HTML Smuggling Leads to Domain Wide Ransomware https://thedfirreport.com/2023/08/28/html-smuggling-leads-to-domain-wide-ransomware/
The DFIR Report
HTML Smuggling Leads to Domain Wide Ransomware
We’ve previously reported on a Nokoyawa ransomware case in which the initial access was via an Excel macro and IcedID malware. This case, which also ended in Nokoyawa Ransomware, involved the…
Grave flaws in BGP Error handling https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
blog.benjojo.co.uk
Grave flaws in BGP Error handling
Kinsing Malware Exploits Novel Openfire Vulnerability https://blog.aquasec.com/kinsing-malware-exploits-novel-openfire-vulnerability
Aqua
Kinsing Malware Exploits Novel Openfire Vulnerability
A new attack exploits the novel Openfire vulnerability (CVE-2023-32315) to deploy Kinsing malware and crypto miners to gain full control over the server.
Getting into AWS cloud security research as a n00bcake https://dagrz.com/writing/aws-security/getting-into-aws-security-research/
NosyMonkey: API hooking and code injection made easy! https://www.anvilsecure.com/blog/nosymonkey.html
Anvil Secure
NosyMonkey: API hooking and code injection made easy! - Anvil Secure
As a researcher I often run into situations in which I need to make a compiled binary do things that it wouldn’t normally do or change the way it works in some way. Of course, if one…
👍1
Lateral movement: A conceptual overview https://diablohorn.com/2023/08/22/lateral-movement-a-conceptual-overview/
DiabloHorn
Lateral movement: A conceptual overview
I’ve often been in the situation of explaining lateral movement to people who do not work in the offensive security field on a daily basis or have a different level of technical understanding…
A Deep Dive into Brute Ratel C4 payloads https://cybergeeks.tech/a-deep-dive-into-brute-ratel-c4-payloads/
Introducing Session Hijacking Visual Exploitation (SHVE): An Innovative Open-Source Tool for XSS Exploitation https://blog.doyensec.com/2023/08/31/introducing-session-hijacking-visual-exploitation.html
Doyensec
Introducing Session Hijacking Visual Exploitation (SHVE): An Innovative Open-Source Tool for XSS Exploitation
Greetings, folks! Today, we’re thrilled to introduce you to our latest tool: Session Hijacking Visual Exploitation, or SHVE. This open-source tool, now available on our GitHub, offers a novel way to hijack a victim’s browser sessions, utilizing them as a…
SSD Advisory – File History Service (fhsvc.dll) Elevation of Privilege https://ssd-disclosure.com/ssd-advisory-file-history-service-fhsvc-dll-elevation-of-privilege/
SSD Secure Disclosure
SSD Advisory - File History Service (fhsvc.dll) Elevation of Privilege - SSD Secure Disclosure
Summary A vulnerability in Windows’s File History Service allows local users to gain elevated privileges on the Windows operating system. Credit An independent security researcher working with SSD Secure Disclosure, the vulnerability was one of the winners…
China-linked Cybercriminals Bypass Barracuda’s Security Patch https://deform.co/china-linked-cybercriminals-bypass-barracudas-security-patch/
👍1
How attackers fingerprint your WordPress website https://blog.sicuranext.com/how-attackers-fingerprint-your-wordpress-website/
Sicuranext Blog
How attackers fingerprint your WordPress website
Attackers have quite a few sneaky ways to gather information from your WordPress website. They can get their hands on details like the WordPress version you're using, the active plugins and their versions, and even info about your active users. In this article…
👍2
Arbitrary Configuration Injection https://sim4n6.beehiiv.com/p/arbitrary-configuration-injection
Query Chronicles
Arbitrary Configuration Injection
ASN Lookup Tool and Traceroute Server https://github.com/nitefood/asn
GitHub
GitHub - nitefood/asn: ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation…
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server - ni...
👍1
When URL parsers disagree (CVE-2023-38633) https://www.canva.dev/blog/engineering/when-url-parsers-disagree-cve-2023-38633/
canva.dev
When URL parsers disagree (CVE-2023-38633) - Canva Engineering Blog
Discovery and walkthrough of CVE-2023-38633 in librsvg, when two URL parser implementations (Rust and Glib) disagree on file scheme parsing leading to path traversal.
Apache Superset Part II: RCE, Credential Harvesting and More https://www.horizon3.ai/apache-superset-part-ii-rce-credential-harvesting-and-more/
Horizon3.ai
Apache Superset Part II: RCE, Credential Harvesting and More
Apache Superset is a popular open source data exploration and visualization tool. In a previous post, we disclosed a vulnerability, CVE-2023-27524, affecting thousands of Superset servers on the Internet, that enables unauthorized attackers to gain admin…
DogeRAT Malware Strikes India: Tracks Locations, Makes Unauthorized Payments https://deform.co/dogerat-malware-strikes-india/
Deform
DogeRAT Malware Strikes India: Tracks Locations, Makes Unauthorized Payments - Deform
Indian Android users are under threat from DogeRAT, a malicious software that illicitly accesses critical data, including banking information, contacts, and
CVE-2023-3959, CVE-2023-4249 - Multiple critical vulnerabilities in Zavio IP cameras https://bugprove.com/knowledge-hub/cve-2023-3959-cve-2023-4249-multiple-critical-vulnerabilities-in-zavio-ip-cameras/
Bugprove
CVE-2023-3959, CVE-2023-4249 - Multiple critical vulnerabilities in Zavio IP cameras
BugProve uncovers seven pre-authentication remote code execution flaws and 26 post-authentication code execution vectors in Zavio IP cameras. Despite repeated warnings, Zavio remained unresponsive, necessitating intervention from CISA.
Nagios Plugins: Hacking Monitored Servers with check_by_ssh and Argument Injection: CVE-2023-37154 https://joshua.hu/nagios-hacking-cve-2023-37154
Joshua.Hu Joshua Rogers’ Scribbles
Nagios Plugins: Hacking Monitored Servers with check_by_ssh and Argument Injection: CVE-2023-37154
Nagios-compatible systems are some of the most widely used infrastructure monitoring solutions. They use “plugins” to monitor server performance, with “Nagios Core” interpreting results. However, there’s a potentially significant security issue with Nagios…
Reverse Engineering Yaesu FT-70D Firmware Encryption https://landaire.net/reversing-yaesu-firmware-encryption/
landaire.net
Reverse Engineering Yaesu FT-70D Firmware Encryption
nothing interesting