Looney Tunables Vulnerability Exploited by Kinsing https://blog.aquasec.com/loony-tunables-vulnerability-exploited-by-kinsing
Aqua
Looney Tunables Vulnerability Exploited by Kinsing
We intercepted Kinsing's experimental incursions into cloud environments and have uncovered their efforts to manipulate the Looney Tunables vulnerability.
BlueKeep: A Journey from DoS to RCE (CVE-2019-0708) https://malwaretech.com/2019/09/bluekeep-a-journey-from-dos-to-rce-cve-2019-0708.html
Malwaretech
BlueKeep: A Journey from DoS to RCE (CVE-2019-0708)
Due to the serious risk of a BlueKeep based worm, I’ve held back this write-up to avoid advancing the timeline. Now that a proof-of-concept for RCE (remote code execution) has been release as part of Metasploit, i feel it’s now safe for me to post this.
…
…
🔥1
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x0-debugging.html
K3170Makan
[Linux Kernel Exploitation 0x0] Debugging the Kernel with QEMU
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security
Nice series here >> "The toddler’s introduction to Heap exploitation (Part 1)" https://infosecwriteups.com/the-toddlers-introduction-to-heap-exploitation-part-1-515b3621e0e8
Medium
The toddler’s introduction to Heap exploitation (Part 1)
In my introductory post I had been talking about dynamic memory allocation and I referenced various solutions that are used to tackle this…
👍1
[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel https://blog.k3170makan.com/2020/11/linux-kernel-exploitation-0x1-smashing.html
K3170Makan
[Linux Kernel Exploitation 0x1] Smashing Stack Overflows in the Kernel
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security
[Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow https://blog.k3170makan.com/2021/01/linux-kernel-exploitation-0x2.html
K3170Makan
[Linux Kernel Exploitation 0x2] Controlling RIP and Escalating privileges via Stack Overflow
Hacking,Information Security,Penetration Testing,Google Hacking,Google Dorking,Keith Makan,Black Hat,Security Research,InfoSec,Web Site Security
The toddler’s introduction to Heap Exploitation, House of Lore(Part 4.5) https://infosecwriteups.com/the-toddlers-introduction-to-heap-exploitation-house-of-lore-part-4-5-1b5865297057
Medium
The toddler’s introduction to Heap Exploitation, House of Lore(Part 4.5)
Similarly to other heap exploitation attacks that we saw so far, the idea behind the House of Lore (HoL) is to trick malloc to return a…
🤯2
LocalPotato - When Swapping The Context Leads You To SYSTEM https://www.localpotato.com/localpotato_html/LocalPotato.html
Localpotato
LocalPotato - When Swapping The Context Leads You To SYSTEM
Here we are again with our new *potato flavor, the LocalPotato! This was a cool finding so we decided to create this dedicated website ;)
Bluetooth LE Spam: create Phantom Bluetooth Device Advertisements (for Android) https://github.com/simondankelmann/Bluetooth-LE-Spam
GitHub
GitHub - simondankelmann/Bluetooth-LE-Spam
Contribute to simondankelmann/Bluetooth-LE-Spam development by creating an account on GitHub.
PPLFault: TOCTOU in Windows Code Integrity to achieve arbitrary code execution as WinTcb-Light then dump a specified process https://github.com/gabriellandau/PPLFault
GitHub
GitHub - gabriellandau/PPLFault
Contribute to gabriellandau/PPLFault development by creating an account on GitHub.
Fuzzer Development: The Soul of a New Machine https://h0mbre.github.io/New_Fuzzer_Project/
The Human Machine Interface
Fuzzer Development 1: The Soul of a New Machine
Introduction && Credit to Gamozolabs For a long time I’ve wanted to develop a fuzzer on the blog during my weekends and freetime, but for one reason or another, I could never really conceptualize a project that would be not only worthwhile as an educational…
Persistence – Windows Telemetry https://pentestlab.blog/2023/11/06/persistence-windows-telemetry/
Penetration Testing Lab
Persistence – Windows Telemetry
Microsoft has introduced the compatibility telemetry in order to collect usage and performance data about Windows systems. The telemetry tasks are collected via the binary “CompatTelRunner.ex…
First handset with MTE on the market https://googleprojectzero.blogspot.com/2023/11/first-handset-with-mte-on-market.html
Blogspot
First handset with MTE on the market
By Mark Brand, Google Project Zero Introduction It's finally time for me to fulfill a long-standing promise. Since I first heard about ...
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup.html
security-research
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
A Tale of 2 Vulnerability Disclosures https://projectblack.io/blog/a-tale-of-2-vulnerability-disclosures/
Research Blog | Project Black
Why You Need a Vulnerability Disclosure Program (VDP)
You're out for a stroll and spot a house with its front door wide open. Out of concern, you try to inform the owner about the door. Unexpectedly, the owner snaps back, insisting the door is shut. This is a story about the worst vulnerability disclosure process…
🥱1
Reveal security issues in OPC UA applications https://opalopc.com/
Opalopc
OPC UA Vulnerability Scanner | OpalOPC
Reveal Security Issues in your Most Critical Systems.
D0nut encrypt me, I have a wife and no backups https://research.nccgroup.com/2023/11/06/d0nut-encrypt-me-i-have-a-wife-and-no-backups/
Nccgroup
Cyber Security Research
Cutting-edge cyber security research from NCC Group. Find public reports, technical advisories, analyses, & other novel insights from our global experts.
Visual Studio Code Security: Deep Dive into Your Favorite Editor (1/3) https://www.sonarsource.com/blog/visual-studio-code-security-deep-dive-into-your-favorite-editor/
Sonarsource
Visual Studio Code Security: Deep Dive into Your Favorite Editor (1/3)
We took a look at the security of the most popular code editor, Visual Studio Code! This blog post covers common risks and attack surfaces so you know what to expect when using it.
PRTG Remote Code Execution - CVE-2023-32782 https://baldur.dk/blog/prtg-rce.html
baldur.dk
BALDUR. - Security Consultancy
This post details the process of exploiting CVE-2023-32782 in PRTG to gain remote code execution.
Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections https://www.theregister.com/2023/11/08/europe_eidas_browser/
The Register
Bad eIDAS: Europe ready to intercept, spy on your encrypted HTTPS connections
EFF warns incoming rules may return web 'to the dark ages of 2011'