TurboRand: V8 Type Confusion Private Property Leak https://ssd-disclosure.com/turborand-v8-type-confusion-private-property-leak/
SSD Secure Disclosure
TurboRand: V8 Type Confusion Private Property Leak - SSD Secure Disclosure
Introduction TurboRand is a v8 exploitation during the TyphoonCTF 2023, this challenge (a.k.a TruboFan is no Fun) centred around a TurboFan (V8’s optimising compiler) type confusion bug. For the challenge we provided contenders with multiple files: Looking…
LibreOffice Arbitrary File Write (CVE-2023-1883) https://secfault-security.com/blog/libreoffice.html
👍2
Advanced binary fuzzing using AFL++-QEMU and libprotobuf: a practical case of grammar-aware in-memory persistent fuzzing https://airbus-seclab.github.io/AFLplusplus-blogpost/
IoT devices and Linux-based systems targeted by OpenSSH trojan campaign https://www.microsoft.com/en-us/security/blog/2023/06/22/iot-devices-and-linux-based-systems-targeted-by-openssh-trojan-campaign/
Microsoft News
IoT devices and Linux-based systems targeted by OpenSSH trojan campaign
Microsoft discovered an attack using a patched version of OpenSSH to take control of impacted devices and install cryptomining malware.
Jormungandr: Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. https://github.com/Idov31/Jormungandr
GitHub
GitHub - Idov31/Jormungandr: Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute…
Jormungandr is a kernel implementation of a COFF loader, allowing kernel developers to load and execute their COFFs in the kernel. - GitHub - Idov31/Jormungandr: Jormungandr is a kernel implementa...
👍1
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services https://blog.thalium.re/posts/fuzzing-samsung-system-services/
THALIUM
The Fuzzing Guide to the Galaxy: An Attempt with Android System Services
Although the Android base is open source, many different constructors customize it with their own UIs and APIs. All these additions represent an extra attack surface that can change from one phone model to another. We tried to automatically fuzz the closed…
‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust solution https://rivaltimes.com/open-mobile-phones-blocked-via-bluetooth-experts-from-tarlogic-a-spanish-cybersecurity-company-share-use-cases-for-their-bluetrust-solution/
Rival Times
‘Open’ mobile phones blocked via Bluetooth: experts from Tarlogic, a Spanish cybersecurity company, share use cases for their BlueTrust…
Last March, experts from the Spanish cybersecurity company Tarlogic shared their findings regarding a vulnerability in communications bluetooth used every day
DNS Analyzer - Finding DNS vulnerabilities with Burp Suite https://sec-consult.com/blog/detail/dns-analyzer-finding-dns-vulnerabilities-with-burp-suite/
SEC Consult
DNS Analyzer - Finding DNS vulnerabilities with Burp Suite
A brand-new Burp Suite extension for discovering DNS vulnerabilities in web applications.
👍1
A technical analysis of the SALTWATER backdoor used in Barracuda 0-day vulnerability (CVE-2023-2868) exploitation https://cybergeeks.tech/a-technical-analysis-of-the-saltwater-backdoor-used-in-barracuda-0-day-vulnerability-cve-2023-2868-exploitation/
Why ORMs and Prepared Statements Can't (Always) Win https://www.sonarsource.com/blog/why-orms-and-prepared-statements-cant-always-win/
Sonarsource
Why ORMs and Prepared Statements Can't (Always) Win
We always assume prepared statements and ORMs are enough to protect us from SQL injection, but be careful not to misuse their APIs! Let's look into a real-world case and see what we can learn from it.
👍1
Inside KangaPack: the Kangaroo packer with native decryption https://cryptax.medium.com/inside-kangapack-the-kangaroo-packer-with-native-decryption-3e7e054679c4
Medium
Inside KangaPack: the Kangaroo packer with native decryption
In this blog post, we unpack a malicious sample sha256: 2c05efa757744cb01346fe6b39e9ef8ea2582d27481a441eb885c5c4dcd2b65b . The core…
👍1
Hashing Phone Numbers For 2-Factor Authentication https://theabbie.github.io/blog/2FA-phone-number-hashing
TheAbbie
Hashing Phone Numbers For 2-Factor Authentication
With the rise of internet and increasing risks of getting hacked, it's more than necessary nowadays that we have an extra layer of security on our accounts, since password alone is not enough. Thus, using Phone numbers for 2FA sounds much more secure, but…
👎1🤡1
Starlink星链破解那些事 https://radioactive.blog/2023/06/23/starlink_hacking/
CVE-2023-26258 – Remote Code Execution in ArcServe UDP Backup https://www.mdsec.co.uk/2023/06/cve-2023-26258-remote-code-execution-in-arcserve-udp-backup/
MDSec
CVE-2023-26258 - Remote Code Execution in ArcServe UDP Backup - MDSec
Overview During a recent adversary simulation, the MDSec ActiveBreach red team were performing a ransomware scenario, with a key objective set on compromising the organisation’s backup infrastructure. As part of...
How Residential Proxies and CAPTCHA-Solving Services Become Agents of Abuse https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/how-residential-proxies-and-captcha-solving-services-become-agents-of-abuse
Trendmicro
How Residential Proxies and CAPTCHA-Solving Services Become Agents of Abuse
This article, the first of a two-part series, provides insights on how abusers and cybercriminals use residential proxies and CAPTCHA-solving services to enable bots, scrapers, and stuffers, and proposes security countermeasures for organizations.
🤨1
Android SELinux Internals Part I https://8ksec.io/android-selinux-internals-part-i-8ksec-blogs/
8kSec - 8kSec is a cybersecurity research & training company. We provide high-quality training & consulting services.
Android SELinux Internals Part I | 8kSec Blogs - 8kSec
In Android SELinux internals Part 1 blog, explore how it provides security on Android devices and ways to bypass it. Read more to learn!
❤1👍1
How-to: Reversing and debugging ISAPI modules https://www.skullsecurity.org/2023/how-to-reversing-and-debugging-isapi-modules
SkullSecurity Blog
How-to: Reversing and debugging ISAPI modules
Recently, I had the privilege to write a detailed analysis of CVE-2023-34362, which is series of several vulnerabilities in the MOVEit file transfer application that lead to remote code execution. One of the several vulnerabilities involved an ISAPI module…
Solving Hex-Rays Challenge with Triton and TritonDSE https://farena.in/symbolic%20execution/triton/hexrays-challenge-triton/
Eduardo Blázquez's Personal Webpage
Solving Hex-Rays Challenge with Triton and TritonDSE
Triton is a library for doing Symbolic Execution, useful for doing common CTF challenges and analyzing obfuscations. TritonDSE is a library built on top of Triton which provides easy and customizable Dynamic Symbolic Execution Capabilities