Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability #IdentityCrisis #Vulnerability #CyberArk #IdentitySecurity #PrivilegeEscalation https://www.cyberark.com/resources/threat-research-blog/identity-crisis-the-curious-case-of-a-delinea-local-privilege-escalation-vulnerability
Cyberark
Identity Crisis: The Curious Case of a Delinea Local Privilege Escalation Vulnerability
During a recent customer engagement, the CyberArk Red Team discovered and exploited an Elevation of Privilege (EoP) vulnerability (CVE-2024-39708) in Delinea Privilege Manager (formerly Thycotic...
How to Bypass Golang SSL Verification #Golang #SSLVerification #CyberArk #Security #Programming https://www.cyberark.com/resources/threat-research-blog/how-to-bypass-golang-ssl-verification
Cyberark
How to Bypass Golang SSL Verification
Golang applications that use HTTPS requests have a built-in SSL verification feature enabled by default. In our work, we often encounter an application that uses Golang HTTPS requests, and we have...
👍1
Leveraging Automated Firmware Analysis with the Open-Source Firmware Analyzer EMBA #FirmwareSecurity #EMBAAnalyzer #AutomatedAnalysis #OpenSource #IoTSecurity https://medium.com/@iugkhgf/leveraging-automated-firmware-analysis-with-the-open-source-firmware-analyzer-emba-46d30d587a87
Medium
Leveraging Automated Firmware Analysis with the Open-Source Firmware Analyzer EMBA
The Internet of Things (IoT) ecosystem as well as critical infrastructure represents a rapidly growing technology field that connects…
Windows Installer, Exploiting Custom Actions #WindowsInstaller #CustomActions #Vulnerability #ElevationOfPrivileges #CVE2023-32016 https://blog.doyensec.com/2024/07/18/custom-actions.html
👍1
Compiler Options Hardening Guide for C and C++ #CompilerOptionsHardening #OpenSSF #BestPractices #CProgramming #C++Programming https://best.openssf.org/Compiler-Hardening-Guides/Compiler-Options-Hardening-Guide-for-C-and-C++.html
OpenSSF Best Practices Working Group
Compiler Options Hardening Guide for C and C++
The Best Practices for OSS Developers working group is dedicated to raising awareness and education of secure code best practices for open source developers.
👍2
Attacking Connection Tracking Frameworks as used by Virtual Private Networks https://petsymposium.org/popets/2024/popets-2024-0070.pdf
👍1
How did I approach making linux LKM rootkit, “reveng_rtkit” ? #LinuxLKM #Rootkit #reveng_rtkit #KernelManipulation #SyscallInterception https://reveng007.github.io/blog/2022/03/08/reveng_rkit_detailed.html
reveng007’s Blog
How did I approach making linux LKM rootkit, “reveng_rtkit” ?
READING TIME: 53 min.
👍1
Unveiling secrets of the ESP32: creating an open-source MAC Layer #ESP32 #OpenSource #MACLayer #ReverseEngineering #Wi-FiNetworking https://zeus.ugent.be/blog/23-24/open-source-esp32-wifi-mac/
Zeus WPI
Unveiling secrets of the ESP32: creating an open-source MAC Layer
Reverse engineering the ESP32 Wi-Fi hardware registers
Code injection on Android without ptrace #CodeInjection #Android #Rust #Shellcode #SELinux https://erfur.dev/blog/dev/code-injection-without-ptrace
erfur's bits and pieces
Code injection on Android without ptrace
Prompt Engineering https://x.com/bindureddy/status/1814409737557160044?s=61
Exploring GNU extensions in the Linux kernel https://maskray.me/blog/2024-05-12-exploring-gnu-extensions-in-linux-kernel
MaskRay
Exploring GNU extensions in the Linux kernel
The Linux kernel is written in C, but it also leverages extensions provided by GCC. In 2022, it moved from GCC/Clang -std=gnu89 to -std=gnu11. This article explores my notes on how these GNU extension
🤷2
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android #EvilVideoVulnerability #TelegramAndroidExploit #ZeroDayDiscovery #CyberSecurity #MaliciousPayloads https://www.welivesecurity.com/en/eset-research/cursed-tapes-exploiting-evilvideo-vulnerability-telegram-android/
Welivesecurity
Cursed tapes: Exploiting the EvilVideo vulnerability on Telegram for Android
ESET researchers discovered a zero-day Telegram for Android exploit that allows sending malicious files disguised as videos.
👍2🥱2
WebAssembly and Security: a review #WebAssembly #SecurityReview #CryptoAndSecurity #Research #AccessibilityForum https://arxiv.org/abs/2407.12297
arXiv.org
WebAssembly and Security: a review
WebAssembly is revolutionizing the approach to developing modern applications. Although this technology was born to create portable and performant modules in web browsers, currently, its...
👍2
Bus Pirate 5: The Swiss ARRRmy Knife of Hardware Hacking #BusPirate5 #HardwareHacking #SwissArmyKnife #SupplyChainSecurity #ModernEnterprise https://eclypsium.com/blog/bus-pirate-5-the-swiss-arrrmy-knife-of-hardware-hacking/
Eclypsium | Supply Chain Security for the Modern Enterprise
Bus Pirate 5: The Swiss ARRRmy Knife of Hardware Hacking - Eclypsium | Supply Chain Security for the Modern Enterprise
The Bus Pirate 5 is the latest version of the popular hardware hacking and debugging tool. The LCD screen, programmable LEDs, and several connector options make it a formidable platform worthy of inclusion in your toolbox.
Inside Doppelganger – How Russia uses EU companies for its propaganda #Doppelganger #RussiaPropaganda #EUCompanies #Disinformation #Investigation https://correctiv.org/en/fact-checking-en/2024/07/22/inside-doppelganger-how-russia-uses-eu-companies-for-its-propaganda/
CORRECTIV
Inside Doppelganger – How Russia uses EU companies for its propaganda
How Doppelganger, one of the biggest Russian disinformation campaigns, is using EU companies to keep spreading its propaganda – despite sanctions.
👍2🤡1
edr_blocker: Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. #GitHub #TierZeroSecurity #EDR #Telemetry #iptables https://github.com/TierZeroSecurity/edr_blocker
GitHub
GitHub - TierZeroSecurity/edr_blocker: Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is…
Blocks EDR Telemetry by performing Person-in-the-Middle attack where network filtering is applied using iptables. The blocked destination IP addresses are parsed based on the server name in TLS Cli...
CVE-2019-8805: Apple EndpointSecurity framework Privilege Escalation #AppleCVE #EndpointSecurityPrivilegeEscalation #PenetrationTesting #CyberSecuritySolution #SecureLayer7 https://blog.securelayer7.net/applied-endpointsecurity-framework-previlege-escalation/
SecureLayer7 - Offensive Security, API Scanner & Attack Surface Management
CVE-2019-8805: Apple EndpointSecurity framework Privilege Escalation
CVE-2019-8805 is a privilege escalation vulnerability found in macOS Catalina 10.15 by Scott Knight. This vulnerability occurs through the Endpoint Security framework introduced in Catalina 10.15....
NO_WILDCARD: How I discovered the Organization ID of any AWS Account #AWSAccountID #VPC #VpcEndpoint #OrganizationID #SecurityResearch https://tracebit.com/blog/no-wildcard-how-i-discovered-the-organization-id-of-any-aws-account
Tracebit
NO_WILDCARD: How I discovered the Organization ID of any AWS Account | Tracebit
Our latest research into VPC Endpoint Policy causes AWS to introduce significant changes!
👍1
Abusing RCU callbacks with a Use-After-Free read to defeat KASLR #UseAfterFree #AbusingRCUcallbacks #DefeatingKASLR #AnatomicalPrecision #LeakingAddresses https://anatomic.rip/abusing_rcu_callbacks_to_defeat_kaslr/
a place of anatomical precision
Abusing RCU callbacks with a Use-After-Free read to defeat KASLR
Introduction In this article, I will be walking you through a clever technique that can be used to leak addresses and defeat KASLR in the Linux Kernel when you have a certain type of Use-After-Free by abusing RCU callbacks. It is by no means a novel technique…
Double Dipping Cheat Developer Gets Caught Red-Handed #Developer #Cheating #InformationSecurity #CyberArk #DoubleDipping https://www.cyberark.com/resources/threat-research-blog/double-dipping-cheat-developer-gets-caught-red-handed
Cyberark
Double Dipping Cheat Developer Gets Caught Red-Handed
Following our post “A Brief History of Game Cheating,” it’s safe to say that cheats, no matter how lucrative or premium they might look, always carry a degree of danger. Today’s story revolves...