Hermit: Deterministic Linux for Controlled Testing and Software Bug-finding.
https://developers.facebook.com/blog/post/2022/11/22/hermit-deterministic-linux-testing/
https://developers.facebook.com/blog/post/2022/11/22/hermit-deterministic-linux-testing/
Meta for Developers
Hermit: Deterministic Linux for Controlled Testing and Software Bug-finding
Facebook For Developers
⚠️ Zero-Day: Vulnerability in JWT Secret Poisoning (CVE-2022-23529).
https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
https://nvd.nist.gov/vuln/detail/CVE-2022-23529
https://unit42.paloaltonetworks.com/jsonwebtoken-vulnerability-cve-2022-23529/
https://nvd.nist.gov/vuln/detail/CVE-2022-23529
Unit 42
Security Issue in JWT Secret Poisoning (Updated)
We discovered a new high-severity vulnerability (CVE-2022-23529) in the popular JsonWebToken open source project.
Exploiting null-dereferences in the Linux kernel.
https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html
https://googleprojectzero.blogspot.com/2023/01/exploiting-null-dereferences-in-linux.html
projectzero.google
Exploiting null-dereferences in the Linux kernel - Project Zero
Posted by Seth Jenkins, Project Zero For a fair amount of time, null-deref bugs were a highly exploitable kernel bug class. Back when the kernel was able t...
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847).
https://www.codelivly.com/linux-privilege-escalation-dirtypipe/
https://www.codelivly.com/linux-privilege-escalation-dirtypipe/
Codelivly
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)
CVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman present in Linux Kernel itself post versions
Top 10 Web Hacking Techniques of 2022.
https://portswigger.net/research/top-10-web-hacking-techniques-of-2022
https://portswigger.net/research/top-10-web-hacking-techniques-of-2022
A simple script as malware that will turn off the firewall, start an HTTP server, forward its port through 'ngrok' and send the URL of the server through a Telegram bot.
https://github.com/usdchef/malvinci
https://github.com/usdchef/malvinci
GitHub
GitHub - mazithesage/malvinci: This simple but powerful script will introduce a new type of malware that will turn off the firewall…
This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its port through ngrok, and send the URL of the server through a ...
Privacy-Breach: United States 🇺🇸
The IRS has paid an Israeli 🇮🇱 company! 'Cobwebs Technologies' hundreds of thousands of dollars for an internet investigative tool that allows the IRS to conduct undercover investigations online, according to internal IRS documents obtained by Motherboard.
vice.com/en/article/xgynn4/company-helping-irs-go-undercover-cobwebs-technologies
The IRS has paid an Israeli 🇮🇱 company! 'Cobwebs Technologies' hundreds of thousands of dollars for an internet investigative tool that allows the IRS to conduct undercover investigations online, according to internal IRS documents obtained by Motherboard.
vice.com/en/article/xgynn4/company-helping-irs-go-undercover-cobwebs-technologies
VICE
The Company Helping the IRS Go Undercover Online
Internal IRS documents obtained by Motherboard show the IRS paid Israeli firm Cobwebs Technologies hundreds of thousands of dollars for a tool that helps it monitor the web while undercover.
CVE-2023-21752; allows a basic user to execute arbitrary code on a host to delete files from [a] specified storage path, from Windows Backup and Restore service.
The vulnerability is triggered using the Race Condition between temporary file creation and deletion, which takes place following the authentication process.
https://cloudsek.com/threatintelligence/cve-2023-21752-privilege-escalation-vulnerability-on-windows-backup-service
https://www.infosecurity-magazine.com/news/hackers-exploit-flaw-windows/
The vulnerability is triggered using the Race Condition between temporary file creation and deletion, which takes place following the authentication process.
https://cloudsek.com/threatintelligence/cve-2023-21752-privilege-escalation-vulnerability-on-windows-backup-service
https://www.infosecurity-magazine.com/news/hackers-exploit-flaw-windows/
Cloudsek
CVE-2023-21752: Privilege Escalation Vulnerability on Windows Backup Service | Threat Intelligence | CloudSEK
CloudSEK’s Threat Intelligence team has uncovered a cybercrime forum post, where an analysis of the recently disclosed CVE-2023-21752 was provided by a threat actor with a medium reputation
Vulnerability write-up - "Dangerous assumptions".
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space level of pages, and how the GitHub Security Lab used the kernel space information leak to construct a KASLR bypass.
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
The GitHub Blog
The code that wasn't there: Reading memory on an Android device by accident
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space…
Tool that could notify you when your hacking tools finish running.
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Email
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
GitHub
GitHub - projectdiscovery/notify: Notify is a Go-based assistance package that enables you to stream the output of several tools…
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms. - projectdiscovery/notify
Remote Code Execution via Prototype Pollution in Blitz.js.
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
Sonarsource
Remote Code Execution via Prototype Pollution in Blitz.js
We recently discovered a Prototype Pollution vulnerability in Blitz.js leading to Remote Code Execution. Learn about this bug class and how to avoid it in your code!
Microsoft Word Zero-Day (CVE-2023-21716) PoC goes public.
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
Help Net Security
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
A PoC for CVE-2023-21716, a RCE vulnerability in Microsoft Word that can be exploited via a malicious RTF document, is publicly available.
DataSurgeon: Tool to extract IP's, email addresses, hashes, files, credit cards, social security numbers and more from text.
https://github.com/Drew-Alleman/DataSurgeon
https://github.com/Drew-Alleman/DataSurgeon
GitHub
GitHub - Drew-Alleman/DataSurgeon: Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers…
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text - Drew-Alleman/DataSurgeon
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’.
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
NY Times
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’
This is the first time a paper trail has emerged to prove definitively that the Mexican military spied on citizens who were trying to expose its misdeeds.
CVE-2022-42475 | Zero-Day: Heap overflow in Fortinet's SSLVPN PoC. This PoC has hardcoded valid which change from system to system.
https://github.com/scrt/cve-2022-42475
https://github.com/scrt/cve-2022-42475
GitHub
GitHub - scrt/cve-2022-42475: POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon
POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon - scrt/cve-2022-42475