Writing a Wireshark dissector to parse data embedded in ICMP headers https://medium.com/@kevin.massey1189/writing-a-wireshark-dissector-to-parse-data-embedded-in-icmp-headers-1f039cd4072d
Medium
Writing a Wireshark dissector to parse data embedded in ICMP headers
I recently spent some time repurposing fields in ICMP headers in order to do a basic file transfer. I decided to use the code, ID, and…
What Is Peppering in Password Security and How Does It Work? https://www.makeuseof.com/what-is-peppering-how-does-it-work/
MUO
What Is Peppering in Password Security and How Does It Work?
You've probably heard about salting passwords, but a further technique, peppering, makes them even more secure. Here's how.
Static unpacker and decoder for Hello Kitty Packer https://medium.com/proferosec-osm/static-unpacker-and-decoder-for-hello-kitty-packer-91a3e8844cb7
Medium
Static unpacker and decoder for Hello Kitty Packer
During a recent incident response engagement, the Profero IR team observed a sample of Hello Kitty ransomware. This version of ransomware…
Remote Code Execution via VirusTotal Platform https://www.cysrc.com/blog/virus-total-blog/
Cysrc
CySource Cyber Workforce Development Platform
Continuously train and measure your entire workforce
Making Your Neural Network Say “I Don’t Know” — Bayesian NNs using Pyro and PyTorch https://towardsdatascience.com/making-your-neural-network-say-i-dont-know-bayesian-nns-using-pyro-and-pytorch-b1c24e6ab8cd
Medium
Making Your Neural Network Say “I Don’t Know” — Bayesian NNs using Pyro and PyTorch
A tutorial + code on writing a bayesian image classifier on MNIST dataset.
DFSpot-Deepfake-Recognition: Determine whether a given video sequence has been manipulated or synthetically generated https://github.com/chinmaynehate/DFSpot-Deepfake-Recognition
GitHub
GitHub - chinmaynehate/DFSpot-Deepfake-Recognition: Determine whether a given video sequence has been manipulated or synthetically…
Determine whether a given video sequence has been manipulated or synthetically generated - chinmaynehate/DFSpot-Deepfake-Recognition
Introduction: Vulnerable Lambdas in the Wild https://rhinosecuritylabs.com/cloud-security/cloudgoat-vulnerable-lambda-functions/
Rhino Security Labs
CloudGoat goes Serverless: A walkthrough of Vulnerable Lambda Functions
This post walks through exploiting serverless environments and AWS Lambda functions via the CloudGoat vulnerable_lambda scenario.
Writing a Linux Kernel Remote in 2022 https://blog.immunityinc.com/p/writing-a-linux-kernel-remote-in-2022/
Anatomy of a Zero Day - How to decrypt....a robot? https://dolosgroup.io/blog/2022/4/28/anatomy-of-a-zero-day-how-to-decrypt-a-robot
Dolos Group
Anatomy of a Zero Day - How to decrypt....a robot? — Dolos Group
That title would have sounded very weird to me a year ago but that’s exactly what happened. Let me walk you through how we were approached by a client for a code review, had to find a zero day just to get started (CVE-2022-29856), and ultimately “decrypted…
Malicious relays and the health of the Tor network https://blog.torproject.org/malicious-relays-health-tor-network/
blog.torproject.org
Malicious relays and the health of the Tor network | Tor Project
In this post, we'll explain what we do to fight malicious relays in our network, how we did in the past, and what further improvements are upcoming and being worked on.
Azure Monitor – Malicious KQL Query https://securecloud.blog/2022/04/27/azure-monitor-malicious-kql-query/
SecureCloudBlog
Azure Monitor – Malicious KQL Query
Malicious KQL Query: Malicious KQL query is injection technique, where attacker with targetable workspace resourceID can inject listener of access tokens in the query. The attacker then uses the ga…
Colibri Loader's unique Persistence Technique using Get-Variable cmdlet https://fourcore.io/blogs/colibri-loader-powershell-get-variable-persistence
FourCore
Colibri Loader's unique Persistence Technique using Get-Variable cmdlet
Colibri Loader uses a novel method of Persistence which makes use of Get-Variable cmdlet to run its executable every time powershell is launched. Here we cover the method, why it works, and how to detect such TTPs.
Kubernetes Cluster: Attack and Defense Perspective Part-2
Importance of Network Policies https://smart7.in/2022/03/30/Kubernetes-Cluster-Attack-Defense-Importance-of-Network-Policies.html
Importance of Network Policies https://smart7.in/2022/03/30/Kubernetes-Cluster-Attack-Defense-Importance-of-Network-Policies.html
smart7.in
Kubernetes Cluster: Attack and Defense Perspective Part-2 - Security Blogs
Hi all,
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn https://www.microsoft.com/security/blog/2022/04/26/microsoft-finds-new-elevation-of-privilege-linux-vulnerability-nimbuspwn/
Microsoft News
Microsoft finds new elevation of privilege Linux vulnerability, Nimbuspwn
Microsoft has discovered several vulnerabilities, collectively referred to as Nimbuspwn, that could be chained together, allowing an attacker to elevate privileges to root on many Linux desktop endpoints. Leveraging Nimbuspwn as a vector for root access could…
Quantum Ransomware https://thedfirreport.com/2022/04/25/quantum-ransomware/
The DFIR Report
Quantum Ransomware
In one of the fastest ransomware cases we have observed, in under four hours the threat actors went from initial access, to domain wide ransomware. The initial access vector for this case was an Ic…
Introduction to VirtualBox security research https://blog.doyensec.com/2022/04/26/vbox-fuzzing.html
Doyensec
Introduction to VirtualBox security research
This article introduces VirtualBox research and explains how to build a coverage-based fuzzer, focusing on the emulated network device drivers. In the examples below, we explain how to create a harness for the non-default network device driver PCNet. The…
CVE-2022-0543 Technical Analysis https://attackerkb.com/topics/wyA1c1HIC8/cve-2022-0543/rapid7-analysis
AttackerKB
CVE-2022-0543 | AttackerKB
It was discovered, that redis, a persistent key-value database, due to a packaging issue, is prone to a (Debian-specific) Lua sandbox escape, which could resul…
Emotet fixes bug in code, resumes spam campaign https://blog.malwarebytes.com/cybercrime/malware/2022/04/emotet-fixes-bug-in-code-resumes-spam-campaign/
Malwarebytes
Emotet fixes bug in code, resumes spam campaign
Emotet is back with a new spam campaign. And it's now spreading itself as a shortcut link file pretending to be Word document.
A flow-based IDS using Machine Learning in eBPF https://arxiv.org/abs/2102.09980#
RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface https://www.hindawi.com/journals/wcmc/2022/5311295
Hindawi
As the main routing device of the network, most routers can be set up and managed through their web enabled admin portal. This…
RW-Fuzzer: A Fuzzing Method for Vulnerability Mining on Router Web Interface