Forwarded from Mir Saman Tajbakhsh
Mobile phishing toolkit remotely controlled by an app
https://github.com/UndeadSec/SocialFishMobile
https://github.com/UndeadSec/SocialFishMobile
GitHub
GitHub - UndeadSec/SocialFishMobile: :iphone: An app to remote control SocialFish.
:iphone: :fish: An app to remote control SocialFish. - GitHub - UndeadSec/SocialFishMobile: :iphone: An app to remote control SocialFish.
Running iOS in QEMU to an interactive bash shell (1): tutorial
https://alephsecurity.com/2019/06/17/xnu-qemu-arm64-1/
https://alephsecurity.com/2019/06/17/xnu-qemu-arm64-1/
Alephsecurity
Running iOS in QEMU to an interactive bash shell (1): tutorial
Forwarded from CTF Community | Hints
Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide an account of my internship at Quarkslab which included obtaining, reversing and fuzzing the firmware, and finding a few new vulnerabilities.
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
#PWN
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html
#PWN
Quarkslab
Reverse-engineering Broadcom wireless chipsets - Quarkslab's blog
Broadcom is one of the major vendors of wireless devices worldwide. Since these chips are so widespread they constitute a high value target to attackers and any vulnerability found in them should be considered to pose high risk. In this blog post I provide…
SP 800-77 Rev.- 1 (DRAFT),- Guide to IPsec VPNs | CSRC :
https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/draft
https://csrc.nist.gov/publications/detail/sp/800-77/rev-1/draft
CSRC | NIST
NIST Special Publication (SP) 800-77 Rev. 1 (Draft), Guide to IPsec VPNs
Internet Protocol Security (IPsec) is a widely used network layer security control for protecting communications. IPsec is a framework of open standards for ensuring private communications over Internet Protocol (IP) networks. IPsec configuration is usually…
Cracking the Lens: Targeting HTTP's Hidden Attack Surface :
https://portswigger.net/kb/papers/crackingthelens-whitepaper.pdf
https://portswigger.net/kb/papers/crackingthelens-whitepaper.pdf