■■□□□ PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks.
https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks
https://blog.aquasec.com/powerhell-active-flaws-in-powershell-gallery-expose-users-to-attacks
Aqua
PowerHell: Active Flaws in PowerShell Gallery Expose Users to Attacks
We expose significant flaws in PowerShell Gallery's policy package names and owners, that open potential supply chain attacks on the registry's user base.
■■■□□ How A Small Device Can Hack Into Mobile Phones Through WiFi.
https://www.therakyatpost.com/news/malaysia/2023/08/11/watch-man-demonstrates-how-a-small-device-can-hack-into-mobile-phones-through-wifi/
https://www.therakyatpost.com/news/malaysia/2023/08/11/watch-man-demonstrates-how-a-small-device-can-hack-into-mobile-phones-through-wifi/
TRP
[Watch] Man Demonstrates How A Small Device Can Hack Into Mobile Phones Through WiFi | TRP
Once the password is entered, the hacker can steal it, hack into the user's phone, and do whatever they want with the personal information they obtain.
■■□□□ Cyber-Crime: Hackers ask $120,000 for access to multi-billion auction house.
https://www.bleepingcomputer.com/news/security/hackers-ask-120-000-for-access-to-multi-billion-auction-house/
https://www.bleepingcomputer.com/news/security/hackers-ask-120-000-for-access-to-multi-billion-auction-house/
BleepingComputer
Hackers ask $120,000 for access to multi-billion auction house
Hackers have breached the network of a major auction house and offered access to whoever was willing to pay $120,000.
■■■■□ Hackers figured out 3 separate ways to break into US Air Force satellites, and won up to $50K for doing it.
https://www.businessinsider.in/science/news/hackers-figured-out-3-separate-ways-to-break-into-us-air-force-satellites-and-won-up-to-50k-for-doing-it/articleshow/102804642.cms
https://www.businessinsider.in/science/news/hackers-figured-out-3-separate-ways-to-break-into-us-air-force-satellites-and-won-up-to-50k-for-doing-it/articleshow/102804642.cms
Business Insider India
Hackers figured out 3 separate ways to break into US Air Force satellites, and won up to $50K for doing it
The US military gathered hackers to test the defenses of a real orbiting satellite at its "Hack-A-Sat" event. A team of Italians took the grand prize.
■■■■□ DLL side-loading.
https://www.politoinc.com/post/playing-with-bubbles-an-introduction-to-dll-sideloading
https://www.politoinc.com/post/playing-with-bubbles-an-introduction-to-dll-sideloading
Polito, Inc.
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
■■■□□ [Tool] headerpwn: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
Useful for uncovering the following behaviors:
- Header based access control issues
- 403/401 Bypasses
- Detecting anomalies when certain special headers are present
- Header based cache poisoning denial of service issues
- Debug information disclosure when certain headers are present
- etc.
https://github.com/devanshbatham/headerpwn
Useful for uncovering the following behaviors:
- Header based access control issues
- 403/401 Bypasses
- Detecting anomalies when certain special headers are present
- Header based cache poisoning denial of service issues
- Debug information disclosure when certain headers are present
- etc.
https://github.com/devanshbatham/headerpwn
GitHub
GitHub - devanshbatham/headerpwn: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers - devanshbatham/headerpwn
■■■■■ Fuzzing IoT binaries with AFL++ - Part II.
https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/
https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/
Attify Blog - IoT Security, Pentesting and Exploitation
Fuzzing IoT binaries with AFL++ - Part II
Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
■■■■□ Journey into Windows Kernel Exploitation: The Basics.
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…
■■■□□ Emulating the Iranian State-Sponsored Adversary APT35.
https://www.attackiq.com/2023/08/18/emulating-apt35/
https://www.attackiq.com/2023/08/18/emulating-apt35/
AttackIQ
Emulating the Iranian State-Sponsored Adversary APT35 - AttackIQ
AttackIQ has released a new attack graph that emulates activities observed by the state-sponsored Iranian-based adversary APT35.
■□□□□ Funny: Cyber security researchers become target of criminal hackers.
● The victim apparently was a war veteran.
https://www.ft.com/content/88560ffa-bb5f-428a-894e-d791a0ee342c
● The victim apparently was a war veteran.
https://www.ft.com/content/88560ffa-bb5f-428a-894e-d791a0ee342c
■■■■■ Tool: BurpSuite Extension (plugin).
InQL, an open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
https://github.com/doyensec/inql
InQL, an open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
https://github.com/doyensec/inql
GitHub
GitHub - doyensec/inql: InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability…
InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. - doyensec/inql
■■■■□ WinRAR flaw lets hackers run programs when you open RAR archives.
https://www.bleepingcomputer.com/news/security/winrar-flaw-lets-hackers-run-programs-when-you-open-rar-archives/
https://www.bleepingcomputer.com/news/security/winrar-flaw-lets-hackers-run-programs-when-you-open-rar-archives/
BleepingComputer
WinRAR flaw lets hackers run programs when you open RAR archives
A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can execute commands on a computer simply by opening an archive.
■■■■□ Zero-Day: Thousands of Android malware apps use stealthy APKs to bypass security, study finds. Zimperium report.
https://www.tomsguide.com/news/thousands-of-android-malware-apps-use-stealthy-apks-to-bypass-security-study-finds
https://www.tomsguide.com/news/thousands-of-android-malware-apps-use-stealthy-apks-to-bypass-security-study-finds
tom's guide
Thousands of Android malware apps use stealthy APKs to bypass security, study finds
Hackers are always cooking up new ways to get their
■■■□□ Windows Error Reporting Service Privilege Enhancement Vulnerability (CVE-2023-36874).
#untested
https://github.com/d0rb/CVE-2023-36874
#untested
https://github.com/d0rb/CVE-2023-36874
GitHub
GitHub - d0rb/CVE-2023-36874: This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation…
This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) component. - d0rb/CVE-2023-36874
■□□□□ [ Tool ] FaceChain: A deep-learning toolchain for generating your Digital-Twin.
https://github.com/modelscope/facechain
https://github.com/modelscope/facechain
GitHub
GitHub - modelscope/facechain: FaceChain is a deep-learning toolchain for generating your Digital-Twin.
FaceChain is a deep-learning toolchain for generating your Digital-Twin. - modelscope/facechain