Top 10 Web Hacking Techniques of 2022.
https://portswigger.net/research/top-10-web-hacking-techniques-of-2022
https://portswigger.net/research/top-10-web-hacking-techniques-of-2022
A simple script as malware that will turn off the firewall, start an HTTP server, forward its port through 'ngrok' and send the URL of the server through a Telegram bot.
https://github.com/usdchef/malvinci
https://github.com/usdchef/malvinci
GitHub
GitHub - mazithesage/malvinci: This simple but powerful script will introduce a new type of malware that will turn off the firewall…
This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its port through ngrok, and send the URL of the server through a ...
Privacy-Breach: United States 🇺🇸
The IRS has paid an Israeli 🇮🇱 company! 'Cobwebs Technologies' hundreds of thousands of dollars for an internet investigative tool that allows the IRS to conduct undercover investigations online, according to internal IRS documents obtained by Motherboard.
vice.com/en/article/xgynn4/company-helping-irs-go-undercover-cobwebs-technologies
The IRS has paid an Israeli 🇮🇱 company! 'Cobwebs Technologies' hundreds of thousands of dollars for an internet investigative tool that allows the IRS to conduct undercover investigations online, according to internal IRS documents obtained by Motherboard.
vice.com/en/article/xgynn4/company-helping-irs-go-undercover-cobwebs-technologies
VICE
The Company Helping the IRS Go Undercover Online
Internal IRS documents obtained by Motherboard show the IRS paid Israeli firm Cobwebs Technologies hundreds of thousands of dollars for a tool that helps it monitor the web while undercover.
CVE-2023-21752; allows a basic user to execute arbitrary code on a host to delete files from [a] specified storage path, from Windows Backup and Restore service.
The vulnerability is triggered using the Race Condition between temporary file creation and deletion, which takes place following the authentication process.
https://cloudsek.com/threatintelligence/cve-2023-21752-privilege-escalation-vulnerability-on-windows-backup-service
https://www.infosecurity-magazine.com/news/hackers-exploit-flaw-windows/
The vulnerability is triggered using the Race Condition between temporary file creation and deletion, which takes place following the authentication process.
https://cloudsek.com/threatintelligence/cve-2023-21752-privilege-escalation-vulnerability-on-windows-backup-service
https://www.infosecurity-magazine.com/news/hackers-exploit-flaw-windows/
Cloudsek
CVE-2023-21752: Privilege Escalation Vulnerability on Windows Backup Service | Threat Intelligence | CloudSEK
CloudSEK’s Threat Intelligence team has uncovered a cybercrime forum post, where an analysis of the recently disclosed CVE-2023-21752 was provided by a threat actor with a medium reputation
Vulnerability write-up - "Dangerous assumptions".
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
https://www.codean.io/blog/vulnerability-write-up---%22dangerous-assumptions%22
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space level of pages, and how the GitHub Security Lab used the kernel space information leak to construct a KASLR bypass.
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
https://github.blog/2023-02-23-the-code-that-wasnt-there-reading-memory-on-an-android-device-by-accident/
The GitHub Blog
The code that wasn't there: Reading memory on an Android device by accident
CVE-2022-25664, a vulnerability in the Qualcomm Adreno GPU, can be used to leak large amounts of information to a malicious Android application. Learn more about how the vulnerability can be used to leak information in both the user space and kernel space…
Tool that could notify you when your hacking tools finish running.
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Email
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
Supports
✅ Slack
✅ Discord
✅ Pushover
✅ Teams
✅ Goolge Chat
✅ Custom options
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms.
https://github.com/projectdiscovery/notify
GitHub
GitHub - projectdiscovery/notify: Notify is a Go-based assistance package that enables you to stream the output of several tools…
Notify is a Go-based assistance package that enables you to stream the output of several tools (or read from a file) and publish it to a variety of supported platforms. - projectdiscovery/notify
Remote Code Execution via Prototype Pollution in Blitz.js.
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
https://www.sonarsource.com/blog/blitzjs-prototype-pollution/
Sonarsource
Remote Code Execution via Prototype Pollution in Blitz.js
We recently discovered a Prototype Pollution vulnerability in Blitz.js leading to Remote Code Execution. Learn about this bug class and how to avoid it in your code!
Microsoft Word Zero-Day (CVE-2023-21716) PoC goes public.
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
https://qoop.org/publications/cve-2023-21716-rtf-fonttbl.md
https://www.helpnetsecurity.com/2023/03/06/cve-2023-21716-poc/
Help Net Security
PoC exploit for recently patched Microsoft Word RCE is public (CVE-2023-21716)
A PoC for CVE-2023-21716, a RCE vulnerability in Microsoft Word that can be exploited via a malicious RTF document, is publicly available.
DataSurgeon: Tool to extract IP's, email addresses, hashes, files, credit cards, social security numbers and more from text.
https://github.com/Drew-Alleman/DataSurgeon
https://github.com/Drew-Alleman/DataSurgeon
GitHub
GitHub - Drew-Alleman/DataSurgeon: Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers…
Quickly Extracts IP's, Email Addresses, Hashes, Files, Credit Cards, Social Security Numbers and a lot More From Text - Drew-Alleman/DataSurgeon
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’.
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
https://www.nytimes.com/2023/03/07/world/americas/mexico-military-surveillance.html
NY Times
Spying by Mexico’s Armed Forces Brings Fears of a ‘Military State’
This is the first time a paper trail has emerged to prove definitively that the Mexican military spied on citizens who were trying to expose its misdeeds.
CVE-2022-42475 | Zero-Day: Heap overflow in Fortinet's SSLVPN PoC. This PoC has hardcoded valid which change from system to system.
https://github.com/scrt/cve-2022-42475
https://github.com/scrt/cve-2022-42475
GitHub
GitHub - scrt/cve-2022-42475: POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon
POC code to exploit the Heap overflow in Fortinet's SSLVPN daemon - scrt/cve-2022-42475
■■■■□ Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets.
https://www.bleepingcomputer.com/news/security/google-finds-18-zero-day-vulnerabilities-in-samsung-exynos-chipsets/
https://www.bleepingcomputer.com/news/security/google-finds-18-zero-day-vulnerabilities-in-samsung-exynos-chipsets/
BleepingComputer
Google finds 18 zero-day vulnerabilities in Samsung Exynos chipsets
Project Zero, Google's zero-day bug-hunting team, discovered and reported 18 zero-day vulnerabilities in Samsung's Exynos chipsets used in mobile devices, wearables, and cars.
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation.
https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
https://www.mandiant.com/resources/blog/fortinet-malware-ecosystem
Google Cloud Blog
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation | Google Cloud Blog
A suspected Chinese actor used a zero-day vulnerability in FortiOS and multiple custom malware families as part of an espionage campaign.
aCropalypse vulnerability can recover sensitive information previously removed from Pixel screenshots.
https://www.xda-developers.com/acropalypse-vulnerability/
https://www.xda-developers.com/acropalypse-vulnerability/
XDA
aCropalypse vulnerability can recover sensitive information previously removed from Pixel screenshots
A newly revealed vulnerability could reveal previously redacted details from screenshots if the edits were made using a Pixel device.