■■□□□ Cyber-Crime: Hackers ask $120,000 for access to multi-billion auction house.
https://www.bleepingcomputer.com/news/security/hackers-ask-120-000-for-access-to-multi-billion-auction-house/
https://www.bleepingcomputer.com/news/security/hackers-ask-120-000-for-access-to-multi-billion-auction-house/
BleepingComputer
Hackers ask $120,000 for access to multi-billion auction house
Hackers have breached the network of a major auction house and offered access to whoever was willing to pay $120,000.
■■■■□ Hackers figured out 3 separate ways to break into US Air Force satellites, and won up to $50K for doing it.
https://www.businessinsider.in/science/news/hackers-figured-out-3-separate-ways-to-break-into-us-air-force-satellites-and-won-up-to-50k-for-doing-it/articleshow/102804642.cms
https://www.businessinsider.in/science/news/hackers-figured-out-3-separate-ways-to-break-into-us-air-force-satellites-and-won-up-to-50k-for-doing-it/articleshow/102804642.cms
Business Insider India
Hackers figured out 3 separate ways to break into US Air Force satellites, and won up to $50K for doing it
The US military gathered hackers to test the defenses of a real orbiting satellite at its "Hack-A-Sat" event. A team of Italians took the grand prize.
■■■■□ DLL side-loading.
https://www.politoinc.com/post/playing-with-bubbles-an-introduction-to-dll-sideloading
https://www.politoinc.com/post/playing-with-bubbles-an-introduction-to-dll-sideloading
Polito, Inc.
Playing with Bubbles: An Introduction to DLL-Sideloading
DLL Side-Loading is a pervasive technique partially because its behavior is difficult to detect. As a sub-technique of DLL Hijacking, it ta
■■■□□ [Tool] headerpwn: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
Useful for uncovering the following behaviors:
- Header based access control issues
- 403/401 Bypasses
- Detecting anomalies when certain special headers are present
- Header based cache poisoning denial of service issues
- Debug information disclosure when certain headers are present
- etc.
https://github.com/devanshbatham/headerpwn
Useful for uncovering the following behaviors:
- Header based access control issues
- 403/401 Bypasses
- Detecting anomalies when certain special headers are present
- Header based cache poisoning denial of service issues
- Debug information disclosure when certain headers are present
- etc.
https://github.com/devanshbatham/headerpwn
GitHub
GitHub - devanshbatham/headerpwn: A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers
A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers - devanshbatham/headerpwn
■■■■■ Fuzzing IoT binaries with AFL++ - Part II.
https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/
https://blog.attify.com/fuzzing-iot-binaries-with-afl-part-ii/
Attify Blog - IoT Security, Pentesting and Exploitation
Fuzzing IoT binaries with AFL++ - Part II
Fuzzing closed source IoT firmware binaries with AFL++ in Qemu mode. Fuzzing networked apps often requires desocketing and patching the binary.
■■■■□ Journey into Windows Kernel Exploitation: The Basics.
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
https://blog.neuvik.com/journey-into-windows-kernel-exploitation-the-basics-fff72116ca33
Medium
Journey into Windows Kernel Exploitation: The Basics
This blogpost embarks on the initial stages of kernel exploitation. The content serves as an introduction, leading to an imminent and…
■■■□□ Emulating the Iranian State-Sponsored Adversary APT35.
https://www.attackiq.com/2023/08/18/emulating-apt35/
https://www.attackiq.com/2023/08/18/emulating-apt35/
AttackIQ
Emulating the Iranian State-Sponsored Adversary APT35 - AttackIQ
AttackIQ has released a new attack graph that emulates activities observed by the state-sponsored Iranian-based adversary APT35.
■□□□□ Funny: Cyber security researchers become target of criminal hackers.
● The victim apparently was a war veteran.
https://www.ft.com/content/88560ffa-bb5f-428a-894e-d791a0ee342c
● The victim apparently was a war veteran.
https://www.ft.com/content/88560ffa-bb5f-428a-894e-d791a0ee342c
■■■■■ Tool: BurpSuite Extension (plugin).
InQL, an open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
https://github.com/doyensec/inql
InQL, an open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration.
https://github.com/doyensec/inql
GitHub
GitHub - doyensec/inql: InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability…
InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable scans, and seamless Burp integration. - doyensec/inql
■■■■□ WinRAR flaw lets hackers run programs when you open RAR archives.
https://www.bleepingcomputer.com/news/security/winrar-flaw-lets-hackers-run-programs-when-you-open-rar-archives/
https://www.bleepingcomputer.com/news/security/winrar-flaw-lets-hackers-run-programs-when-you-open-rar-archives/
BleepingComputer
WinRAR flaw lets hackers run programs when you open RAR archives
A high-severity vulnerability has been fixed in WinRAR, the popular file archiver utility for Windows used by millions, that can execute commands on a computer simply by opening an archive.
■■■■□ Zero-Day: Thousands of Android malware apps use stealthy APKs to bypass security, study finds. Zimperium report.
https://www.tomsguide.com/news/thousands-of-android-malware-apps-use-stealthy-apks-to-bypass-security-study-finds
https://www.tomsguide.com/news/thousands-of-android-malware-apps-use-stealthy-apks-to-bypass-security-study-finds
tom's guide
Thousands of Android malware apps use stealthy APKs to bypass security, study finds
Hackers are always cooking up new ways to get their
■■■□□ Windows Error Reporting Service Privilege Enhancement Vulnerability (CVE-2023-36874).
#untested
https://github.com/d0rb/CVE-2023-36874
#untested
https://github.com/d0rb/CVE-2023-36874
GitHub
GitHub - d0rb/CVE-2023-36874: This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation…
This repository contains a proof-of-concept exploit written in C++ that demonstrates the exploitation of a vulnerability affecting the Windows Error Reporting (WER) component. - d0rb/CVE-2023-36874
■□□□□ [ Tool ] FaceChain: A deep-learning toolchain for generating your Digital-Twin.
https://github.com/modelscope/facechain
https://github.com/modelscope/facechain
GitHub
GitHub - modelscope/facechain: FaceChain is a deep-learning toolchain for generating your Digital-Twin.
FaceChain is a deep-learning toolchain for generating your Digital-Twin. - modelscope/facechain
cKure
■■■□□ Windows Error Reporting Service Privilege Enhancement Vulnerability (CVE-2023-36874). #untested https://github.com/d0rb/CVE-2023-36874
■■■■□ PoC exploit for zero-day Windows Error Reporting Service bug (CVE-2023-36874) releases.
https://securityonline.info/poc-exploit-for-0-day-windows-error-reporting-service-bug-cve-2023-36874-releases/
https://securityonline.info/poc-exploit-for-0-day-windows-error-reporting-service-bug-cve-2023-36874-releases/
Cybersecurity News
PoC exploit for 0-day Windows Error Reporting Service bug (CVE-2023-36874) releases
PoC exploit code will be released for a zero-day vulnerability (CVE-2023-36874) allowing privilege escalation in Microsoft Windows.
■■■■□ Ivanti warns of new actively exploited MobileIron zero-day bug.
CVE-2023-38035 – API Authentication Bypass on Sentry Administrator Interface
https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-actively-exploited-mobileiron-zero-day-bug/
CVE-2023-38035 – API Authentication Bypass on Sentry Administrator Interface
https://forums.ivanti.com/s/article/CVE-2023-38035-API-Authentication-Bypass-on-Sentry-Administrator-Interface
https://www.bleepingcomputer.com/news/security/ivanti-warns-of-new-actively-exploited-mobileiron-zero-day-bug/
Ivanti
CVE-2023-38035 – API Authentication Bypass on Sentry Administrator Interface
<span style="font-size: 11pt;"><span style="line-height: 107%;"><span style="font-family: Calibri,sans-serif;"><span style="font-family: "Arial",sans-serif;">A vulnerability has been discovered in Ivanti Sentry, formerly known as MobileIron Sentry. This vulnerability…
■■■■□ Researchers discovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems.
AT&T Alien Labs researchers uncovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems.
https://securityaffairs.com/149592/cyber-crime/rise-proxy-server-application.html
AT&T Alien Labs researchers uncovered a massive campaign that delivered a proxy server application to at least 400,000 Windows systems.
https://securityaffairs.com/149592/cyber-crime/rise-proxy-server-application.html
Security Affairs
A massive campaign delivered a proxy server application to 400,000 Windows systems
Researchers discovered a massive campaign that delivered proxy server application to at least 400,000 Windows systems.