(not related to cybersecurity, but worth mentioning :)) Web port of the original Diablo game https://d07riv.github.io/diabloweb/
🤪2
Decrypting and Replaying VPN Cookies #VPNcookie #reverseengineering #HIPchecks #keyderivation #redteamdefense https://rotarydrone.medium.com/decrypting-and-replaying-vpn-cookies-4a1d8fc7773e
Medium
Decrypting and Replaying VPN Cookies
Reverse engineering VPN client software to hijack session cookies.
Bytecode Injection (Part 3) #BytecodeInjection #Exploitation #Android #Java #CommandExecution https://lolcads.github.io/posts/2024/09/bytecode_exploitation_2/
lolcads tech blog
Bytecode Injection (Part 3)
Bytecode Injection (Part 3) With all the basics out of the way, this blog post shows the first bytecode - based exploitation technique on Android: bytecode injection! This opens the door to many interesting exploits, where injected bytecode can function as…
Feeld dating app – Your nudes and data were publicly available #FeeldDatingApp #DataBreach #CyberSecurityLondon #Vulnerabilities #PrivacyIssues https://fortbridge.co.uk/research/feeld-dating-app-nudes-data-publicly-available/
Cyber Security Services - London
Feeld dating app - Your nudes and data were publicly available
Discover critical Feeld app vulnerabilities from our pentest. See how flaws in security controls expose personal data and learn key fixes.
🍾1
The Security Canary Maturity Model #SecurityCanaryMaturityModel #Tracebit #CanaryDeployment #MaturityLevels #SecurityPrograms https://tracebit.com/blog/the-security-canary-maturity-model
Tracebit
The Security Canary Maturity Model | Tracebit
We layout the different levels of maturity your organization may be at in their Security Canary Maturity, as well as discussing the value in maturity models themselves.
Bytecode Reuse Attack (Part 4) #BytecodeReuse #Exploitation #Security #Android #Mitigations https://lolcads.github.io/posts/2024/09/bytecode_exploitation_3/
lolcads tech blog
Bytecode Reuse Attack (Part 4)
Bytecode Reuse Attack (Part 4) As last blog post on bytecode - based exploitation on Android, the next step following bytecode injection is discussed, namely: bytecode reuse.
To answer the question about why an attacker needs bytecode reuse, although there…
To answer the question about why an attacker needs bytecode reuse, although there…
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI #RCE #AdminsOfMOBI #WHOISExploitation #InternetSecurity #GlobalSignBreach https://labs.watchtowr.com/we-spent-20-to-achieve-rce-and-accidentally-became-the-admins-of-mobi/
watchTowr Labs
We Spent $20 To Achieve RCE And Accidentally Became The Admins Of .MOBI
Welcome back to another watchTowr Labs blog. Brace yourselves, this is one of our most astounding discoveries.
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
Summary
What started out as a bit of fun between colleagues while avoiding the Vegas heat and $20 bottles of water in our Black Hat hotel rooms…
A new TrickMo saga: from Banking Trojan to Victim's Data Leak #TrickMo #AndroidTrojan #DataLeak #Cybersecurity #ThreatActor https://www.cleafy.com/cleafy-labs/a-new-trickmo-saga-from-banking-trojan-to-victims-data-leak
Cleafy
A new TrickMo saga: from Banking Trojan to Victim's Data Leak | Cleafy Labs
Explore Cleafy's analysis of a newly discovered TrickMo variant, revealing enhanced malware capabilities and critical endpoints used for storing stolen credentials and data from victims. Here is the latest threat analyst report.
Why Django’s [DEBUG=True] is a Goldmine for Hackers #DjangoDEBUGTrue #HackersGoldmine #SensitiveDataExposure #PreventExploitation #CybersecurityAwareness https://medium.com/@verylazytech/why-djangos-debug-true-is-a-goldmine-for-hackers-01486289607d
Medium
Why Django’s [DEBUG=True] is a Goldmine for Hackers
Misconfigurations are often the weakest link in an otherwise secure environment. One of the most dangerous yet easily overlooked…
👍1
We analyzed RTVE's geo-blocking implementation and found a vulnerability that allows unauthorized access to restricted content. Do you want to know more? Full story here: https://reversea.me/index.php/when-geolocation-based-media-streaming-blocking-goes-bad/ #WebAppSecurity #VulnAnalysis #RME #Research
🦄2
CVR: The Mines of Kakadûm https://bughunters.google.com/blog/6220757425586176/cvr-the-mines-of-kakad-m
Google
Blog: CVR: The Mines of Kakadûm
In this document, Google's Cloud Vulnerability Research team (CVR) presents vulnerabilities in a third-party JPEG 2000 image library called Kakadu. Exploiting memory corruption vulnerabilities typically requires knowledge about the target environment; however…
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey #Microsoft #Windows #MSIInstaller #Repair #SECConsultVulnerability https://sec-consult.com/blog/detail/msi-installer-repair-to-system-a-detailed-journey/
SEC Consult
Microsoft Windows MSI Installer - Repair to SYSTEM - A detailed journey
Repair functions of Microsoft Windows MSI installers can be vulnerable in several ways, for instance allowing local attackers to escalate their privileges to SYSTEM rights. This vulnerability is referenced as CVE-2024-38014.
👍3
CVE-2023-28324 Deep Dive: Ivanti Endpoint Manager AgentPortal Improper Input Validation #IvantiEndpointManager #CVE-2023-28324 #DeepDive #InputValidation #Horizon3ai https://www.horizon3.ai/attack-research/attack-blogs/cve-2023-28324-deep-dive/
Horizon3.ai
CVE-2023-28324 Deep Dive: Ivanti Endpoint Manager AgentPortal Improper Input Validation
CVE-2023-28324 Ivanti Endpoint Manager AgentPortal Improper Input Validation Remote Code Execution Vulnerability.
Acquiring Malicious Browser Extension Samples on a Shoestring Budget #acquiringMaliciousExtensions #crypto #cryptanalysis #C2Domains #IOCs https://pberba.github.io/crypto/2024/09/14/malicious-browser-extension-genesis-market/
pepe berba
Acquiring Malicious Browser Extension Samples on a Shoestring Budget
Cracking the simple encryption scheme used by Genesis Market to hunt for malicious browser extensions
Exploit for CVE-2024-8504 & CVE-2024-8503: SQLi and RCE #Exploit #CVE-2024-8504 #SQLi #RCE #Vulnerabilities https://darkwebinformer.com/exploit-for-cve-2024-8504-cve-2024-8503-sqli-and-rce/
Dark Web Informer
Exploit for CVE-2024-8504 & CVE-2024-8503: SQLi and RCE
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041) #MicrosoftKernelCVE #CyberSecurityServices #PatchDiffing #ExploitationProcess #RootCauseAnalysis https://csa.limited/blog/20240916-Exploiting-Microsoft-Kernel-Applocker-Driver.html
Csacyber
Exploiting Microsoft Kernel Applocker Driver (CVE-2024-38041)
In recent July Patch Tuesday Microsoft patched a vulnerability in the Microsoft Kernel driver appid.sys, which is the central driver behind AppLocker, the application whitelisting technology built into Windows.
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability #CVE-2024-8190 #IvantiCloudService #CISAKEV #CommandInjection #Horizon3AI https://www.horizon3.ai/attack-research/cisa-kev-cve-2024-8190-ivanti-csa-command-injection/
Horizon3.ai
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability
CVE-2024-8190: Investigating CISA KEV Ivanti Cloud Service Appliance Command Injection Vulnerability and Indicators of Compromise
Linux debugging, profiling and tracing training https://bootlin.com/doc/training/debugging/debugging-slides.pdf
👍1
SSD Advisory – LANCOM LCOS Heap Overflow https://ssd-disclosure.com/ssd-advisory-lancom-lcos-heap-overflow/
SSD Secure Disclosure
SSD Advisory - LANCOM LCOS Heap Overflow - SSD Secure Disclosure
Summary A vulnerability in LANCOM LCOS web interface (usually listening on port 443) allows a remote attacker to trigger a heap overflow in the service listening on this port. Credit An independent security researcher working with SSD Secure Disclosure Vendor…
Taking over Train infrastructure in Poland /Traction power substation and lighting systems #TrainInfrastructurePoland #TractionPowerSubstations #LightingSystems #ICSResearch #InfrastructureAttack https://medium.com/@bertinjoseb/taking-over-train-infrastructure-in-poland-traction-power-substation-and-lighting-systems-2948594f259d
Medium
Taking over Train infrastructure in Poland /Traction power substation and lighting systems
(6 Months later CZAT 7 Server is offline or changed to another ip address , this post was written 6 months ago, published today 9/2/2024)
Revisiting MiniFilter Abuse Technique to Blind EDR #MiniFilterAbuse #BlindEDR #MitigationDefeated #SecurityTraining #RegOrderImpact https://tierzerosecurity.co.nz/2024/09/18/blind-edr-revisited.html
Tier Zero Security
Information Security Services. Offensive Security, Penetration Testing, Mobile and Application, Purple Team, Red Team