cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
cKure Red pinned «✔️ BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution. https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup.html»
This media is not supported in your browser
VIEW IN TELEGRAM
✔️ Zero-Day: Breaking BitLocker via MitM between CPU and TPM chip.
Please open Telegram to view this post
VIEW IN TELEGRAM
cKure Red pinned a video
🤍Rockyou-2024 has been released on July 4, 2024, in a 45 GB zip file.

Previous Rockyou-2021 had 8.4 billion passwords, and the new version has 1.5 billion (added by hacker 'ObamaCare'), making it a 10 billion word-list.
Please open Telegram to view this post
VIEW IN TELEGRAM
p25.pdf
593.2 KB
🖥 Header Enrichment: A technique used by Telco operators to acquire MSISDN (phone number) through a website (HTTP-GET is enough).

It can be used to trace users and target them for ads by the ISP or their associated vendors. And if the API key 🔑 is leaked through a vendor or ISP itself.

Scenarios:
1. The token can be used by anyone in a get request to fetch the end-user's phone number. This request can be posted via QR-codes of restaurant menus where there will be HTTP-302 (redirection) to the actual menu or by injecting 💉.js in a vulnerable website (viz. XSS); which is famous (like some blog or forum).

2. A user sharing hotspot from their phone, the hotspot client can acquire the phone number. In addition to this, if the HE enables authentication. This would lead to 0-click account takeover.


● I had tested systems for this implementation for a telco. The telco without informing users (IMHO) was sharing data to third parties.
-Admin cKure


Source: https://conferences.sigcomm.org/sigcomm/2015/pdf/papers/hotmiddlebox/p25.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
💥 VPN Zero-Day

DYK most VPN services can actually make you less secure? Today x.com/PET_Symposium, Benjamin Mixon-Baca will present research done in collaboration with the Citizen Lab about how VPNs can enable an attacker to act as an in-path router between you and the VPN server. The study identifies a new vulnerability called a “port shadow”.
https://petsymposium.org/popets/2024/popets-2024-0070.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
💥💥💥👉 Breached Forum backend data is publicly searchable.

Includes credentials, registrant IP, and last login IP, among other details.


https://bf.based.re/
Please open Telegram to view this post
VIEW IN TELEGRAM
cKure Red pinned «💥💥💥👉 Breached Forum backend data is publicly searchable. Includes credentials, registrant IP, and last login IP, among other details. https://bf.based.re/»
🎧Basic offensive security tactics for various domains.
Please open Telegram to view this post
VIEW IN TELEGRAM