cKure Red
2.39K subscribers
70 photos
34 videos
21 files
449 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

☕️ or queries email us
📨 i@ckure.org
Download Telegram
cKure Red pinned «✔️ BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution. https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup.html»
This media is not supported in your browser
VIEW IN TELEGRAM
✔️ Zero-Day: Breaking BitLocker via MitM between CPU and TPM chip.
Please open Telegram to view this post
VIEW IN TELEGRAM
cKure Red pinned a video
🤍Rockyou-2024 has been released on July 4, 2024, in a 45 GB zip file.

Previous Rockyou-2021 had 8.4 billion passwords, and the new version has 1.5 billion (added by hacker 'ObamaCare'), making it a 10 billion word-list.
Please open Telegram to view this post
VIEW IN TELEGRAM
p25.pdf
593.2 KB
🖥 Header Enrichment: A technique used by Telco operators to acquire MSISDN (phone number) through a website (HTTP-GET is enough).

It can be used to trace users and target them for ads by the ISP or their associated vendors. And if the API key 🔑 is leaked through a vendor or ISP itself.

Scenarios:
1. The token can be used by anyone in a get request to fetch the end-user's phone number. This request can be posted via QR-codes of restaurant menus where there will be HTTP-302 (redirection) to the actual menu or by injecting 💉.js in a vulnerable website (viz. XSS); which is famous (like some blog or forum).

2. A user sharing hotspot from their phone, the hotspot client can acquire the phone number. In addition to this, if the HE enables authentication. This would lead to 0-click account takeover.


● I had tested systems for this implementation for a telco. The telco without informing users (IMHO) was sharing data to third parties.
-Admin cKure


Source: https://conferences.sigcomm.org/sigcomm/2015/pdf/papers/hotmiddlebox/p25.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
💥 VPN Zero-Day

DYK most VPN services can actually make you less secure? Today x.com/PET_Symposium, Benjamin Mixon-Baca will present research done in collaboration with the Citizen Lab about how VPNs can enable an attacker to act as an in-path router between you and the VPN server. The study identifies a new vulnerability called a “port shadow”.
https://petsymposium.org/popets/2024/popets-2024-0070.pdf
Please open Telegram to view this post
VIEW IN TELEGRAM
💥💥💥👉 Breached Forum backend data is publicly searchable.

Includes credentials, registrant IP, and last login IP, among other details.


https://bf.based.re/
Please open Telegram to view this post
VIEW IN TELEGRAM
cKure Red pinned «💥💥💥👉 Breached Forum backend data is publicly searchable. Includes credentials, registrant IP, and last login IP, among other details. https://bf.based.re/»
🎧Basic offensive security tactics for various domains.
Please open Telegram to view this post
VIEW IN TELEGRAM
💥💥💥
‼️‼️‼️

Cyber-Warfare
📍Apparently the Jew ✡️ (Israel) used sonic booms 💥 of fighter jets (apparently F-35s) in Beirut, Lebanon 🇱🇧 and nearby areas during the telecast of Hizbollah chief Hassan Nasrallah's speech to get his location in a corelation attack (had it been live).

https://x.com/Lonewolf8ier/status/1820825946212978816
Please open Telegram to view this post
VIEW IN TELEGRAM
☣️ Project Zero: ‘It Will Take All of Us to End The Era of Zero Days’.

It’s becoming increasingly apparent that security research is not enough to end the era of zero days.
Natalie Silvanovich

https://duo.com/decipher/project-zero-it-will-take-all-of-us-to-end-the-era-of-zero-days
Please open Telegram to view this post
VIEW IN TELEGRAM