corCTF 2021 Fire of Salvation Writeup: Utilizing msg_msg Objects for Arbitrary Read and Arbitrary Write in the Linux Kernel https://www.willsroot.io/2021/08/corctf-2021-fire-of-salvation-writeup.html
www.willsroot.io
corCTF 2021 Fire of Salvation Writeup: Utilizing msg_msg Objects for Arbitrary Read and Arbitrary Write in the Linux Kernel
Vulnerability Research on Low-Level Systems
1Password discloses security incident linked to Okta breach https://www.bleepingcomputer.com/news/security/1password-discloses-security-incident-linked-to-okta-breach/
BleepingComputer
1Password discloses security incident linked to Okta breach
1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant.
🤪2
Kubernetes Deployment Strategies: Blue-Green vs. Canary https://medium.com/@arton.demaku/kubernetes-deployment-strategies-blue-green-vs-canary-ddc2a367b628
Medium
Kubernetes Deployment Strategies: Blue-Green vs. Canary
Kubernetes has emerged as the go-to solution for managing containerized applications in modern software development. It offers powerful…
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966 https://www.assetnote.io/resources/research/citrix-bleed-leaking-session-tokens-with-cve-2023-4966
www.assetnote.io
Citrix Bleed: Leaking Session Tokens with CVE-2023-4966
It's time for another round Citrix Patch Diffing! Earlier this month Citrix released a security bulletin which mentioned "unauthenticated buffer-related vulnerabilities" and two CVEs. These issues affected Citrix NetScaler ADC and NetScaler Gateway.
🤪2
Best Practices for Writing Quality Vulnerability Reports https://itnext.io/best-practices-for-writing-quality-vulnerability-reports-119882422a27
Medium
Best Practices for Writing Quality Vulnerability Reports
How to write great vulnerability reports? If you’re a security consultant, penetration tester or a bug bounty hunter these tips are for…
👍3
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg https://blog.exodusintel.com/2022/12/19/linux-kernel-exploiting-a-netfilter-use-after-free-in-kmalloc-cg/
Exodus Intelligence
Linux Kernel: Exploiting a Netfilter Use-after-Free in kmalloc-cg - Exodus Intelligence
By Sergi Martinez Overview It’s been a while since our last technical blogpost, so here’s one right on time for the Christmas holidays. We describe a method to exploit a use-after-free in the Linux kernel when objects are allocated in a specific slab cache…
🤯3
Revisiting an Old Bug: File Upload to Code Execution https://www.securifera.com/blog/2023/10/25/cve-2021-27198/
Securifera
CVE-2021-27198
This article is in no way affiliated, sponsored, or endorsed with/by Visualware, Inc. All graphics are being displayed under fair use for the purposes of this article.
Revisiting an Old Bug: File Upload to Code Execution
A colleague recently contacted…
Revisiting an Old Bug: File Upload to Code Execution
A colleague recently contacted…
What Every Malware Analyst Should Know About PE Relocations https://malwareid.in/unpack/unpacking-basics/pe-relocation-table
MalwareID Unpacking Guide
PE relocation Table
The Portable Executable (PE) base relocation table is crucial in Windows executable files. It handles memory addresses for functions and data, making sure the program runs well no matter where it's loaded in memory.
👌1
Puncia - Subdomain And Exploit Hunter Powered By AI https://www.kitploit.com/2023/10/puncia-subdomain-and-exploit-hunter.html
KitPloit - PenTest & Hacking Tools
Puncia - Subdomain And Exploit Hunter Powered By AI
Inject My PDF: Prompt Injection for your Resume https://kai-greshake.de/posts/inject-my-pdf/
❤1👾1
CRLFuzz - A fast tool to scan CRLF vulnerability written in Go https://hakin9.org/crlfuzz-a-fast-tool-to-scan-crlf-vulnerability-written-in-go/
Hakin9 - IT Security Magazine
CRLFuzz - A fast tool to scan CRLF vulnerability written in Go
The installation is easy. You can download a prebuilt binary from the releases page, unpack and run! or with
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction https://www.microsoft.com/en-us/security/blog/2023/10/25/octo-tempest-crosses-boundaries-to-facilitate-extortion-encryption-and-destruction/
Microsoft News
Octo Tempest crosses boundaries to facilitate extortion, encryption, and destruction
Financially motivated threat actor Octo Tempest's evolving campaigns represent growing concern for organizations across multiple industries.
Measuring the Potential Impact of PIPEDREAM Malware OPC UA Module, MOUSEHOLE https://www.dragos.com/blog/potential-impact-of-pipedream-malware-module-mousehole/
Dragos | Industrial (ICS/OT) Cyber Security
Measuring the Potential Impact of PIPEDREAM Malware OPC UA Module, MOUSEHOLE | Dragos
Discover our testing results on an experiment named MOUSELAB, a derivation of PIPEDREAM OPC UA Module, MOUSEHOLE, to assess the impacts of its capabilities.
Issue 1458911: Security: Libxslt arbitrary file reading using document() method and external entities https://bugs.chromium.org/p/chromium/issues/detail?id=1458911
Refresh: Compromising F5 BIG-IP With Request Smuggling | CVE-2023-46747 https://www.praetorian.com/blog/refresh-compromising-f5-big-ip-with-request-smuggling-cve-2023-46747/
Praetorian
Refresh: Compromising F5 BIG-IP With Request Smuggling | CVE-2023-46747
Overview In an effort to safeguard our customers, we perform proactive vulnerability research with the goal of identifying zero-day vulnerabilities that are likely to impact the security of leading organizations. We decided to focus on the F5 BIG-IP suite…
👍1
Threat Hunting: Detecting Browser Credential Stealing [T1555.003] https://fourcore.io/blogs/threat-hunting-browser-credential-stealing
FourCore
Threat Hunting: Detecting Browser Credential Stealing [T1555.003]
Adversaries can steal credentials, cookies and other private data from browsers using various techniques. We cover how you can simulate Credential Stealing From Browser s and detect it with your security tools. Sigma Rules Inside.
From Akamai to F5 to NTLM... with love https://blog.malicious.group/from-akamai-to-f5-to-ntlm/
Malicious Group
From Akamai to F5 to NTLM... with love.
In this paper I will expose critical flaws in Akamai's implementation that lead to NTLM credential exposure. I'll demonstrate how these vulnerabilities chain across F5 infrastructure, presenting attack techniques and essential mitigations for defenders.
Pentest-Report TOR Browser & OONI https://blog.torproject.org/security-audit-report-tor-browser-ooni/TTP-01-report.pdf