reFlutter - Flutter Reverse Engineering Framework https://www.kitploit.com/2022/01/reflutter-flutter-reverse-engineering.html
KitPloit - PenTest & Hacking Tools
reFlutter - Flutter Reverse Engineering Framework
Vulnerable AWS Lambda function – Initial access in cloud attacks https://sysdig.com/blog/exploit-mitigate-aws-lambdas-mitre/
Sysdig
Lambda Threat – Best Practices for Lambda Security | Sysdig
The security research team explains the attack scenario with a vulnerable AWS Lambda function could be a threat used by attackers.
CVE-2022-21661: Exposing Database Info via WordPress SQL Injection https://www.zerodayinitiative.com/blog/2022/1/18/cve-2021-21661-exposing-database-info-via-wordpress-sql-injection
Zero Day Initiative
Zero Day Initiative — CVE-2022-21661: Exposing Database Info via WordPress SQL Injection
In October of this year, we received a report from ngocnb and khuyenn from GiaoHangTietKiem JSC covering a SQL injection vulnerability in WordPress. The bug could allow an attacker to expose data stored in a connected database. This vulnerability was recently…
Analysis of Destructive Malware (WhisperGate) targeting Ukraine https://medium.com/s2wblog/analysis-of-destructive-malware-whispergate-targeting-ukraine-9d5d158f19f3
Medium
Analysis of Destructive Malware (WhisperGate) targeting Ukraine
BLKSMTH | S2W TALON
A Beginner’s guide into Router Hacking and Firmware Emulation https://secnigma.wordpress.com/2022/01/18/a-beginners-guide-into-router-hacking-and-firmware-emulation/
SecNigma
A Beginner’s guide into Router Hacking and Firmware Emulation
Prelude This post is about the personal experiences of me; A noobie hacker- who is super new into router reversing and the challenges I had to face, the research I did and the things I had learned …
Zooming in on Zero-click Exploits https://googleprojectzero.blogspot.com/2022/01/zooming-in-on-zero-click-exploits.html
Blogspot
Zooming in on Zero-click Exploits
Posted by Natalie Silvanovich, Project Zero Zoom is a video conferencing platform that has gained popularity throughout the pandemic. U...
Analyzing an IDA Pro anti-decompilation code https://antonioparata.blogspot.com/2022/01/analyzing-ida-pro-anti-decompilation.html
Blogspot
Analyzing an IDA Pro anti-decompilation code
Twitter: @s4tan GitHub: https://github.com/enkomio/ In this post I'll analyze a piece of code that induces IDA Pro to decompile t...
Captain Hook - How (not) to look for vulnerabilities in Java applications https://www.synacktiv.com/en/publications/captain-hook-how-not-to-look-for-vulnerabilities-in-java-applications.html
Synacktiv
Captain Hook - How (not) to look for vulnerabilities in Java applications
During my 6-months intership, I developed a tool to ease vunerability research on Java applications.
MoonBounce: the dark side of UEFI firmware https://securelist.com/moonbounce-the-dark-side-of-uefi-firmware/105468/
Securelist
MoonBounce: the dark side of UEFI firmware
At the end of 2021, we inspected UEFI firmware that was tampered with to embed a malicious code we dub MoonBounce. In this report we describe how the MoonBounce implant works and how it is connected to APT41.
Have you ever wanted to learn more about cryptography? Then you may be interested in our last post about hybrid cryptography schemes: https://reversea.me/index.php/hybrid-encryption-sockets-using-crypto/ We also give an implementation for GNU/Linux sockets! (contributed by @RazviOverflow)
Telenot Complex: Insecure AES Key Generation https://x41-dsec.de/lab/blog/telenot-complex-insecure-keygen/
X41 D-Sec - Penetration Tests and Source Code Audits
Telenot Complex: Insecure AES Key Generation
CVE-2021-34600: How predictable random numbers (literally) open the door for attackers: Our discovery of a flaw in the generation of AES keys, used for both physical and remote access, in a popular alarm system’s parameterization software. Includes a proof…
A curated list of awesome resources related to executable packing https://github.com/dhondta/awesome-executable-packing
GitHub
GitHub - packing-box/awesome-executable-packing: A curated list of awesome resources related to executable packing
A curated list of awesome resources related to executable packing - packing-box/awesome-executable-packing
Analysis and utilization of CVE-2021-31956 (in Chinese) https://bbs.pediy.com/thread-271140.htm
Pediy
[原创]CVE-2021-31956分析与利用-二进制漏洞-看雪论坛-安全社区|安全招聘|bbs.pediy.com
Treat security as a risk https://blog.frankel.ch/treat-security-as-risk/
A Java geek
Treat security as a risk
Security is the poster child of a Non-Functional Requirement: most people don’t care until the proverbial fecal matter hits the rotary propeller. Consequences can range from losing reputation to legal liability to putting the business out. In my post on running…
T-Reqs-HTTP-Fuzzer - A Grammar-Based HTTP Fuzzer https://www.kitploit.com/2022/01/t-reqs-http-fuzzer-grammar-based-http.html
KitPloit - PenTest & Hacking Tools
T-Reqs-HTTP-Fuzzer - A Grammar-Based HTTP Fuzzer
CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape https://sysdig.com/blog/cve-2022-0185-container-escape/
Sysdig
CVE-2022-0185: Detecting and mitigating Linux Kernel vulnerability causing container escape | Sysdig
Linux maintainers and vendors disclosed a heap overflow vulnerability in the Linux Kernel causing DoS, escape container or elevate privileges
A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations https://lifars.com/2022/01/a-detailed-analysis-of-whispergate-targeting-ukrainian-organizations/
LIFARS, a SecurityScorecard company
A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations
Microsoft reported evidence of destructive malware targeting organizations in Ukraine starting from January 13 . The LIFARS threat intelligence team have A Detailed Analysis of WhisperGate Targeting Ukrainian Organizations
How BRATA is monitoring your bank account https://www.cleafy.com/cleafy-labs/how-brata-is-monitoring-your-bank-account
Cleafy
How BRATA is monitoring your bank account | Cleafy Labs
The mobile banking malware BRATA keeps evolving. Read here the new Technical Report, which explains in detail how it monitors banks account and how to prevent it.