CVE-2022-31813: Forwarding addresses is hard https://www.synacktiv.com/publications/cve-2022-31813-forwarding-addresses-is-hard.html
Synacktiv
CVE-2022-31813: Forwarding addresses is hard
Extracting Ghidra Decompiler Output with Python https://medium.com/tenable-techblog/extracting-ghidra-decompiler-output-with-python-a737e9ed8fce
Medium
Extracting Ghidra Decompiler Output with Python
Ghidra’s decompiler, while not perfect, is pretty darn handy. Ghidra’s user interface, however, leaves a lot to be desired. I often find…
Manipulating Windows Tokens with Go https://fourcore.io/blogs/manipulating-windows-tokens-with-golang
FourCore
Manipulating Windows Tokens with Go
Windows Tokens are used for authentication and assigning privileges to windows programs. Understanding token manipulation is essential to detect malicious behaviours. Security professionals can use the wintoken library for token manipulation.
CVE-2022-36123 – A vulnerability in Linux kernel mainline v5.18-rc1 through v5.19-rc6 https://sick.codes/sick-2022-128/
Sick Codes - Security Research, Hardware & Software Hacking, Consulting, Linux, IoT, Cloud, Embedded, Arch, Tweaks & Tips!
CVE-2022-36123 - A vulnerability in Linux kernel mainline v5.18-rc1 through v5.19-rc6 does not clear statically allocated variables…
Title A vulnerability in Linux kernel mainline v5.18-rc1 through v5.19-rc6 does not clear statically allocated variables in the block starting symbol (.bss) due to a failed early_xen_iret_patch leading to an asm_exc_page_fault, or arbitrary code execution…
Corrupting memory without memory corruption https://github.blog/2022-07-27-corrupting-memory-without-memory-corruption/
The GitHub Blog
Corrupting memory without memory corruption
In this post I’ll exploit CVE-2022-20186, a vulnerability in the Arm Mali GPU kernel driver and use it to gain arbitrary kernel memory access from an untrusted app on a Pixel 6. This then allows me to gain root and disable SELinux. This vulnerability highlights…
DDoS Attack Case Study: 20 Hours of Unprovoked Aggression https://blog.criminalip.io/2022/07/27/ddos-attack-case/
CIP Blog
DDoS Attack Case Study: 20 Hours of Unprovoked Aggression
Recently, there was a GET Flooding Attack-type DDoS attack case on a web services company for about 20 hours. Various attack traffic was detected on the login page, which caused a serious load on the server and ultimately paralyzed the entire login function.…
Creating Processes Using System Calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
https://www.coresecurity.com/core-labs/articles/creating-processes-using-system-calls
Coresecurity
Creating Processes Using System Calls | Core Security
This article discusses weaponizing NtCreateUserProcess so that it can be used on defended environments in a way that is reliable and useful.
Inside Matanbuchus: A Quirky Loader https://www.cyberark.com/resources/threat-research-blog/inside-matanbuchus-a-quirky-loader
Cyberark
Inside Matanbuchus: A Quirky Loader
An in-depth analysis of Matanbuchus loader’s tricks and loading techniques Matanbuchus is a Malware-as-a-Service loader that has been sold on underground markets for more than one year....
A journey into IoT – Unknown Chinese alarm – Part 3 – Radio communications https://security.humanativaspa.it/a-journey-into-iot-unknown-chinese-alarm-part-3-radio-communications/
hn security
A journey into IoT - Unknown Chinese alarm - Part 3 - Radio communications - hn security
Disclaimer: as many other security researchers […]
A Detailed Analysis of the RedLine Stealer https://securityscorecard.com/research/detailed-analysis-redline-stealer
SecurityScorecard
A Detailed Analysis of the RedLine Stealer
RedLine is a stealer distributed as cracked games, applications, and services. See how this malware affected FileZilla, Telegram, and more.
NIST SIKE finalist for quantum safe crypto has been broken by a very efficient classical computer attack https://eprint.iacr.org/2022/975.pdf
Cryptominer detection: a Machine Learning approach https://sysdig.com/blog/how-train-crypto-miner-detection-model/
Sysdig
Cryptominer detection: a Machine Learning approach – Sysdig
Cryptominers are one of the main cloud threats today. Detecting crypto miners is a complex task, but machine learning could help to develop a robust detection algorithm.
Concealed code execution: Techniques and detection https://www.huntandhackett.com/blog/concealed-code-execution-techniques-and-detection
Huntandhackett
Concealed code execution: Techniques and detection
After months of dedicated research we cover a wide range of concealed code execution techniques and investigate their mechanisms and how to detect them.
Targeted attack on industrial enterprises and public institutions https://ics-cert.kaspersky.com/publications/reports/2022/08/08/targeted-attack-on-industrial-enterprises-and-public-institutions/
Kaspersky ICS CERT | Kaspersky Industrial Control Systems Cyber Emergency Response Team
Targeted attack on industrial enterprises and public institutions | Kaspersky ICS CERT
The attackers were able to penetrate dozens of enterprises and even hijack the IT infrastructure of some, taking control of systems used to manage security solutions. The goal of this series of attacks was cyberespionage.
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks https://blog.reversinglabs.com/blog/threat-analysis-follina-exploit-powers-live-off-the-land-attacks
ReversingLabs
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks
An analysis of three in-the-wild payloads delivered using the Follina exploit shows how attackers can boost efforts to avoid detection by security tools.
Enhancing Subdomain Enumeration - ENTs and NOERROR https://www.securesystems.de/blog/enhancing-subdomain-enumeration-ents-and-noerror/
Detecting DNS implants: Old kitten, new tricks – A Saitama Case Study https://research.nccgroup.com/2022/08/11/detecting-dns-implants-old-kitten-new-tricks-a-saitama-case-study/
Researching Xiaomi’s TEE to get to Chinese money https://research.checkpoint.com/2022/researching-xiaomis-tee/
Check Point Research
Researching Xiaomi’s TEE to get to Chinese money - Check Point Research
Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the latest statistics, the Far East and China accounted for two-thirds…