Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
https://vulners.com/talosblog/TALOSBLOG:7E9E33CAB0FFF41F91CB12E204945F7F
Vulners Database
Microsoft Patch Tuesday — January 2019: Vulnerability disclosures and Snort coverage
Microsoft released its monthly security update today, disclosing a variety of vulnerabilities in several of its products. The latest Patch Tuesday covers 49 vulnerabilities, seven of which are rated “critical,” 40 that are considered “important” and one that…
From basic User to full right Admin access on the server (via XSS, LFI, WebShell)
https://medium.com/@valeriyshevchenko/from-basic-user-to-full-right-admin-access-on-the-server-via-xss-lfi-webshell-995f816a6da2
https://medium.com/@valeriyshevchenko/from-basic-user-to-full-right-admin-access-on-the-server-via-xss-lfi-webshell-995f816a6da2
Medium
From basic User to full right Admin access on the server (via XSS, LFI, WebShell)
Imagine that you have a business in partnership with someone. At some point, you have an internal conflict. What will you do as a main…
Mjag dropper: Using decoy documents to drop RATs | Zscaler Blog
https://www.zscaler.com/blogs/research/mjag-dropper-using-decoy-documents-drop-rats
https://www.zscaler.com/blogs/research/mjag-dropper-using-decoy-documents-drop-rats
Zscaler
Mjag dropper: Using decoy documents to drop RATs
Zscaler Security Research technically analyzed Mjag dropper and Punisher RAT. Mjag dropper is compiled in the Microsoft .NET framework, and its original binary is obfuscated using SmartAssembly. Read more..
COM XSL Transformation: Bypassing Microsoft Application Control Solutions (CVE-2018-8492) – | bohops |
https://bohops.com/2019/01/10/com-xsl-transformation-bypassing-microsoft-application-control-solutions-cve-2018-8492/
https://bohops.com/2019/01/10/com-xsl-transformation-bypassing-microsoft-application-control-solutions-cve-2018-8492/
bohops
COM XSL Transformation: Bypassing Microsoft Application Control Solutions (CVE-2018-8492)
Introduction Greetings, Everyone! It has been several months since I’ve blogged, so it seems fitting to start the New Year off with a post about two topics that I thoroughly enjoy exploring: …
A guide for windows penetration testing - Rogue Security
https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/
https://www.roguesecurity.in/2018/12/02/a-guide-for-windows-penetration-testing/
Tips for bug bounty beginners from a real life experience - Renaud Martinet
https://renaudmarti.net/posts/first-bug-bounty-submission/
https://renaudmarti.net/posts/first-bug-bounty-submission/
Renaud Martinet
Tips for bug bounty beginners from a real life experience
I’ve been aware of bug bounties for a few years now but never really felt I was capable of participating.
GitHub - trimstray/the-book-of-secret-knowledge: A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
https://github.com/trimstray/the-book-of-secret-knowledge
https://github.com/trimstray/the-book-of-secret-knowledge
GitHub
GitHub - trimstray/the-book-of-secret-knowledge: A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners…
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more. - trimstray/the-book-of-secret-knowledge
GitHub - P0cL4bs/WiFi-Pumpkin: Framework for Rogue Wi-Fi Access Point Attack
https://github.com/P0cL4bs/WiFi-Pumpkin
https://github.com/P0cL4bs/WiFi-Pumpkin
GitHub
GitHub - P0cL4bs/WiFi-Pumpkin-deprecated: DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3
DEPRECATED, wifipumpkin3 -> https://github.com/P0cL4bs/wifipumpkin3 - P0cL4bs/WiFi-Pumpkin-deprecated
Python Tutorials
http://www.primalsecurity.net/tutorials/python-tutorials/
http://www.primalsecurity.net/tutorials/python-tutorials/
www.primalsecurity.net
Overwhelmed With Homework? Try These 10 Tips to Reduce Stress | primalsecurity.net
Homework meltdown is not uncommon among students at any academic level, college, high school, or even middle school. To many students, homework can feel like a
awesome-web-security/README.md at master · qazbnm456/awesome-web-security · GitHub
https://github.com/qazbnm456/awesome-web-security/blob/master/README.md#pocs-database
https://github.com/qazbnm456/awesome-web-security/blob/master/README.md#pocs-database
GitHub
awesome-web-security/README.md at master · qazbnm456/awesome-web-security
🐶 A curated list of Web Security materials and resources. - qazbnm456/awesome-web-security
Dropgangs, or the future of darknet markets • Opaque Link
https://opaque.link/post/dropgang/
https://opaque.link/post/dropgang/
Gaining access to Uber's user data through AMPScript evaluation – Assetnote
http://blog.assetnote.io/bug-bounty/2019/01/14/gaining-access-to-ubers-user-data-through-ampscript-evaluation/
http://blog.assetnote.io/bug-bounty/2019/01/14/gaining-access-to-ubers-user-data-through-ampscript-evaluation/
Dokany/Google Drive File Stream Kernel Stack-based Buffer Overflow Vulnerability | GreyHatHacker.NET
http://www.greyhathacker.net/?p=1041
http://www.greyhathacker.net/?p=1041
GitHub - Bashfuscator/Bashfuscator: A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team.
https://github.com/Bashfuscator/Bashfuscator
https://github.com/Bashfuscator/Bashfuscator
GitHub
GitHub - Bashfuscator/Bashfuscator: A fully configurable and extendable Bash obfuscation framework. This tool is intended to help…
A fully configurable and extendable Bash obfuscation framework. This tool is intended to help both red team and blue team. - Bashfuscator/Bashfuscator
SMB and the return of the worm
https://blogs.cisco.com/security/smb-and-the-return-of-the-worm
https://blogs.cisco.com/security/smb-and-the-return-of-the-worm
Cisco Blogs
SMB and the return of the worm
Watch the threat landscape long enough, and you’ll see that some things are cyclical. Threat types and attack methods fall in and out of fashion. As the use of one...
Introduction to WebAuthn API – Ackermann Yuriy – Medium
https://medium.com/@herrjemand/introduction-to-webauthn-api-5fd1fb46c285
https://medium.com/@herrjemand/introduction-to-webauthn-api-5fd1fb46c285
Medium
Introduction to WebAuthn API
…or Level 1 Credential Management API extension for Public Key Credentials, and the untold stories of managing credentials in the browser…
Are you submitting bugs for free when others are being paid? Welcome to BugBounties!
https://medium.com/@zseano/are-you-submitting-bugs-for-free-when-others-are-being-paid-welcome-to-bugbounties-9e0fdb40a837
https://medium.com/@zseano/are-you-submitting-bugs-for-free-when-others-are-being-paid-welcome-to-bugbounties-9e0fdb40a837