Gazavat / Expiro DMSniff connection and DGA analysis https://medium.com/walmartglobaltech/gazavat-expiro-dmsniff-connection-and-dga-analysis-8b965cc0221d
Medium
Gazavat / Expiro DMSniff connection and DGA analysis
By: Jason Reaves and Joshua Platt
Hunting for Windows “Features” with Frida: DLL Sideloading https://securityintelligence.com/x-force/windows-features-dll-sideloading/
Security Intelligence
Hunting for Windows “Features” with Frida: DLL Sideloading
X-Force Red experts take a deep dive into DLL sideloading and how offensive security professionals can prevent attackers from using it.
👍1
MSMQ QueueJumper (RCE Vulnerability): An in-depth technical analysis https://securityintelligence.com/x-force/msmq-queuejumper-rce-vulnerability-technical-analysis/
Security Intelligence
MSMQ QueueJumper (RCE Vulnerability): An in-depth technical analysis
Unpack the remote code execution vulnerability impacting the Microsoft Message Queueing service — CVE-2023-21554, a.k.a. QueueJumper.
NTLM Relay https://en.hackndo.com/ntlm-relay/
hackndo
NTLM Relay
NTLM relay is a technique of standing between a client and a server to perform actions on the server while impersonating the client. Protections such as SMB signing or MIC allow to limit the actions of an attacker. This article goes into detail about this…
Leaked Secrets and Unlimited Miles: Hacking the Largest Airline and Hotel Rewards Platform https://samcurry.net/points-com/
samcurry.net
Leaked Secrets and Unlimited Miles: Hacking the Largest Airline and Hotel Rewards Platform
Between March 2023 and May 2023, we identified multiple security vulnerabilities within points.com, the backend provider for a significant portion of airline and hotel rewards programs. These vulnerabilities would have enabled an attacker to access sensitive…
Attacking JS engines: Fundamentals for understanding memory corruption crashes https://www.sidechannel.blog/en/attacking-js-engines/
www.sidechannel.blog
Attacking JS engines: Fundamentals for understanding memory corruption crashes | SideChannel – Tempest
It will be possible to better understand the Javascript structures in memory while executing code in browsers or in any other program that makes use of the most famous JS interpreters, such as Firefox, Google Chrome, Internet Explorer and Safari
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Application Patching https://infosecwriteups.com/unlocking-potential-exploring-frida-objection-on-non-jailbroken-devices-without-application-ed0367a84f07
Medium
Unlocking Potential: Exploring Frida & Objection on Non-Jailbroken Devices without Application…
As we saw in the previous article Assessing Security Risks of Local Storage on Non-Jailbroken iOS Devices that how we can install the…
nday exploit: libinput format string bug, canary leak exploit (cve-2022-1215) https://blog.coffinsec.com/nday/2022/08/04/CVE-2022-1215-libinput-fmt-canary-leak.html
hyprblog
nday exploit: libinput format string bug, canary leak exploit (cve-2022-1215)
a quick post on a format string bug in libinput I found last year but never got around to debugging, plus some exploit code to leak the stack canary on a default Xubuntu 20.04.4 system.
FortiNAC - Just a few more RCEs https://frycos.github.io/vulns4free/2023/06/18/fortinac.html
Frycos Security Diary
FortiNAC - Just a few more RCEs
FortiNAC is a zero-trust access solution that oversees and protects all digital assets connected to the enterprise network, covering devices from IT, IoT, OT/ICS to IoMT. – https://www.fortinet.com/products/network-access-control
Visualizing Qakbot Infrastructure Part II: Uncharted Territory https://www.team-cymru.com/post/visualizing-qakbot-infrastructure-part-ii-uncharted-territory
Team-Cymru
Visualizing Qakbot Infrastructure: Network Telemetry | Team Cymru
Explore Qakbot’s evolving C2 infrastructure through NetFlow analysis, revealing new servers, port trends, and insights into upstream communication layers.
Case001 Super Timeline Creation and Analysis https://dfirmadness.com/case-001-super-timeline-analysis/
DFIR Madness
Case 001 Super Timeline Analysis - DFIR Madness
Reading Time: 24 minutesCase001 Super Timeline Creation and Analysis Before Starting this lab it is strongly recommended you examine the memory, autoruns, pcap, or logs first. Come to this lab with indicators to search for. Learning Objectives of Super Timeline…
Building a Tor Hidden Service From Scratch - Part 2 - HTTP and HTTPS https://www.bentasker.co.uk/posts/documentation/linux/309-building-a-tor-hidden-service-from-scratch-part-2-http-and-https.html
www.bentasker.co.uk
Building a Tor Hidden Service From Scratch - Part 2 - HTTP and HTTPS
Despite some fairly negative media attention, not every Tor Hidden Service is (or needs to be) a hotbed of immorality. Some exist in order to allow those in restrictive countries to access things we m
Intel BIOS Advisory – Memory Corruption in HID Drivers https://research.nccgroup.com/2023/08/08/intel-bios-advisory-memory-corruption-in-hid-drivers/
Bash Privileged-Mode Vulnerabilities in Parallels Desktop and CDPATH Handling in MacOS https://www.zerodayinitiative.com/blog/2023/4/5/bash-privileged-mode-vulnerabilities-in-parallels-desktop-and-cdpath-handling-in-macos
Zero Day Initiative
Zero Day Initiative — Bash Privileged-Mode Vulnerabilities in Parallels Desktop and CDPATH Handling in MacOS
In the last few years, we have seen multiple vulnerabilities in Parallels Desktop leading to virtual machine escapes. Interested readers can check our previous blog posts about vulnerabilities across interfaces such as RDPMC hypercalls , the Parallels ToolGate…
Recovering a full PEM Private Key when half of it is redacted https://blog.cryptohack.org/twitter-secrets
CryptoHack
Recovering a full PEM Private Key when half of it is redacted
The @CryptoHack__ account was pinged today by ENOENT, with a CTF-like challenge found in the wild: Source tweet. Here’s a write-up covering how given a partially redacted PEM, the whole private key can be recovered.
NIST Drafts Major Update to Its Widely Used Cybersecurity Framework https://www.nist.gov/news-events/news/2023/08/nist-drafts-major-update-its-widely-used-cybersecurity-framework
NIST
NIST Drafts Major Update to Its Widely Used Cybersecurity Framework
NIST has revised the framework to help benefit all sectors, not just critical infrastructure.
Analysis and Exploitation of CVE-2023-3519 https://bishopfox.com/blog/analysis-exploitation-cve-2023-3519
Bishop Fox
Analysis and Exploitation of CVE-2023-3519
Bishop Fox provides additional analysis and exploitation of CVE-2023-3519, a critical remote code execution vulnerability in Citrix ADC. Learn more here!
YAMA-Yet Another Memory Analyzer for malware detection https://blogs.jpcert.or.jp/en/2023/08/yama.html
JPCERT/CC Eyes
YAMA-Yet Another Memory Analyzer for malware detection - JPCERT/CC Eyes
As attacks become more fileless and malware gets more obfuscated, it is getting more difficult to determine whether there is a malicious intent from a file by itself. For this reason, malware detection methods that utilize sandboxes and AI, as...
👍1