If you're interested in knowing how to solve RE tasks using cryptanalysis only, you should check out my new post. You'll see the methodology I applied to solve the micro-bit crackme of the #BlackBadge challenge of @_leHACK_@twitter.com 2019 of @firstname.lastname@example.org @email@example.com
Bypassing Two-Factor Authentication on Outlook Web Access
a good guide to the basics of offensive lateral movement/pivoting, including psexec, DCOM, WMI, winRM, etc. the guide uses cobaltstrike for most of the demo, which is superrrr fun (albeit noisy) to play with, if you haven't.
Responder 18.104.22.168 upcoming release will be supporting RDP ;)
"Webmin 0day remote code execution"
Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan.
user=root&pam&expired&old=wrong | id
Tencent Security Team has worked out a stable POC of CVE-2019-1181/1182. It works on Win7 to Win10. Patch your system as soon as possible. REF:
Hey hey hey, bored of infosec marketing bullshit? check our new post! https://blog.huntingmalware.com/notes/DigMine
“We accept the risk”
2 years later:
When your program name is more the new EICAR than a security tool https://twitter.com/ahakcil/status/1161674193353809920
⚠️ Arretez tout et allez mettre à jour vos Windows. ⚠️ (Merci à @ANSSI_FR@twitter.com @CERT_FR@twitter.com)
In case you missed @firstname.lastname@example.org's talk at @BlackHatEvents@twitter.com this week, here is a video showing a remote exploit for one of the iMessage bugs we found: https://youtu.be/E_9kBFKNx54 Be sure to read https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html if you are interested in these kinds of attacks!
Today at Black Hat @email@example.com
& I presented on "Attacking & Defending the Microsoft Cloud."
Slides are now available to download:
We covered several attacks (& defense): password spray, token theft, password reuse, on-prem cloud integration, & more!
Hey @TimiHealth@twitter.com. You might want to check your email. I'm going to hazard a guess and say this is probably not good.
IBM X-Force details new "warshipping" technique that relies on criminal groups shipping packages with malicious WiFi equipment within a company's network range, so they can perform wireless attacks on the internal network
Captain, we've detected a disturbance in space-time. It's coming from Earth. Someone audited the Kubernetes source • The Register https://www.theregister.co.uk/2019/08/06/kubernetes_security_audit/
You can turn a cheap rpi0w into a plug and play ethernet gadget to upgrade any device to a pentest platform. Nexmon allows monitor mode on the default WiFi running @firstname.lastname@example.org and its web UI. Boots in seconds, deauths and gets handshakes like a mf 😬
Interesting: ‘“GitHub knew or should have known that obviously hacked data had been posted to http://GitHub.com,” […] The plaintiffs believe that because Social Security numbers had a fixed format, GitHub should have been able to identify and remove this data’ https://twitter.com/jedisct1/status/1157981338726785025
Thanks to @SentinelOne@twitter.com @email@example.com, my free ebook of How To Reverse #macOS Malware is now available. Learn to set up a safe #Mac test lab, find #malware samples, static + dynamic analysis. eBook is free; tools you need are free. 😁https://go.sentinelone.com/ebook-macos-reversing-malware-registration.html
NIST has released a new document around best practices on MFA/Risk based auth. for e-commerce: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.1800-17.pdf
(Bonus: it aligns with SP-800-63 and is really detailed architecture-wise)
PowerHub : A post exploitation tool based on a web application, focusing on bypassing endpoint protection and application whitelisting : https://github.com/AdrianVollmer/PowerHub/
A 100% disruptive über-1337 military-grade next-next-gen deep-analytics full-spectrum crypto-bullshito-cyber quantum-proof apt-blockchain (not CISSP)
On « Tweet » sur Twitter ; on « Toot » sur Mastodon. Sur ce réseau social plein de libertés, TeDomum met à disposition une modeste instance. N'hésitez pas à nous solliciter pour la modération ou des ajustements de configuration.