-in-2021/
The Record
North Korean hackers stole nearly $400M in cryptocurrency in 2021
Hackers working for the North Korean government are believed to have stolen almost $400 million worth of cryptocurrency from seven hacked companies over the course of 2021, up from the $300 million they stole from four companies the year before.
Capturing RDP NetNTLMv2 Hashes: Attack details and a Technical How-To Guide https://www.gosecure.net/blog/2022/01/17/capturing-rdp-netntlmv2-hashes-attack-details-and-a-technical-how-to-guide/
GoSecure
24/7 managed detection, response, and expert cybersecurity services - GoSecure
We provide around-the-clock threat detection and incident response, backed by expert consulting to keep your organization secure.
How to Securely Implement TLS Certificate Checking in Android Apps https://www.guardsquare.com/blog/how-to-securely-implement-tls-certificate-checking-in-android-apps
Guardsquare
How to Implement Android TLS Certificate Checking | Guardsquare
Learn how to avoid TLS certificate issues and tighten the security process using certificate and SSL pinning and certificate transparency on android.
reFlutter - Flutter Reverse Engineering Framework https://www.kitploit.com/2022/01/reflutter-flutter-reverse-engineering.html
KitPloit - PenTest & Hacking Tools
reFlutter - Flutter Reverse Engineering Framework