cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.

https://www.usenix.org/system/files/usenixsecurity23-schepers.pdf
cKure Red pinned «Zero-Day (via CVE-2023-45866): Exploiting Zero-click Android Bluetooth vulnerability to inject keystrokes without pairing. https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/»
BurpSuite's chromium browser adds a header as it sends the request across to the server.

Sec-Ua*

I found it when one website blocked my requests for a normal login (with a 302 redirect to WAF's soft error). This is over a half year old story. Thought of sharing.
Channel photo updated
Interesting thread on Azure vulnerability to take over Bing search results.

https://twitter.com/hillai/status/1641146508639600646
Major cyber-attack on Israel 🇮🇱 by pro-Pslestine hacker groups amid ongoing extermination cum genocide of Muslims ☪️ and Christians ✝️ in Gaza and West-Bank Palestine 🇵🇸 by Israel.

The Eilat power station is pwned and apparently electricity in some areas has been affected by this ICS-SCADA hack.
¤ ARM Exploitation - Defeating DEP - executing mprotect()

https://blog.3or.de/arm-exploitation-defeating-dep-executing-mprotect

¤ ARM Exploitation - Defeating DEP - execute system()

https://blog.3or.de/arm-exploitation-defeating-dep-execute-system

¤ ARM Exploitation - Setup and Tools

https://blog.3or.de/arm-exploitation-setup-and-tools

¤ ARM Exploitation: Return oriented Programming (Building ROP Chains)

https://blog.3or.de/arm-exploitation-return-oriented-programming
Zero-Day: A team of researchers from IBM and the VU Amsterdam university in the Netherlands on Tuesday disclosed the details of a new type of data leakage attack impacting all major CPU makers, as well as some widely used software.

https://download.vusec.net/papers/ghostrace_sec24.pdf

https://www.securityweek.com/major-cpu-software-vendors-impacted-by-new-ghostrace-attack