Introducing cmloot.py - New tooling for attacking Configuration Manager https://www.shelltrail.com/research/cmloot/
Shelltrail - Swedish offensive security experts
Introducing cmloot.py - New tooling for attacking Configuration Manager | Shelltrail - Swedish offensive security experts
cmloot.py introduces new angles to exploit Configuration Manager, which has become the new black in internal security assessments of Active Directory environments.
Predator Files: Technical deep-dive into Intellexa Alliance’s surveillance products https://securitylab.amnesty.org/latest/2023/10/technical-deep-dive-into-intellexa-alliance-surveillance-products/
Amnesty International Security Lab
Predator Files: Technical deep-dive into Intellexa Alliance's surveillance products - Amnesty International Security Lab
An expose the Intellexa Alliance's surveillance capabilities including advanced spyware, mass surveillance platforms, and tactical systems for targeting and intercepting nearby devices.
CVE-2023-22515-Scan: Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence https://github.com/ErikWynter/CVE-2023-22515-Scan
GitHub
GitHub - ErikWynter/CVE-2023-22515-Scan: Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence
Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence - ErikWynter/CVE-2023-22515-Scan
Hacking GTA V RP Servers Using Web Exploitation Techniques https://www.nullpt.rs/hacking-gta-servers-using-web-exploitation
nullpt.rs
nullpt.rs • Hacking GTA V RP Servers Using Web Exploitation Techniques
FiveM provides a powerful framework to create game experiences not otherwise possible in Grand Theft Auto. However, this power can be abused by attackers through the use of XSS in vulnerable NUI resources.
Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641) https://github.blog/2023-10-09-coordinated-disclosure-1-click-rce-on-gnome-cve-2023-43641/
The GitHub Blog
Coordinated Disclosure: 1-Click RCE on GNOME (CVE-2023-43641)
CVE-2023-43641 is a vulnerability in libcue, which can lead to code execution by downloading a file on GNOME.
EP25: How Apple/Google Pay handle card info. Also... https://blog.bytebytego.com/p/ep25-how-applegoogle-pay-handle-card
Bytebytego
EP25: How Apple/Google Pay handle card info. Also...
In this newsletter, we’ll cover the following topics:
Apple Pay vs. Google Wallet https://www.investopedia.com/articles/personal-finance/010215/apple-pay-vs-google-wallet-how-they-work.asp
Investopedia
Apple Pay vs Google Wallet: How They Work
Apple Pay and Google Wallet are mostly identical offerings. Apple may be to be easier to use, but Google has a more features.
A universal EDR bypass built in Windows 10 https://www.riskinsight-wavestone.com/en/2023/10/a-universal-edr-bypass-built-in-windows-10/
RiskInsight
A universal EDR bypass built in Windows 10 - RiskInsight
A security design failure in Windows 10 allows a malware to disable some telemetry used by EDR, thus to perform actions without raising alerts
Google mitigated the largest DDoS attack to date, peaking above 398 million rps https://cloud.google.com/blog/products/identity-security/google-cloud-mitigated-largest-ddos-attack-peaking-above-398-million-rps/
Google Cloud Blog
Google Cloud mitigated largest DDoS attack, peaking above 398 million rps | Google Cloud Blog
Google Cloud stopped the largest known DDoS attack to date, which exploited HTTP/2 stream multiplexing using the new “Rapid Reset” technique.
An Algorithm to Detect Hosting Providers
and their IP Ranges https://ipapi.is/blog/detecting-hosting-providers.html
and their IP Ranges https://ipapi.is/blog/detecting-hosting-providers.html
ipapi.is
ipapi.is - An Algorithm to Detect Hosting Providers and their IP Ranges
ipapi.is offers precise IP data via a user-friendly API, encompassing geolocation, ASN data, hosting detection, VPN detection, and proxy detection.
👍1
Security Tips & Devices for Digital Nomads https://officercia.mirror.xyz/GX0LvoKDcC12ACXzhT3F_3PVRSfEyhE8cJYMZnoia9U
How I made a heap overflow in curl https://daniel.haxx.se/blog/2023/10/11/how-i-made-a-heap-overflow-in-curl/
daniel.haxx.se
How I made a heap overflow in curl
In association with the release of curl 8.4.0, we publish a security advisory and all the details for CVE-2023-38545. This problem is the worst security problem found in curl in a long time. We set it to severity HIGH. While the advisory contains all the…
SOCKS5 heap buffer overflow https://curl.se/docs/CVE-2023-38545.html
👌1
HTTP/2 Rapid Reset Attack Impacting F5 NGINX Products https://www.f5.com/company/blog/http-2-rapid-reset-attack-impacting-f5-nginx-products
F5, Inc.
HTTP/2 Rapid Reset Attack Impacting F5 NGINX Products
Update your NGINX configuration to mitigate a possible denial-of-service attack implemented on the server-side portion of the HTTP/2 specification.
IoT Bug Hunting - Part 2 - Walkthrough of discovering command injections in firmware binaries https://bugprove.com/knowledge-hub/iot-bug-hunting-part-2-walkthrough-of-discovering-command-injections-in-firmware-binaries/
Bugprove
IoT Bug Hunting - Part 2 - Walkthrough of discovering command injections in firmware binaries
We present the steps that can lead you to another variation of an OS command injection vulnerability (CVE-2023-4249) in multiple Zavio IP camera models.
[Crypto] Length extension attack + HMAC explained https://yurichev.org/LEA/
An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit https://googleprojectzero.blogspot.com/2023/10/an-analysis-of-an-in-the-wild-ios-safari-sandbox-escape.html
Blogspot
An analysis of an in-the-wild iOS Safari WebContent to GPU Process exploit
By Ian Beer A graph representation of the sandbox escape NSExpression payload In April this year Google's Threat Analysis Group, in ...