fnoios: Redirect spawned iOS application stdout and stderr to pty https://github.com/NSEcho/fnoios
GitHub
GitHub - NSEcho/fnoios: Redirect spawned iOS application stdout and stderr to pty
Redirect spawned iOS application stdout and stderr to pty - NSEcho/fnoios
Phishing for Secrets: Operation RusticWeb Casts Net on Indian Officials https://securityonline.info/phishing-for-secrets-operation-rusticweb-casts-net-on-indian-officials/
Daily CyberSecurity
Phishing for Secrets: Operation RusticWeb Casts Net on Indian Officials
Dubbed Operation RusticWeb, this campaign, uncovered in October 2023, demonstrates a nuanced approach to cyber espionage.
Parsing MSDN for (Documented) Technique Development https://signal-labs.com/parsing-msdn-for-documented-technique-dev/
Signal Labs
Parsing MSDN for (Documented) Technique Development | Advanced Offensive Cybersecurity Training
Parsing MSDN to discover potentially abusable APIs
👌1
Operation Triangulation: The last (hardware) mystery https://securelist.com/operation-triangulation-the-last-hardware-mystery/111669/
Securelist
Operation Triangulation: The last (hardware) mystery
Recent iPhone models have additional hardware-based security protection for sensitive regions of the kernel memory. We discovered that to bypass this hardware-based security protection, the attackers used another hardware feature of Apple-designed SoCs.
CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution https://blog.projectdiscovery.io/crushftp-rce/
ProjectDiscovery
CrushFTP - CVE-2023-43177 Unauthenticated Remote Code Execution — ProjectDiscovery Blog
CVE-2023-43177 is a critical vulnerability in CrushFTP. The vulnerability could potentially allow unauthenticated attackers with network access to the CrushFTP Instance to write files in the local file system and eventually in some versions could allow the…
The Present Threat of Row Hammer Attacks https://medium.com/@don.aust/the-present-threat-of-row-hammer-attacks-f504e3017047
Medium
The Present Threat of Row Hammer Attacks
In 2014 Google researchers discovered strange interference between memory locations in DDR3, DDR4, and DDR5 Random Access Memory (RAM.) On…
Building an Exploit for FortiGate Vulnerability CVE-2023-27997 https://bishopfox.com/blog/building-exploit-fortigate-vulnerability-cve-2023-27997
Bishop Fox
Building an Exploit for FortiGate Vulnerability CVE-2023-27997
Learn how Bishop Fox built a POC exploit for the pre-authentication remote code injection vulnerability in the Fortinet SSL VPN published by Lexfo.
BPF Memory Forensics with Volatility 3 https://lolcads.github.io/posts/2023/12/bpf_memory_forensics_with_volatility3/
lolcads tech blog
BPF Memory Forensics with Volatility 3
BPF Memory Forensics with Volatility 3 Introduction and Motivation Have you ever wondered how an eBPF rootkit looks like? Well, here’s one, have a good look:
Upon receiving a command and control (C2) request, this specimen can execute arbitrary commands on…
Upon receiving a command and control (C2) request, this specimen can execute arbitrary commands on…
🔥1
Scheduled Task Tampering https://ipurple.team/2024/01/03/scheduled-task-tampering/
Purple Team
Scheduled Task Tampering
The HAFNIUM threat actor is using an unconventional method to tamper scheduled tasks in order to establish persistence via modification of registry keys in their malware called Tarrask. The benefit…
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords https://blog.redteam-pentesting.de/2024/bitwarden-heist/
RedTeam Pentesting - Blog
Bitwarden Heist - How to Break Into Password Vaults Without Using Passwords
Sometimes, making particular security design decisions can have unexpected consequences. For security-critical software, such as password managers, this can easily lead to catastrophic failure: In this blog post, we show how Bitwarden’s Windows Hello …
SMTP Smuggling: New Flaw Lets Attackers Bypass Security and Spoof Emails https://thehackernews.com/2024/01/smtp-smuggling-new-threat-enables.html
Telerecon: A reconnaissance framework for researching and investigating Telegram. https://github.com/sockysec/Telerecon
GitHub
GitHub - sockysec/Telerecon: A reconnaissance framework for researching and investigating Telegram.
A reconnaissance framework for researching and investigating Telegram. - GitHub - sockysec/Telerecon: A reconnaissance framework for researching and investigating Telegram.
❤1
Security: [0-day] heap overflow in vp8_encode_frame after frame re-sizing https://issues.chromium.org/issues/40073300
2023 CVE Data Review https://jerrygamblin.com/2024/01/03/2023-cve-data-review/
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399) https://medium.com/cyberscribers-exploring-cybersecurity/apt28-from-initial-damage-to-domain-controller-threats-in-an-hour-cert-ua-8399-1944dd6edcdf
Medium
APT28: From Initial Damage to Domain Controller Threats in an Hour (CERT-UA#8399)
Translation of the CERT-UA Alert and Technical Analysis
👍1
backdoor in upstream xz/liblzma leading to ssh server compromise https://www.openwall.com/lists/oss-security/2024/03/29/4 (check your systems and update ASAP)
🔥2
Bandook RAT Variant Resurfaces, Targeting Windows Machines https://www.leet.lat/threads/bandook-rat-variant-resurfaces-targeting-windows-machines.507/
Dark.charity
News - Bandook RAT Variant Resurfaces, Targeting Windows Machines
It's January 2024 and there is a new troublemaker in town! Meet Bandook, the sneaky remote access trojan that's causing a ruckus on Windows machines.