cKure Red
🚨 Researchers from Google's Project Zero security team said that the Samsung S10, A50, and A51 models were affected, and that only devices powered by Samsung's home-made Exynos chip were vulnerable, meaning the targets (as well as the attackers) were located…
This (t.me/ckuRED/212) comes as nation state actors are involved in wild exploitation.
Telegram
cKure Red
🚨 Researchers from Google's Project Zero security team said that the Samsung S10, A50, and A51 models were affected, and that only devices powered by Samsung's home-made Exynos chip were vulnerable, meaning the targets (as well as the attackers) were located…
Remote Code Execution in Exchange PowerShell Backend.
https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
https://www.zerodayinitiative.com/blog/2022/11/14/control-your-types-or-get-pwned-remote-code-execution-in-exchange-powershell-backend
Zero Day Initiative
Zero Day Initiative — Control Your Types or Get Pwned: Remote Code Execution in Exchange PowerShell Backend
By now you have likely already heard about the in-the-wild exploitation of Exchange Server, chaining CVE-2022-41040 and CVE-2022-41082. It was originally submitted to the ZDI program by the researcher known as “DA-0x43-Dx4-DA-Hx2-Tx2-TP-S-Q from GTSC”. After…
Orpheus - Bypasses most Kerberoast Detections (with Modified KDC Options and Encryption Types).
https://www.trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
https://www.trustedsec.com/blog/the-art-of-bypassing-kerberoast-detections-with-orpheus/
TrustedSec
The Art of Bypassing Kerberoast Detections with Orpheus
These identifiers were as follows: Windows Event Code 4769 Ticket Encryption Type of RC4 or 0x17 Ticket Options with a value of 0x40810010 Accounts that…
🔧 An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws.
https://github.com/r0oth3x49/ghauri
https://github.com/r0oth3x49/ghauri
GitHub
GitHub - r0oth3x49/ghauri: An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection…
An advanced cross-platform tool that automates the process of detecting and exploiting SQL injection security flaws - r0oth3x49/ghauri
E-book 📖 / pdf: Top OSINT & Infosec Resources for You and Your Team (2022 Edition): 100+ Blogs, Podcasts, YouTube, Books, and more!
https://www.maltego.com/blog/top-osint-infosec-resources-for-you-and-your-team/
https://www.maltego.com/blog/top-osint-infosec-resources-for-you-and-your-team/
Maltego
Top OSINT & Infosec Resources for You and Your Team (2022 Edition): 100+ Blogs, Podcasts, YouTube Channels, Books, and more!
More than 100 websites, blogs, podcasts, YouTube channels, books, and other learning resources relevant to OSINT, cybersecurity, cybercrime, and trust & safety investigations.
🔧 Tool: Femtobrowser. A really basic web browser written in ~500 lines of V using only the integrated vlib library. It was not designed to be fast or efficient, but rather to be a simple example of how to use the vlib library to create a web browser. Made in few hours to mess around with V.
https://github.com/SheatNoisette/femtobrowser
https://github.com/SheatNoisette/femtobrowser
GitHub
GitHub - SheatNoisette/femtobrowser: A Q'n'D tiny browser made in V
A Q'n'D tiny browser made in V. Contribute to SheatNoisette/femtobrowser development by creating an account on GitHub.
Guide to Reversing and Exploiting iOS binaries: ARM64 ROP Chains.
https://www.inversecos.com/2022/06/guide-to-reversing-and-exploiting-ios.html
https://www.inversecos.com/2022/06/guide-to-reversing-and-exploiting-ios.html
Inversecos
Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains
RCE (remote account / vehicle takeover) using CRLF, chained bugs. Interesting thread.
https://twitter.com/samwcyo/status/1597695281881296897
https://twitter.com/samwcyo/status/1597695281881296897
X (formerly Twitter)
Sam Curry (@samwcyo) on X
We recently found a vulnerability affecting Hyundai and Genesis vehicles where we could remotely control the locks, engine, horn, headlights, and trunk of vehicles made after 2012.
To explain how it worked and how we found it, we have @_specters_ as our…
To explain how it worked and how we found it, we have @_specters_ as our…
Pwn2own hacking competition Toronto 2022.
S22 Samsung gets owned.
https://hothardware.com/news/hackers-slaughter-samsung-galaxy-s22-first-day-pwn2own-competition
Day 3 of 4: https://youtu.be/VTQfb0Btt_Y
S22 Samsung gets owned.
https://hothardware.com/news/hackers-slaughter-samsung-galaxy-s22-first-day-pwn2own-competition
Day 3 of 4: https://youtu.be/VTQfb0Btt_Y
HotHardware
Hackers Slaughter Samsung's Galaxy S22 On First Day Of Pwn2Own Competition
The first day of Pwn2Own Toronto 2022 has come and gone, and Samsung’s Galaxy S22 has had it rough, with more potential abuse yet to come.
{JS-ON: Security-OFF}: Abusing JSON-Based SQL to Bypass WAF.
https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf
https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf
Claroty
{JS-ON: Security-OFF}: Abusing JSON-Based SQL to Bypass WAF
Team82 developed a generic web application firewall bypass exploiting a lack of JSON syntax support in leading vendors' SQL injection like AWS and Imperva WAF.
Tool 🔧 OSV-Scanner: Vulnerability Scanner for Open Source.
https://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html
https://github.com/google/osv-scanner
https://security.googleblog.com/2022/12/announcing-osv-scanner-vulnerability.html
https://github.com/google/osv-scanner
Google Online Security Blog
Announcing OSV-Scanner: Vulnerability Scanner for Open Source
Posted by Rex Pan, software engineer, Google Open Source Security Team Today, we’re launching the OSV-Scanner , a free tool that gives ope...
Critical Windows code-execution vulnerability went undetected until now.
https://arstechnica.com/information-technology/2022/12/critical-windows-code-execution-vulnerability-went-undetected-until-now/
https://arstechnica.com/information-technology/2022/12/critical-windows-code-execution-vulnerability-went-undetected-until-now/
Ars Technica
Critical Windows code-execution vulnerability went undetected until now
Microsoft elevates security rating for vulnerability resembling EternalBlue.
● Exclusive - Zero-Day: A critical security vulnerability has been identified in appviewx. It can be used to spoof certificates.
This is not the official def. Will wait for researcher to share details.
cKure Red
● Exclusive - Zero-Day: A critical security vulnerability has been identified in appviewx. It can be used to spoof certificates. This is not the official def. Will wait for researcher to share details.
Impact of the Zero-Day (mentioned here: https://t.me/ckuRED/231).
Enrollment: An adversary can issue a certificate from the CA and later use that for hosting fake websites that all the clients of that firm under attack will automatically trust.
Revocation: An adversary can bring down any website /application by just getting the public certificate of that application.
Optionally, if you have to plan big, discover all applications, download the public certificate, and at once revoke all.
Enrollment: An adversary can issue a certificate from the CA and later use that for hosting fake websites that all the clients of that firm under attack will automatically trust.
Revocation: An adversary can bring down any website /application by just getting the public certificate of that application.
Optionally, if you have to plan big, discover all applications, download the public certificate, and at once revoke all.
AMSI Bypass Using CLR Hooking.
https://practicalsecurityanalytics.com/new-amsi-bypass-using-clr-hooking/
https://practicalsecurityanalytics.com/new-amsi-bypass-using-clr-hooking/
Practical Security Analytics LLC
New AMSI Bypass Using CLR Hooking
Introduction In this article, I will present a new technique to bypass Microsoft’s Anti-Malware Scan Interface (AMSI) using API Call Hooking of CLR methods. When executed on a Windows system,…