Mr X's identity is a complete mystery.
Cerbero Suite 3.3 is out! - https://cerbero-blog.com/?p=1842 - Theme support, hugely improved native UI for Ghidra, MachO Carbon support, XP compatibility and a few bug fixes. Happy hacking!
CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow https://www.zerodayinitiative.com/blog/2019/8/22/cve-2019-12527-code-execution-on-squid-proxy-through-a-heap-buffer-overflow
Mitre ATT&CK Sub-Techniques Preview:
- New ID numbering
- New techniques
- Technique decomposition
- Technique realignment and deprecation
- Technique-to-sub-technique demotion
Fortigate are calling this issue in FortiOS a “vulnerability” but to be clear it’s actually a major backdoor.
The backdoor code is flat out there in the OS, it even needs a ‘secret’ code typed to trigger it.
How did a major firewall vendor (almost 500k IPs) end up backdoored? https://twitter.com/gossithedog/status/1164549075838099456
« Hunting for Privilege Escalation in Windows Environment » 👍🏻👍🏻👍🏻👍🏻 https://speakerdeck.com/heirhabarov/hunting-for-privilege-escalation-in-windows-environment
Apprendre à utiliser vim de manière ludique, c'est maintenant possible !
Les utilisateurs de nano n'ont plus d'excuse. https://twitter.com/MasteringVim/status/1164516009887326209
https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV190023 great to see #microsoft is taking action to reduce #NTLM attack surface by advising customers to enable LDAP relay mitigations. We talked about these issues at our @email@example.com and @BlackHatEvents@twitter.com talks. @firstname.lastname@example.org
If you're interested in knowing how to solve RE tasks using cryptanalysis only, you should check out my new post. You'll see the methodology I applied to solve the micro-bit crackme of the #BlackBadge challenge of @_leHACK_@twitter.com 2019 of @email@example.com @firstname.lastname@example.org
Bypassing Two-Factor Authentication on Outlook Web Access
a good guide to the basics of offensive lateral movement/pivoting, including psexec, DCOM, WMI, winRM, etc. the guide uses cobaltstrike for most of the demo, which is superrrr fun (albeit noisy) to play with, if you haven't.
Responder 220.127.116.11 upcoming release will be supporting RDP ;)
"Webmin 0day remote code execution"
Tl;Dr: Lack of input validation in the reset password function allows RCE (CVE-2019-15107). Over 13 0000 vulnerable on Shodan.
user=root&pam&expired&old=wrong | id
Tencent Security Team has worked out a stable POC of CVE-2019-1181/1182. It works on Win7 to Win10. Patch your system as soon as possible. REF:
Hey hey hey, bored of infosec marketing bullshit? check our new post! https://blog.huntingmalware.com/notes/DigMine
“We accept the risk”
2 years later:
When your program name is more the new EICAR than a security tool https://twitter.com/ahakcil/status/1161674193353809920
⚠️ Arretez tout et allez mettre à jour vos Windows. ⚠️ (Merci à @ANSSI_FR@twitter.com @CERT_FR@twitter.com)
In case you missed @email@example.com's talk at @BlackHatEvents@twitter.com this week, here is a video showing a remote exploit for one of the iMessage bugs we found: https://youtu.be/E_9kBFKNx54 Be sure to read https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html if you are interested in these kinds of attacks!
Today at Black Hat @firstname.lastname@example.org
& I presented on "Attacking & Defending the Microsoft Cloud."
Slides are now available to download:
We covered several attacks (& defense): password spray, token theft, password reuse, on-prem cloud integration, & more!
The social network of the future: No ads, no corporate surveillance, ethical design, and decentralization! Own your data with Mastodon!