Swing VPN app is a DDOS botnet https://lecromee.github.io/posts/swing_vpn_ddosing_sites/
Greek geek
Swing VPN app is a DDOS botnet
tldr: Swing VPN is using its user base to DDOS sites using its users as a an attack botnet.
Introduction It all started with a friend of mine complaining that his phone was doing a request to a specific app every few seconds. Initial assumption was that the…
Introduction It all started with a friend of mine complaining that his phone was doing a request to a specific app every few seconds. Initial assumption was that the…
👍2
Turning Google smart speakers into wiretaps for $100k https://downrightnifty.me/blog/2022/12/26/hacking-google-home.html
Matt's internet home
Turning Google smart speakers into wiretaps for $100k
I was recently rewarded a total of $107,500 by Google for responsibly disclosing security issues in the Google Home smart speaker that allowed an attacker within wireless proximity to install a "backdoor" account on the device, enabling them to send commands…
🔥2
Shell We Assemble?
Unleashing Assembly for Shellcode Execution https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
Unleashing Assembly for Shellcode Execution https://redops.at/en/blog/shell-we-assemble-unleashing-x86-inline-assembly-for-shellcode-execution
RedOps - English
.Shell We Assemble? Unleashing Assembly for Shellcode Execution - RedOps
👍2
It's vacation time, so we're going to disconnect for a while. We return in September. Have a good summer! https://media4.giphy.com/media/ToMjGppLes0ENI5osCc/giphy.gif
👍5❤2🤣1😨1
Today is the day! I hope you had a very good summer vacation, today we continue sharing interesting infosec news. Keep tuned! 😉
👍2🥰2🎉2❤1👏1
Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 2) https://v3ded.github.io/redteam/red-team-tactics-writing-windows-kernel-drivers-for-advanced-persistence-part-2
v3ded.github.io
Red Team Tactics: Writing Windows Kernel Drivers for Advanced Persistence (Part 2)
Introduction Hey everyone! Welcome back to the second part of the kernel development series. In my previous post, we briefly covered some details on setting ...
Windows Triaging with Powershell — Part 1: Parsing Event Logs https://aditya-pratap9557.medium.com/windows-triaging-with-powershell-part-1-parsing-event-logs-a6748657d150
Medium
Windows Triaging with Powershell — Part 1: Parsing Event Logs
This is the part 1 for Triaging a Windows system with Powershell. On a Windows machine, Event Logs play an important role in determining a…
❤2
Windows Triaging with Powershell — Part 2: Artifacts Collection https://aditya-pratap9557.medium.com/windows-triaging-with-powershell-part-2-artifacts-collection-d28a8a9010cd
Medium
Windows Triaging with Powershell — Part 2: Artifacts Collection
The current blog is in continuation of Part 1 of Windows Triaging with Powershell. Part 1 described how the Powershell functions can be…
👍1
Leveraging Android Permissions: A Solver Approach https://blog.thalium.re/posts/leveraging-android-permissions/
blog.thalium.re
Leveraging Android Permissions: A Solver Approach
The Android permission management system has already suffered from several vulnerabilities in the past. Such weaknesses can grant dangerous permissions to a malevolent application, an example being CALL_LOG, which gives access to all incoming and outgoing…
Cadet Blizzard emerges as a novel and distinct Russian threat actor https://www.microsoft.com/en-us/security/blog/2023/06/14/cadet-blizzard-emerges-as-a-novel-and-distinct-russian-threat-actor/
Microsoft News
Cadet Blizzard emerges as a novel and distinct Russian threat actor
Microsoft shares new details about techniques of a distinct Russian state-sponsored threat actor, now elevated to the name Cadet Blizzard.
A Truly Graceful Wipe Out https://thedfirreport.com/2023/06/12/a-truly-graceful-wipe-out/
The DFIR Report
A Truly Graceful Wipe Out
In this intrusion, dated May 2023, we observed Truebot being used to deploy Cobalt Strike and FlawedGrace (aka GraceWire & BARBWIRE) resulting in the exfiltration of data and the deployment of …
Investigating the Wink Hub 2 https://sensepost.com/blog/2023/investigating-the-wink-hub-2/
Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability https://starlabs.sg/blog/2023/06-breaking-the-code-exploiting-and-examining-cve-2023-1829-in-cls_tcindex-classifier-vulnerability/
STAR Labs
Breaking the Code - Exploiting and Examining CVE-2023-1829 in cls_tcindex Classifier Vulnerability
Background The discovery and analysis of vulnerabilities is a critical aspect of cybersecurity research. Today, we will dive into CVE-2023-1829, a vulnerability in the cls_tcindex network traffic classifier found by Valis. We will explore the process of exploiting…
TurboRand: V8 Type Confusion Private Property Leak https://ssd-disclosure.com/turborand-v8-type-confusion-private-property-leak/
SSD Secure Disclosure
TurboRand: V8 Type Confusion Private Property Leak - SSD Secure Disclosure
Introduction TurboRand is a v8 exploitation during the TyphoonCTF 2023, this challenge (a.k.a TruboFan is no Fun) centred around a TurboFan (V8’s optimising compiler) type confusion bug. For the challenge we provided contenders with multiple files: Looking…
LibreOffice Arbitrary File Write (CVE-2023-1883) https://secfault-security.com/blog/libreoffice.html
👍2
Advanced binary fuzzing using AFL++-QEMU and libprotobuf: a practical case of grammar-aware in-memory persistent fuzzing https://airbus-seclab.github.io/AFLplusplus-blogpost/
IoT devices and Linux-based systems targeted by OpenSSH trojan campaign https://www.microsoft.com/en-us/security/blog/2023/06/22/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign/
Microsoft News
IoT devices and Linux-based systems targeted by OpenSSH trojan campaign
Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.
Jormungandr: Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. https://github.com/Idov31/Jormungandr
GitHub
GitHub - Idov31/Jormungandr: Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute…
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. - GitHub - Idov31/Jormungandr: Jormungandr is a kernel implementa...
👍1
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services https://blog.thalium.re/posts/fuzzing-samsung-system-services/
THALIUM
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services
Although the Android base is open source, many different constructors customize it with their own UIs and APIs. All these additions represent an extra attack surface that can change from one phone model to another. We tried to automatically fuzz the closed…
‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust solution https://rivaltimes.com/open-mobile-phones-blocked-via-bluetooth-experts-from-tarlogic-a-spanish-cybersecurity-company-share-use-cases-for-their-bluetrust-solution/
Rival Times
‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust…
Last March, experts from the Spanish cybersecurity company Tarlogic shared their findings regarding a vulnerability in communications bluetooth used every day