Release v2.0 - Everything Everywhere All At Once
#bruteratel
Brute Ratel v2.0 [codename Metamorphosis] is now available for download. This release introduces significant changes compared to previous versions, so it’s strongly recommended to review this blog, the private videos, and the documentation before using it. The Badger component has undergone extensive rewrites, featuring major updates in evasion tactics and new functionalities. The server has been optimized for speed and efficiency, with significant improvements to the licensing algorithm, ensuring each license is linked to a specific host to prevent misuse. However, the license can still be transfered from one host to another while deactivating the previous one. Additionally, several minor updates have been made to the Commander, which operators will notice during operation.
via Brute Ratel C4 Blog (author: Chetan Nayak (chetan@bruteratel.com))
#bruteratel
Brute Ratel v2.0 [codename Metamorphosis] is now available for download. This release introduces significant changes compared to previous versions, so it’s strongly recommended to review this blog, the private videos, and the documentation before using it. The Badger component has undergone extensive rewrites, featuring major updates in evasion tactics and new functionalities. The server has been optimized for speed and efficiency, with significant improvements to the licensing algorithm, ensuring each license is linked to a specific host to prevent misuse. However, the license can still be transfered from one host to another while deactivating the previous one. Additionally, several minor updates have been made to the Commander, which operators will notice during operation.
via Brute Ratel C4 Blog (author: Chetan Nayak (chetan@bruteratel.com))
Investing to deliver more
#portswigger
We are excited to announce a strategic investment from Brighton Park Capital (BPC), a leading growth equity firm with a track record of scaling innovative technology companies. This partnership will e
via PortSwigger Blog
#portswigger
We are excited to announce a strategic investment from Brighton Park Capital (BPC), a leading growth equity firm with a track record of scaling innovative technology companies. This partnership will e
via PortSwigger Blog
Ring Around The Regex: Lessons learned from fuzzing regex libraries (Part 1)
#secretclub
Okay, if you’re reading this, you probably know what fuzzing is. As an incredibly reductive summary: fuzzing is an automated, random testing process which tries to explore the state space (e.g., different interpretations of the input or behaviour) of a program under test (PUT; sometimes also SUT, DUT, etc.). Fuzzing is often celebrated as one of the most effective ways to find bugs in programs due to its inherently random nature, which defies human expectation or bias1. The strategy has found countless security-critical bugs (think tens or hundreds of thousands) over its 30-odd-years of existence, and yet faces regular suspicion from industry and academia alike. Mostly. Fuzzers can be overfit to certain applications, intentionally or not. ↩
via Secret Club (author: addison)
#secretclub
Okay, if you’re reading this, you probably know what fuzzing is. As an incredibly reductive summary: fuzzing is an automated, random testing process which tries to explore the state space (e.g., different interpretations of the input or behaviour) of a program under test (PUT; sometimes also SUT, DUT, etc.). Fuzzing is often celebrated as one of the most effective ways to find bugs in programs due to its inherently random nature, which defies human expectation or bias1. The strategy has found countless security-critical bugs (think tens or hundreds of thousands) over its 30-odd-years of existence, and yet faces regular suspicion from industry and academia alike. Mostly. Fuzzers can be overfit to certain applications, intentionally or not. ↩
via Secret Club (author: addison)
The Dangers of Transition Mode
#trustedsec
<p>With the introduction of WPA3, it is becoming increasingly difficult to successfully exploit a wireless network. One of the main enhancements introduced in WPA3 is the Simultaneous Authentication of Equals (SAE) model.…</p>
via TrustedSec Blog (author: Michael Bond)
#trustedsec
<p>With the introduction of WPA3, it is becoming increasingly difficult to successfully exploit a wireless network. One of the main enhancements introduced in WPA3 is the Simultaneous Authentication of Equals (SAE) model.…</p>
via TrustedSec Blog (author: Michael Bond)
A hacking hat-trick: previewing three PortSwigger Research publications coming to DEF CON & Black Hat USA
#portswigger
We're delighted to announce three major research releases from PortSwigger Research will be published at both Black Hat USA and DEF CON 32. In this post, we'll offer a quick teaser of each talk, info
via PortSwigger Research
#portswigger
We're delighted to announce three major research releases from PortSwigger Research will be published at both Black Hat USA and DEF CON 32. In this post, we'll offer a quick teaser of each talk, info
via PortSwigger Research
Adventures in Shellcode Obfuscation! Part 3: Encryption
#redsiege
By Mike Saunders, Principal Security Consultant This blog is the third in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
via RedSiege Blog (author: Red Siege)
#redsiege
By Mike Saunders, Principal Security Consultant This blog is the third in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]
via RedSiege Blog (author: Red Siege)
Adventures in Shellcode Obfuscation! Part 4: RC4 with a Twist
#redsiege
by Mike Saunders, Principal Security Consultant This blog is the fourth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
via RedSiege Blog (author: Red Siege)
#redsiege
by Mike Saunders, Principal Security Consultant This blog is the fourth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]
via RedSiege Blog (author: Red Siege)
Europol Coordinates Global Action Against Criminal Abuse of Cobalt Strike
#cobaltstrike
Press Release: View Original Europol Announcement 03 Jul 2024 – Law enforcement has teamed up with the private sector to fight against the abuse of a legitimate security tool by criminals who were using it to infiltrate victims’ IT systems. Older, unlicensed versions of the Cobalt Strike red teaming tool were targeted during a week [...]
via Cobalt Strike Blog
#cobaltstrike
Press Release: View Original Europol Announcement 03 Jul 2024 – Law enforcement has teamed up with the private sector to fight against the abuse of a legitimate security tool by criminals who were using it to infiltrate victims’ IT systems. Older, unlicensed versions of the Cobalt Strike red teaming tool were targeted during a week [...]
via Cobalt Strike Blog
Cobalt Strike
Europol Coordinates Global Action Against Criminal Abuse of Cobalt Strike Tools | Cobalt Strike
Europol coordinated the international activity, and liaised with the private partners to fight against the abuse of a legitimate security tool by criminals who were using it to infiltrate victims’ IT systems. Law enforcement flagged known IP addresses associated…
From linen to silk – Using Microsoft Service Fabric to elevate privileges
#netspi
The NetSPI Agents discovered a local privilege escalation path in Microsoft Service Fabric Runtime. Learn how the vulnerability was discovered and exploited.
via NetSPI Technical Blog (author: James Williams)
#netspi
The NetSPI Agents discovered a local privilege escalation path in Microsoft Service Fabric Runtime. Learn how the vulnerability was discovered and exploited.
via NetSPI Technical Blog (author: James Williams)
Prototype Pollution: A Deep-Dive
#netspi
Learn about Prototype Pollution – what it is, why it exists, and real examples of how it can be exploited.
via NetSPI Technical Blog (author: Rob Jepson)
#netspi
Learn about Prototype Pollution – what it is, why it exists, and real examples of how it can be exploited.
via NetSPI Technical Blog (author: Rob Jepson)
Fickle PDFs: exploiting browser rendering discrepancies
#portswigger
Imagine the CEO of a random company receives an email containing a PDF invoice file. In Safari and MacOS Preview, the total price displayed is £399. After approval, the invoice is sent to the accounti
via PortSwigger Research
#portswigger
Imagine the CEO of a random company receives an email containing a PDF invoice file. In Safari and MacOS Preview, the total price displayed is £399. After approval, the invoice is sent to the accounti
via PortSwigger Research
HackingDave’s Rule of Five
#trustedsec
Buckle up! This is a different type of blog that isn’t our normally scheduled technical prowess or superhuman talents we have here at TrustedSec. Each month, I have the privilege of hosting a meeting with new employees…
via TrustedSec Blog (author: David Kennedy)
#trustedsec
Buckle up! This is a different type of blog that isn’t our normally scheduled technical prowess or superhuman talents we have here at TrustedSec. Each month, I have the privilege of hosting a meeting with new employees…
via TrustedSec Blog (author: David Kennedy)
GitHub Actions exploitation: repo jacking and environment manipulation
#synacktiv
via Synacktiv Blog (author: Hugo Vincent)
#synacktiv
via Synacktiv Blog (author: Hugo Vincent)
dirDevil: Hiding Code and Content Within Folder Structures
#trustedsec
<p>Welcome back to another round of "Hiding in Plain Sight," exploring weird places to stash data or payloads. In our last edition, we explored an easy method of encoding a payload into RGB values of a PNG file and hosting…</p>
via TrustedSec Blog (author: @ nyxgeek)
#trustedsec
<p>Welcome back to another round of "Hiding in Plain Sight," exploring weird places to stash data or payloads. In our last edition, we explored an easy method of encoding a payload into RGB values of a PNG file and hosting…</p>
via TrustedSec Blog (author: @ nyxgeek)
This Meeting Should Have Been an Email
#objectivesee
A DPRK stealer, dubbed BeaverTail, targets users via a trojanized meeting app. Let's analyze it comprehensively.
via Objective-See Blog
#objectivesee
A DPRK stealer, dubbed BeaverTail, targets users via a trojanized meeting app. Let's analyze it comprehensively.
via Objective-See Blog