0.0.0.0 Day: Exploiting Localhost APIs From the Browser #LocalhostAPIExploit #0.0.0.0Day #BrowserSecurity #OligoSecurity #VulnerabilityDiscovery https://www.oligo.security/blog/0-0-0-0-day-exploiting-localhost-apis-from-the-browser
www.oligo.security
0.0.0.0 Day: Exploiting Localhost APIs From the Browser | Oligo Security
Oligo Security's research team recently disclosed the “0.0.0.0 Day” vulnerability. This vulnerability allows malicious websites to bypass browser security and interact with services running on an organization’s local network
Exploiting authorization by nonce in WordPress plugins #WordPressSecurity #Vulnerabilities #WordPressPlugins #AuthorizationByNonce #SecurityResearch https://nowotarski.info/wordpress-nonce-authorization/
nowotarski.info
Exploiting authorization by nonce in WordPress plugins
About WordPress As of 2024, WordPress powers 43% of all websites in the internet. 474 million websites run WordPress software and one or more out of 70 000 plugins. Unfortunately, as history shows, many WordPress plugins, even popular ones, often contain…
👍1
From Exploits to Forensics: Unraveling the Unitronics Attack #UnitronicsAttack #ResearchTools #ForensicExtraction #Vulnerabilities #PCOMProtocol https://claroty.com/team82/research/from-exploits-to-forensics-unraveling-the-unitronics-attack
Claroty
From Exploits to Forensics: Unraveling the Unitronics Attack
Claroty Team82 is publishing details of our research into Unitronics' integrated PLCs/HMIs, which began on the heels of numerous critical infrastructure attacks that were disclosed last fall, in particular at water treatment facilities in the United States…
A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability #CVE2023 #LinuxKernelVulnerability #eBPF #CyberSecurity #FixImplemented https://bughunters.google.com/blog/6303226026131456/a-deep-dive-into-cve-2023-2163-how-we-found-and-fixed-an-ebpf-linux-kernel-vulnerability
Google
Blog: A deep dive into CVE-2023-2163: How we found and fixed an eBPF Linux Kernel Vulnerability
This blog post takes a look at the years where eBPF was one of the kernel subsystems that grabbed the attention of a lot of security researchers. We will tell the story of how we discovered CVE-2023-2163, what our root-cause analysis process looked like,…
Listen to the whispers: web timing attacks that actually work #WebTimingAttacks #BurpSuiteEnterprise #BurpSuiteProfessional #DevSecOps #BugBountyHunting https://portswigger.net/research/listen-to-the-whispers-web-timing-attacks-that-actually-work
PortSwigger Research
Listen to the whispers: web timing attacks that actually work
Websites are riddled with timing oracles eager to divulge their innermost secrets. It's time we started listening to them. In this paper, I'll unleash novel attack concepts to coax out server secrets
Living off the VPN — Exploring VPN Post-Exploitation Techniques #VPNPostExploitation #ThreatActors #VPNVulnerabilities #OSDeviceControl #LDAPCredentialsAbuse https://www.akamai.com/blog/security-research/2024-august-vpn-post-exploitation-techniques-black-hat
Akamai
Living off the VPN — Exploring VPN Post-Exploitation Techniques | Akamai
VPN exploitations traditionally has been primarily for initial access. Ori David shows just how much more can be done maliciously post-exploit.
👍1
Black Hat USA: Lessons Learned After CrowdStrike Incident #BlackHatUSA #CybersecurityLessons #CrowdStrikeIncident #ResilienceInCybersecurity #SecureByDesign https://www.channele2e.com/brief/black-hat-usa-lessons-learned-after-crowdstrike-incident
ChannelE2E
Black Hat USA: Lessons Learned After CrowdStrike Incident
Black Hat USA is a great outlet for sharing lessons learned after the CrowdStrike incident.
Exploiting pfsense Remote Code Execution – CVE-2022-31814 #pfsense #RemoteCodeExecution #CVE202231814 #Laburity #CyberSecurity https://laburity.com/exploiting-pfsense-remote-code-execution-cve-2022-31814/
Laburity - Cyber Security Services
Exploiting pfsense Remote Code Execution – CVE-2022-31814 - Laburity
Greetings everyone, In this write-up, we will be exploring the interesting exploitation that has been done against the pfsense CVE-2022-31814. What is pfsense? pfSense software is a FreeBSD-based operating system designed to install and configure a firewall…
👍1🔥1
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources #BucketMonopoly #ShadowResources #AWSSecurity #CloudFormation #CybersecurityDiscovery https://www.aquasec.com/blog/bucket-monopoly-breaching-aws-accounts-through-shadow-resources/
Aqua
Bucket Monopoly: Breaching AWS Accounts Through Shadow Resources
We discovered critical vulnerabilities in six AWS services that range between RCE, full account takeover, manipulation and more.
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server! #ApacheHTTPServer #ConfusionAttacks #SecurityVulnerabilities https://blog.orange.tw/posts/2024-08-confusion-attacks-en/
Orange Tsai
Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!
📌 [ 繁體中文 | English ] Hey there! This is my research on Apache HTTP Server presented at Black Hat USA 2024. Additionally, this research will also be presented at HITCON and OrangeCon. If you’re int
SQL Injection Isn't Dead — Smuggling Queries at the Protocol Level (Paul Gerste, DEF CON 32) #PDF-1.4 #DEFCON32 #SQLinjection #smugglingqueries #protocollevel https://media.defcon.org/DEF%20CON%2032/DEF%20CON%2032%20presentations/DEF%20CON%2032%20-%20Paul%20Gerste%20-%20SQL%20Injection%20Isn%27t%20Dead%20Smuggling%20Queries%20at%20the%20Protocol%20Level.pdf
Secure Code Review: Finding XML vulnerabilities in Code [1/2] #SecureCodeReview #XMLVulnerabilities #CyberSecurityBeginner #XXEAttack #MitigatingVulnerabilities https://www.muqsitbaig.com/blog/security-code-review-finding-xxes-in-code/
👍1
Too Many Secrets: Proprietary Encryption Protocol Analysis in VStarcam CB73 Security Camera #CryptoAnalysis #NetworkSecurity #CyberSecurity #ReverseEngineering #Decryption https://brownfinesecurity.com/blog/vstarcam-cb73-proprietary-encryption-analysis/
Brownfinesecurity
Too Many Secrets: Proprietary Encryption Protocol Analysis in VStarcam CB73 Security Camera - Brown Fine Security
👍2
Canary Infrastructure vs. Real World TTPs #CanaryInfrastructure #RealWorldTTPs #CloudSecurity #TracebitDemo #DetectionOpportunities https://tracebit.com/blog/canary-infrastructure-vs-real-world-ttps
Tracebit
Canary Infrastructure vs. Real World TTPs | Tracebit
We investigate three recent AWS security incidents and discuss how canaries could help you detect these early, and throughout the attack lifecycle.
Racing Cats to the Exit: A Boring Linux Kernel Use-After-Free #LinuxKernel #BoringVulnerability #DoSRisk #UseAfterFreeBug #RaceCondition https://accessvector.net/2022/linux-itimers-uaf
Mixing watering hole attacks with history leak via CSS #RedTeam #Research #WateringHole #Phishing #CSSLeak https://adepts.of0x.cc/css-history-leaks/
Mixing watering hole attacks with history leak via CSS |
Mixing watering hole attacks with history leak via CSS | AdeptsOf0xCC
Using CSS and social engineering to identify juicy targets when performing watering hole attacks
At Home In Your Firmware: Analysis of CVE-2024-36877 #FirmwareVulnerability #CVE-2024-36877 #SMMcorruption #MSIchipsets #SystemManagementModeexploitation https://jjensn.com/at-home-in-your-firmware/
Jjensn
At Home In Your Firmware: Analysis of CVE-2024-36877
How I exploited a SMM Memory Corruption Vulnerability in MSI firmware
MIFARE Classic: exposing the static encrypted nonce variant — I’ve got a bit more, should I throw it in? (Philippe Teuwen) #MIFARE #SmartCardHacking https://eprint.iacr.org/2024/1275.pdf
🔥2
CVE-2024-41660: A Critical Vulnerability in OpenBMC #CVE-2024-41660 #TetrelSecurity #OpenBMC #Vulnerability #Critical https://tetrelsec.com/posts/cve-2024-41660-slpd-lite/
Tetrel Security
CVE-2024-41660: A Critical Vulnerability in OpenBMC