SQLi Hunter v2 is a python program that checks for SQL (and Blind) injection vulnerability in URL’s. The program is designed to be easy to use, practical and beneficial. The intention of this tool is to include it in your ethical Bug Bounty Hunting methodology. Please do not use this tool on any website without having its permission.
https://system32.ink/news-feed/p/175/
https://system32.ink/news-feed/p/175/
#Offensive_security
1. Cobalt Strike Beacon Object File for kernel exploitation using AMD's Ryzen Master Driver (version 17)
https://github.com/tijme/amd-ryzen-master-driver-v17-exploit
2. A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
1. Cobalt Strike Beacon Object File for kernel exploitation using AMD's Ryzen Master Driver (version 17)
https://github.com/tijme/amd-ryzen-master-driver-v17-exploit
2. A script to automate privilege escalation with CVE-2023-22809 vulnerability
https://github.com/n3m1dotsys/CVE-2023-22809-sudoedit-privesc
#Analytics
Cybersecurity Trends Q1/23:
⬆️ Pwd spraying/creds stuffing;
⬆️ Phishing w/ new file types, eg .one, .iso, .lnk;
⬆️ Rust malware / loaders (+Go +Nim +Zig);
⬆️ Sliver implants;
⬆️ Abused legit RA software;
⬆️ Abused legit encryption tools (ransom);
⬆️ Token/Cloud API abuse;
⬇️ Malware attacks on non-standard ports;
⬇️ E-Skimming Incidents;
⬇️ Office Macros.
Cybersecurity Trends Q1/23:
⬆️ Pwd spraying/creds stuffing;
⬆️ Phishing w/ new file types, eg .one, .iso, .lnk;
⬆️ Rust malware / loaders (+Go +Nim +Zig);
⬆️ Sliver implants;
⬆️ Abused legit RA software;
⬆️ Abused legit encryption tools (ransom);
⬆️ Token/Cloud API abuse;
⬇️ Malware attacks on non-standard ports;
⬇️ E-Skimming Incidents;
⬇️ Office Macros.
#Hardware_Security
Intel iTLB multihit bug
https://www.tacitosecurity.com/multihit.html
]-> PoC: https://github.com/ergot86/itlb_poc
Intel iTLB multihit bug
https://www.tacitosecurity.com/multihit.html
]-> PoC: https://github.com/ergot86/itlb_poc
#hardening
#Blue_Team_Techniques
Recommendations to mitigate OWASP API Security Top 10 threats using API Management
https://learn.microsoft.com/en-us/azure/api-management/mitigate-owasp-api-threats
#Blue_Team_Techniques
Recommendations to mitigate OWASP API Security Top 10 threats using API Management
https://learn.microsoft.com/en-us/azure/api-management/mitigate-owasp-api-threats
#Threat_Research
Traffic signals: The VASTFLUX Takedown
https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown
Traffic signals: The VASTFLUX Takedown
https://www.humansecurity.com/learn/blog/traffic-signals-the-vastflux-takedown
#tools
#Red_Team_Tactics
1. qscan - Quick Network Scanner
https://github.com/0xor0ne/qscan
+ its companion command line tool qsc:
https://github.com/0xor0ne/qscan/tree/main/qsc
2. Bypassing Applocker, UAC, and Getting Administrative Persistence
https://assume-breach.medium.com/home-grown-red-team-bypassing-applocker-uac-and-getting-administrative-persistence-88b85c81343e
#Red_Team_Tactics
1. qscan - Quick Network Scanner
https://github.com/0xor0ne/qscan
+ its companion command line tool qsc:
https://github.com/0xor0ne/qscan/tree/main/qsc
2. Bypassing Applocker, UAC, and Getting Administrative Persistence
https://assume-breach.medium.com/home-grown-red-team-bypassing-applocker-uac-and-getting-administrative-persistence-88b85c81343e
#DFIR
ShareFinder: How Threat Actors Discover File Shares
https://thedfirreport.com/2023/01/23/sharefinder-how-threat-actors-discover-file-shares
ShareFinder: How Threat Actors Discover File Shares
https://thedfirreport.com/2023/01/23/sharefinder-how-threat-actors-discover-file-shares
Wireshark_forensics.pdf
24.8 MB
#Tech_book
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
#Cloud_Security
"Wireshark for Network Forensics: An Essential Guide for IT and Cloud Professionals", 2023.
Bug : Facebook Group Members Disclosure
Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.
Video POC:- https://system32.ink/news-feed/p/176/
Intro : A Non-member can determine if someone is the member of a private group or not via CometHovercardQueryRendererQuery graphQL mutation.
Video POC:- https://system32.ink/news-feed/p/176/
A #browser_extension for OSINT search
https://github.com/ninoseki/mitaka
The all-in-one Red Team #extension for Web Pentest
https://github.com/LasCC/Hack-Tools
https://github.com/ninoseki/mitaka
The all-in-one Red Team #extension for Web Pentest
https://github.com/LasCC/Hack-Tools
#Malware_analysis
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
1. Analyzing Malicious OneNote Documents
https://blog.didierstevens.com/2023/01/22/analyzing-malicious-onenote-documents
2. Roaming Mantis implements new DNS changer in its malicious mobile app in 2022
https://securelist.com/roaming-mantis-dns-changer-in-malicious-mobile-app/108464
#exploit
1. A Step-By-Step Introduction To The Use Of ROP Gadgets To Bypass DEP
https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadgets-to-bypass-dep
2. b3typer - Simple typer bug
https://blog.bi0s.in/2023/01/23/Pwn/bi0sCTF22-b3typer
3. CVE-2022-2347:
U-Boot - Unchecked Download Size/Direction in USB DFU
https://research.nccgroup.com/2023/01/20/technical-advisory-u-boot-unchecked-download-size-and-direction-in-usb-dfu-cve-2022-2347
1. A Step-By-Step Introduction To The Use Of ROP Gadgets To Bypass DEP
https://cybergeeks.tech/a-step-by-step-introduction-to-the-use-of-rop-gadgets-to-bypass-dep
2. b3typer - Simple typer bug
https://blog.bi0s.in/2023/01/23/Pwn/bi0sCTF22-b3typer
3. CVE-2022-2347:
U-Boot - Unchecked Download Size/Direction in USB DFU
https://research.nccgroup.com/2023/01/20/technical-advisory-u-boot-unchecked-download-size-and-direction-in-usb-dfu-cve-2022-2347
#tools
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#IoT_Security
bamf - tool which utilizes Shodan to detect vulnerable IoT devices
https://github.com/malwaredllc/bamf
#tools
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
#Blue_Team_Techniques
LogSlash - The New Standard Method of Log Reduction
https://github.com/FoxIO-LLC/LogSlash
StealthyIMU.pdf
1.8 MB
#Research
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.
]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
"StealthyIMU: Stealing Permission-protected Private Information From Smartphone Voice Assistant Using Zero-Permission Sensors", NDSS 2023.
]-> Repo: https://github.com/Samsonsjarkal/StealthyIMU
WordPress Plugin Elementor 3.6.2 – Remote Code Execution (RCE) (Authenticated)] Date: 04/16/2022
Exploit:- https://system32.ink/news-feed/p/177/
Exploit:- https://system32.ink/news-feed/p/177/
Internet Camera Exploitation Tool
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/
This is a tool meant to assist cyber security researchers on discovering outdated and vulnerable camera systems on the internet by utilizing shodan.io
I was able to discover thousands of vulnerable cameras using it
Tool:- https://system32.ink/news-feed/p/179/