Wawa Security Links 318

Vendredi 19 Avril 2024


GoogleNCR / Twitter
Hacking tutos / Facebook


Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Vulnerability Spotlight: Two vulnerabilities in Epignosis eFront
https://www.thezdi.com/blog/2019/9/2/mindshare-hardware-reversing-with-the-tp-link-tl-wr841n-router
https://www.offensive-security.com/offsec/analyzing-a-creative-attack-chain/
grsecurity - Teardown of a Failed Linux LTS Spectre Fix
Secure Use of Cryptographic Libraries: SPARK Binding for Libsodium - The AdaCore Blog
Research Post: Cache Attacks on CTR_DRBG - Forgotten Assumptions
GitHub - Matheus-Garbelini/esp32_esp8266_attacks: Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)
https://www.exploit-db.com/exploits/47348
Microsoft Exchange – Domain Escalation | Penetration Testing Lab
Glupteba Campaign Hits Network Routers and Updates C&C Servers with Data from Bitcoin Transactions - TrendLabs Security Intelligence Blog
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Vulnerability Spotlight: Information disclosure vulnerability in Blynk-Library
https://medium.com/markmotig/command-prompt-with-system-rights-using-schtasks-ncat-and-metame-d2d333a710aa
Just An SMS Could Let Remote Attackers Access All Your Emails, Experts Warn
macOS Incident Response | Part 3: System Manipulation
https://medium.com/tenable-techblog/kernel-write-what-where-in-qualcomm-driver-lpe-f08389f6fce9
https://medium.com/linasvaliukas/by-the-way-the-list-of-ssl-tls-certificates-issued-to-you-including-subdomains-is-public-5537ef1f11f5
https://medium.com/bugbountywriteup/pulse-secure-ssl-vpn-post-auth-rce-to-ssh-shell-2b497d35c35b
Remote Code Execution in Aruba Mobility Controller (ArubaOS) - CVE-2018-7081 :: DoomsDay Vault
TokyoWesterns CTF 5th 2019 WriteUp | r3kapig
warning: implicit backdoor

https://medium.com/byte_St0rm/adventures-in-the-wonderful-world-of-amsi-25d235eb749c
https://isc.sans.edu/forums/diary/Private IP Addresses in Malware Samples/25298/
SANDOKAN – NetBSD based Penetration Testers system | Astr0baby's not so random thoughts _____ rand() % 100;
UPSynergy: Chinese-American Spy vs. Spy Story - Check Point Research
Kubernetes Pod Escape Using Log Mounts
Microsoft Exchange – Password Spraying | Penetration Testing Lab
Kubernetes Pentest Methodology Part 2 | CyberArk
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: GhIDA: Ghidra decompiler for IDA Pro
Gootkit Banking Trojan | Part 3: Retrieving the Final Payload
Spam Campaign Abuses PHP Functions for Persistence, Uses Compromised Devices for Evasion and Intrusion - TrendLabs Security Intelligence Blog
"No grave but the SIP": Reversing a VoIP phone firmware
https://isc.sans.edu/forums/diary/PowerShell Script with a builtin DLL/25302/
Malware Classification with ‘Graph Hash,’ Applied to the Orca Cyberespionage Campaign - TrendLabs Security Intelligence Blog %
Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry ≈ Packet Storm
Weak credentials encryption at rest with DPAPI: NordVPN case study
(CVE-2019-1030) Microsoft Edge - Universal XSS
Using TensorFlow / machine learning for automated RF side-channel attack classification :: Security for the embedded and connected world
BruCON Challenge: The Solution | /dev/random
https://blog.sucuri.net/2019/09/throwback-threat-thursday-joomla-googlemaps-plugin-seo-spam-injection.html
Embarrassingly easy private certificate management for VMs on AWS, GCP, and Azure - smallstep

CSRF is (really) dead
Security analysis of <portal> element - research.securitum.com
https://sidechannel.tempestsi.com/a-brief-analysis-of-data-compression-security-issues-2d6368782e31
blog.redteam.pl: CVE-2019-10677 Multiple Cross-Site Scripting (XSS) in the web interface of DASAN Zhone ZNID
TokyoWesterns CTF 2019 - gnote | RPISEC
The Dangers of VHD and VHDX Files
https://medium.com/cc1h2e1/write-up-of-two-http-requests-smuggling-ff211656fe7d
XPN InfoSec Blog
Data Extraction to Command Execution CSV Injection | Veracode blog
GitHub - yeggor/UEFI_RETool: https://yeggor.github.io/UEFI_RETool/
Hack The Box: Bastion – Khaotic Developments
polict.net | Web tracking via HTTP cache cross-site leaks
GitHub - eth0izzle/shhgit: Find GitHub secrets in real time
https://medium.com/bugbountywriteup/bastion-hackthebox-writeup-3c57d89476e4
Trendmicro CTF ChakraCore exploit · GitHub
Hack The Box - Bastion | 0xRick
It’s not wrong that "🤦🏼‍♂️".length == 7
Bastion | HackTheBox Writeups
DerbyCon 2019 - Kerberoasting Revisited
BlueKeep: A Journey from DoS to RCE (CVE-2019-0708) - MalwareTech

Hack The Box - Bastion
Red Team Methodology - A Naked Look
https://isc.sans.edu/forums/diary/Unidentified Scanning Activity/25304/
https://medium.com/olafhartong/sysmon-10-4-release-7f7480300dff
https://notpayloads.blob.core.windows.net/slides/Azure-PrivEsc-DerbyCon9.pdf
https://onedrive.live.com/view.aspx?resid=B9E47855F9345D3B3797
MiniDumpWriteDump via Faultrep!CreateMinidump | 🔐Blog of Osanda
GitHub - fireeye/stringsifter: A machine learning tool that automatically ranks strings based on their relevance for malware analysis.
Taskbar Latency and Kernel Calls | Random ASCII – tech blog of Bruce Dawson
Adventures in systemd Injection - Google Präsentationen
ESET discovered an undocumented backdoor used by the infamous Stealth Falcon group | WeLiveSecurity
7 most common application backdoors
Hack the Box (HTB) machines walkthrough series — Waldo
‘Purple Fox’ Fileless Malware with Rookit Component Delivered by Rig Exploit Kit Now Abuses PowerShell - TrendLabs Security Intelligence Blog
RCE using Path Traversal – inc0gbyt3 – Web Dev | Security Student | Bug Hunter
Microsoft Exchange – NTLM Relay | Penetration Testing Lab
Talos Blog || Cisco Talos Intelligence Group - Comprehensive Threat Intelligence: Vulnerability Spotlight: Denial-of-service vulnerabilities in some NETGEAR routers
Weisfeiler-Lehman Graph Kernel for Binary Function Analysis
GitHub - secrary/AppSecurityLimits: AppSecurityLimits - Allows Executables To Define Security Limits
Patch-gapping Google Chrome - Exodus Intelligence


Translate / Map
Wikipedia [ENG] / GIT

Metasploit / ExploitDB
Converter / Project 0

Hotmail / Gmail / ODA
eprint.iacr / Youtube