Frelatage is a coverage-based Python fuzzing library which can be used to fuzz python code https://github.com/Rog3rSm1th/Frelatage
GitHub
GitHub - Rog3rSm1th/frelatage: Coverage-based fuzzer for python applications
Coverage-based fuzzer for python applications. Contribute to Rog3rSm1th/frelatage development by creating an account on GitHub.
Reversing Raw Binary Firmware Files in Ghidra https://gist.github.com/nstarke/ed0aba2c882b8b3078747a567ee00520
Gist
Reversing Cisco IOS Raw Binary Firmware Images with Ghidra
Reversing Cisco IOS Raw Binary Firmware Images with Ghidra - 01-reversing-cisco-ios-raw-binary-firmware-images-with-ghidra.md
New Unix rootkit used to steal ATM banking data https://www.bleepingcomputer.com/news/security/new-unix-rootkit-used-to-steal-atm-banking-data/
BleepingComputer
New Unix rootkit used to steal ATM banking data
Threat analysts following the activity of LightBasin, a financially motivated group of hackers, report the discovery of a previously unknown Unix rootkit that is used to steal ATM banking data and conduct fraudulent transactions.
Hacking the Hive: Discovering Vulnerabilities in Aerohive Devices https://research.aurainfosec.io/hacking-the-hive/
research.aurainfosec.io
Hacking the Hive: Discovering Vulnerabilities in Aerohive Devices
Learn how to write your own firmware for Aerohive devices! With a bonus side order of some remote code execution!
A journey into IoT – Unknown Chinese alarm – Part 1 – Discover components and ports https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-1-discover-components-and-ports/
hn security
A journey into IoT - Unknown Chinese alarm - Part 1 - Discover components and ports - hn security
Disclaimer: as many other security researchers […]
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 2) https://connormcgarr.github.io/type-confusion-part-2/
Connor McGarr’s Blog
Exploit Development: Browser Exploitation on Windows - CVE-2019-0567, A Microsoft Edge Type Confusion Vulnerability (Part 2)
Leveraging ChakraCore to convert our denial-of-service from part 1 into a read/write primtive and functioning exploit.
Threads, Threads, and More Threads
https://scorpiosoftware.net/2022/03/21/threads-threads-and-more-threads/
https://scorpiosoftware.net/2022/03/21/threads-threads-and-more-threads/
Pavel Yosifovich
Threads, Threads, and More Threads
Looking at a typical Windows system shows thousands of threads, with process numbers in the hundreds, even though the total CPU consumption is low, meaning most of these threads are doing nothing m…
Testing EDRs for Linux — Things I wish I knew before getting started https://medium.com/@matuzg/testing-edrs-for-linux-things-i-wish-i-knew-before-getting-started-3ab15112c183
Medium
Testing EDRs for Linux — Things I wish I knew before getting started
Thoughts on how to simplify your tests while keeping it real and a realistic, easy to expand initial access case.
Bypassing UAC in the most Complex Way Possible! https://www.tiraniddo.dev/2022/03/bypassing-uac-in-most-complex-way.html
www.tiraniddo.dev
Bypassing UAC in the most Complex Way Possible!
While it's not something I spend much time on, finding a new way to bypass UAC is always amusing. When reading through some of the features ...
LTrack: Stealthy Tracking of Mobile Phones in LTE https://www.usenix.org/conference/usenixsecurity22/presentation/kotuliak
Speek: Privacy focused messenger that doesn't trust anyone with your identity, your contact list, or your communications https://github.com/Speek-App/Speek
GitHub
GitHub - Speek-App/Speek: Privacy focused messenger that doesn't trust anyone with your identity, your contact list, or your communications
Privacy focused messenger that doesn't trust anyone with your identity, your contact list, or your communications - Speek-App/Speek
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed https://www.splunk.com/en_us/blog/security/gone-in-52-seconds-and-42-minutes-a-comparative-analysis-of-ransomware-encryption-speed.html
Splunk
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed | Splunk
With the release of SURGe's new ransomware research, Splunker Shannon Davis shares a closer look into measuring how fast ransomware encrypts files.
Leveraging Intel DCI for Memory Forensics https://www.forensicfocus.com/webinars/leveraging-intel-dci-for-memory-forensics/
Forensic Focus
Leveraging Intel DCI for Memory Forensics - Forensic Focus
Hello, and welcome to my DFRWS US 2021 talk about leveraging Intel DCI for memory forensics. My name is Tobias ... Read more
Heap Overflow in OpenBSD's slaacd via Router Advertisement https://blog.quarkslab.com/heap-overflow-in-openbsds-slaacd-via-router-advertisement.html
Quarkslab's blog
Heap Overflow in OpenBSD's slaacd via Router Advertisement
In this blog post we analyze a heap overflow vulnerability we discovered in the IPv6 stack of OpenBSD, more specifically in its slaacd daemon. This issue, whose root cause can be found in the mishandling of Router Advertisement messages containing a DNSSL…
Remote Code Execution on Western Digital PR4100 NAS (CVE-2022-23121) https://research.nccgroup.com/2022/03/24/remote-code-execution-on-western-digital-pr4100-nas-cve-2022-23121/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Racing against the clock -- hitting a tiny kernel race window https://googleprojectzero.blogspot.com/2022/03/racing-against-clock-hitting-tiny.html
projectzero.google
Racing against the clock -- hitting a tiny kernel race window - Project Zero
TL;DR: How to make a tiny kernel race window really large even on kernels without CONFIG_PREEMPT:use a cache miss to widen the race window a little bit...
Finding bugs to trigger Unauthenticated Command Injection in a NETGEAR router (PSV-2022–0044) https://flattsecurity.medium.com/finding-bugs-to-trigger-unauthenticated-command-injection-in-a-netgear-router-psv-2022-0044-2b394fb9edc
Medium
Finding bugs to trigger Unauthenticated Command Injection in a NETGEAR router (PSV-2022–0044)
How I found various vulnerabilities and chained some of the vulnerabilities into an unauthenticated command execution in NETGEAR WAC124.
What to look for when reviewing a company's infrastructure
https://www.marcolancini.it/2022/blog-cloud-security-infrastructure-review/
https://www.marcolancini.it/2022/blog-cloud-security-infrastructure-review/
Operation Dragon Castling: APT group targeting betting companies https://decoded.avast.io/luigicamastra/operation-dragon-castling-apt-group-targeting-betting-companies/
Gendigital
Operation Dragon Castling: APT group targeting betting companies
APT Targets Betting Firms Clandestinely
zer0pts ctf 2022 - Flag Checker https://suvaditya.one/blog/zer0pts-flag-checker/
x0r19x91
zer0pts ctf 2022 - Flag Checker
Writeup of reversing task Flag Checker