New RustyAttr Malware Targets macOS Through Extended Attribute Abuse #MalwareAnalysis https://thehackernews.com/2024/11/new-rustyattr-malware-targets-macos.html
Redis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability #RedisCVE #VulnerabilityMitigation #RedRaysCTO #LuaScripting #UpdateRedis https://redrays.io/blog/redis-cve-2024-31449-how-to-reproduce-and-mitigate-the-vulnerability/
RedRays - Your SAP Security Solution
Redis CVE-2024-31449: How to Reproduce and Mitigate the Vulnerability
Learn about Redis CVE-2024-31449, a critical Lua vulnerability allowing remote code execution. Discover steps to protect your system, reproduce the PoC, and update Redis to mitigate risks.
Exploring the DOMPurify library: Bypasses and Fixes (1/2) #DOMPurify #Bypasses #HTML #mXSS #SecurityFixes https://mizu.re/post/exploring-the-dompurify-library-bypasses-and-fixes
mizu.re
Exploring the DOMPurify library: Bypasses and Fixes (1/2). Tags:Article - Article - Web - mXSS
🤔1😡1
Reverse Engineering iOS 18 Inactivity Reboot #iOS18 #InactivityReboot #ReverseEngineering #SecurityFeature #72HourReboot https://naehrdine.blogspot.com/2024/11/reverse-engineering-ios-18-inactivity.html
Blogspot
Reverse Engineering iOS 18 Inactivity Reboot
Wireless and firmware hacking, PhD life, Technology
Unpatched Remote Code Execution in Gogs #Gogs #Vulnerability #Unpatched #RemoteCodeExecution #Exploit https://fysac.github.io/posts/2024/11/unpatched-remote-code-execution-in-gogs/
Vulnerability research and more
Unpatched Remote Code Execution in Gogs
The Gogs self-hosted Git service is vulnerable to symbolic link path traversal that enables remote code execution (CVE-2024-44625). The latest version at the time of writing (0.13.0) is affected. This vulnerability is exploitable against a default install…
TCL substitution of global parameter values in Gaia Portal #TCLSubstitution #GaiaPortal #Vulnerability #MaliciousCode #Mitigation https://notes.zeronvll.com/grammelot/CheckPoint-CVE-2024-24914
ZeroNvll
TCL substitution of global parameter values in Gaia Portal
Authenticated Gaia users, at least read-only privilege, can inject code or commands by global variables through HTTP requests.
CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015) #CVE-2024-0012 #PAN-OS #AuthenticationBypass #ManagementWebInterface #SecurityAdvisories https://security.paloaltonetworks.com/CVE-2024-0012
Palo Alto Networks Product Security Assurance
CVE-2024-0012 PAN-OS: Authentication Bypass in the Management Web Interface (PAN-SA-2024-0015)
An authentication bypass in Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to gain PAN-OS administrator privileges to perfor...
ShadowDumper: Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming #ShadowDumper #LSASSMemory #PenetrationTesting #RedTeaming #GitHubProject https://github.com/Offensive-Panda/ShadowDumper
GitHub
GitHub - Offensive-Panda/ShadowDumper: Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration…
Shadow Dumper is a powerful tool used to dump LSASS memory, often needed in penetration testing and red teaming. It uses multiple advanced techniques to dump memory, allowing to access sensitive da...
Reproducing CVE-2024-10979: A Step-by-Step Guide #ReproduceCVE202410979 #StepByStepGuide #SAPSecurity #Vulnerability #EducationalPurposes https://redrays.io/blog/reproducing-cve-2024-10979-a-step-by-step-guide/
RedRays - Your SAP Security Solution
Reproducing CVE-2024-10979: A Step-by-Step Guide
Discover how to reproduce CVE-2024-10979, a vulnerability in PostgreSQL's trusted PL/Perl, through this detailed step-by-step guide. Learn about the security implications and the importance of applying patches to safeguard your database systems.
Everyday Ghidra: Ghidra Data Types — Creating Custom GDTs From Windows Headers — Part 2 #Ghidra #CustomGDT #WindowsHeaders #ReverseEngineering #DataTypes https://medium.com/@clearbluejar/everyday-ghidra-ghidra-data-types-creating-custom-gdts-from-windows-headers-part-2-39b8121e1d82
Medium
Everyday Ghidra: Ghidra Data Types — Creating Custom GDTs From Windows Headers — Part 2
Ghidra, developed by the NSA, is a powerful reverse engineering tool known for its versatility. One standout feature is its ability to…
🔥2
Cross-Site POST Requests Without a Content-Type Header #CSRFprotection #POSTrequest #ContentTypeHeader #SecurityVulnerability #CrossSiteRequests https://nastystereo.com/security/cross-site-post-without-content-type.html
The Ultimate Handheld Hacking Device - My Experience with NetHunter #HandheldHacking #NetHunterExperience #OnePlus7TSetup #KaliAndroid #MobileSecurity https://andy.codes/blog/security_articles/2024-11-27-the-ultimate-handheld-hacking-device.html
andy.codes
2024-11-27 - The Ultimate Handheld Hacking Device - My Experience with NetHunter - Andy's Cave
This page is a collection of my security research, and other infosec-related activities.
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage #APT36 #ElizaRAT #CyberEspionage #CloudStealth #SaaSsec2024 https://www.reco.ai/blog/how-apt36-elizarat-redefines-cyber-espionage
Introduction to Fuzzing Android Native Components #FuzzingAndroidComponents #ApplicationSecurity #AFL++ #QEMU #NativeCode https://blog.convisoappsec.com/en/introduction-to-fuzzing-android-native-components/
Conviso AppSec
Introduction to Fuzzing Android Native Components
Discover how fuzzing can identify critical vulnerabilities in native Android components, strengthening device security.
👍1
Android's CVE-2020-0238 (AccountTypePreferenceLoader) #AndroidSecurity #Vulnerability #ElevationOfPrivilege #BugAnalysis #ExploitOpportunity https://pwner.gg/blog/Android's-CVE-2020-0238
( ͡◕ _ ͡◕)👌
Android's CVE-2020-0238 (AccountTypePreferenceLoader)
Note: This is part of my @vr_progress journal. Also, subscribe to my new @SideQuest_256 channel and I might post videos about the Android journey too :D This is a story about how I wasted my weekend over a bug that was categorized as a High/EoP but then couldn’t…
🔥1
Eclipse: Activation Context Hijack #Eclipse #ActivationContextHijack #DLLInjection #MaliciousAC #CodeExecution https://github.com/Kudaes/Eclipse
GitHub
GitHub - Kudaes/Eclipse: Activation Context Hijack
Activation Context Hijack. Contribute to Kudaes/Eclipse development by creating an account on GitHub.
Happy New Year! Here's to a 2025 where exploits cry, malware breaks, and vulnerable software finally learns to behave. Cheers to keeping things interesting and reversed!
🎉9
MSSQL Identified as Vulnerable to Emoji String Exploitation #MSSQLvulnerability #emojiexploitation #securityassessment #Unicodehandling #vulnerabilityanalysis https://decrypt.lol/posts/2024/11/29/mssql-identified-as-vulnerable-to-emoji-string-exploitation/
Decrypt LOL
MSSQL Identified as Vulnerable to Emoji String Exploitation
Microsoft SQL Server has been found to treat a goblin emoji as equivalent to an empty string, potentially leading to security vulnerabilities in applications that utilize it.
The fascinating security model of dark web marketplaces #darkwebsecurity #deepdiving #fascinatingmodel #evanboehs #technicalcuriosity https://boehs.org/node/dark-web-security
boehs.org
The Fascinating Security Model of Dark Web Marketplaces
Captchas, Monero, Scams and absolutely no JavaScript
ICP-Brasil: Mis-issued certificate #ICPBrasil #MisissuedCertificate #MozillaHome #Privacy #Cookies https://bugzilla.mozilla.org/show_bug.cgi?id=1934361
bugzilla.mozilla.org
1934361 - ICP-Brasil: Mis-issued certificate
RESOLVED (bwilson) in CA Program - CA Certificate Compliance. Last updated 2025-02-14.
0x00 - Introduction to Windows Kernel Exploitation # WindowsKernelExploitation #WinDbg #HEVD #ExploitDevelopment #TokenStealing https://wetw0rk.github.io/posts/0x00-introduction-to-windows-kernel-exploitation/
wetw0rk.github.io
0x00 - Introduction to Windows Kernel Exploitation
🔥2