Fixing the Volume on my Bluetooth Earbuds: A bit of reverse engineering goes a long way https://blog.ornx.net/post/bluetooth-volume-fix/
norn's blog
Fixing the Volume on my Bluetooth Earbuds
A bit of reverse engineering goes a long way
👍3
Lateral Movement: Abuse the Power of DCOM Excel Application https://posts.specterops.io/lateral-movement-abuse-the-power-of-dcom-excel-application-3c016d0d9922
Medium
Lateral Movement: Abuse the Power of DCOM Excel Application
In this post, we will talk about an interesting lateral movement technique called ActivateMicrosoftApp() method within the distributed…
33 Protection Products: Strong Defense against Ransomware and Data Stealers https://www.av-test.org/en/news/33-protection-products-strong-defense-against-ransomware-and-data-stealers/
www.av-test.org
33 Protection Products: Strong Defense against Ransomware and Data Stealers
The list of companies, universities, colleges or facilities such as hospitals and public administrations subject to attack is growing longer and longer. Classic protection products or corporate solutions must harness all their protective techniques to fend…
CVE Crowd: web app that tracks CVE mentions on Mastodon https://cvecrowd.com/
Cvecrowd
CVE Crowd | Crowd Intelligence on CVEs
Keep track of actively discussed CVEs and integrate them into your application or business!
DOM-based race condition: racing in the browser for fun https://blog.ryotak.net/post/dom-based-race-condition/
blog.ryotak.net
DOM-based race condition: racing in the browser for fun
Disclaimer
All projects mentioned in this blog post have been contacted, and I confirmed that the behavior described in this article is either working as intended, already fixed, or will not be fixed.
TL;DR
The browser loads elements in the HTML from top…
All projects mentioned in this blog post have been contacted, and I confirmed that the behavior described in this article is either working as intended, already fixed, or will not be fixed.
TL;DR
The browser loads elements in the HTML from top…
Cisco IOS XE CVE-2023-20198: Deep Dive and POC https://www.horizon3.ai/cisco-ios-xe-cve-2023-20198-deep-dive-and-poc/
Horizon3.ai
Cisco IOS XE CVE-2023-20198: Deep Dive and POC
Previously, we explored the patch for CVE-2023-20273 and CVE-2023-20198 affecting Cisco IOS XE and identified some likely vectors an attacker might have used to exploit these vulnerabilities.
How to use John the Ripper for Windows Password Cracking https://www.keshavxplore.in/2023/10/how-to-use-john-ripper-for-windows-passwords-cracking.html
Keshav Xplore
How to use John the Ripper for Windows Password Cracking
Discover John the Ripper's password-cracking prowess. Crack Windows 10, 8, and 7 passwords and extract hashes with ease.
"The EKS Cluster Games" — a cloud security Capture The Flag (CTF) event https://www.wiz.io/blog/announcing-the-eks-cluster-games
wiz.io
Announcing the EKS Cluster Games | Wiz Blog
Test your investigation skills and K8s knowledge in a new Wiz-sponsored CTF event: the EKS Cluster Games!
Fortinet Series 3 — CVE-2022–42475 SSLVPN exploit strategy https://medium.com/@INTfinitySG/fortinet-series-3-cve-2022-42475-sslvpn-exploit-strategy-2578597f892f
Medium
Fortinet Series 3 — CVE-2022–42475 SSLVPN exploit strategy
In this article, we will attempt to explain the program flow, document the heap allocation pattern observed and the strategy to exploit the
The Art of Digital Forensics Report Writing https://www.linkedin.com/pulse/art-digital-forensics-report-writing-william-oettinger-cfce-cissp-8pyuc
Linkedin
The Art of Digital Forensics Report Writing
We have all heard the saying, "If you didn't document it, it didn't happen." This rings especially true in the world of digital forensics.
MDE-DFIR-Resources: A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more. https://github.com/cyb3rmik3/MDE-DFIR-Resources
GitHub
GitHub - cyb3rmik3/MDE-DFIR-Resources: A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging…
A curated list of resources for DFIR through Microsoft Defender for Endpoint leveraging kusto queries, powershell scripts, tools such as KAPE and THOR Cloud and more. - cyb3rmik3/MDE-DFIR-Resources
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991 https://qriousec.github.io/post/vbox-pwn2own-2023/
Qrious Secure
Analysis of VirtualBox CVE-2023-21987 and CVE-2023-21991
Introduction Hi, I am Trung (xikhud). Last month, I joined Qrious Secure team as a new member, and my first target was to find and reproduce the security bugs that @bienpnn used at the Pwn2Own Vancouver 2023 to escape the VirtualBox VM.
Since VirtualBox is…
Since VirtualBox is…
👍1
CVE-2023-34050 Spring AMQP Deserialization Remote Code Execution https://blog.pyn3rd.com/2023/11/03/CVE-2023-34050-Spring-AMQP-Deserialization-Remote-Code-Execution/
Pyn3Rd
CVE-2023-34050 Spring AMQP Deserialization Remote Code Execution
PrefaceAfter analyzing Spring Kafka deserialization vulnerability, I received another piece of threat intellegence information. According to VMware official security bulletin, it implies that this v
Prioritising Vulnerabilities Remedial Actions at Scale with EPSS https://itnext.io/prioritising-vulnerabilities-remedial-actions-at-scale-with-epss-23bb60d614d9
Medium
Prioritising Vulnerabilities Remedial Actions at Scale with EPSS
In this article, I’m presenting the Exploit Prediction Scoring System, its practical use cases, and how it can be used in tandem with CVSS.
Use Wasm to Bypass Latest Chrome v8sbx Again https://medium.com/@numencyberlabs/use-wasm-to-bypass-latest-chrome-v8sbx-again-639c4c05b157
Medium
Use Wasm to Bypass Latest Chrome v8sbx Again
01 - Introduction
❤1👍1
Are you a fan of binary code? Do you associate assembler instructions with car license plates? If you research malware, forensics, or offensive security, we can offer you a funded postgraduate/postdoctoral visit (up to three months). Come with us and enjoy Spain! +info by email
🔥7🍾1
Bogus CVE follow-ups https://daniel.haxx.se/blog/2023/09/05/bogus-cve-follow-ups/
Looney Tunables Vulnerability Exploited by Kinsing https://blog.aquasec.com/loony-tunables-vulnerability-exploited-by-kinsing
Aqua
Looney Tunables Vulnerability Exploited by Kinsing
We intercepted Kinsing's experimental incursions into cloud environments and have uncovered their efforts to manipulate the Looney Tunables vulnerability.
BlueKeep: A Journey from DoS to RCE (CVE-2019-0708) https://malwaretech.com/2019/09/bluekeep-a-journey-from-dos-to-rce-cve-2019-0708.html
Malwaretech
BlueKeep: A Journey from DoS to RCE (CVE-2019-0708)
Due to the serious risk of a BlueKeep based worm, I’ve held back this write-up to avoid advancing the timeline. Now that a proof-of-concept for RCE (remote code execution) has been release as part of Metasploit, i feel it’s now safe for me to post this.
…
…
🔥1
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
K3170Makan
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security