Microsoft’s Cyber Defense Operations Center shares best practices – MSRC
https://blogs.technet.microsoft.com/msrc/2019/01/23/cdoc-best-practices/
https://blogs.technet.microsoft.com/msrc/2019/01/23/cdoc-best-practices/
Performing variant analysis with QL to find type confusion vulnerabilities in Ghostscript - Blog - LGTM
https://lgtm.com/blog/ghostscript_typeconfusion
https://lgtm.com/blog/ghostscript_typeconfusion
Github
Ghostscript type confusion: Using variant analysis to find vulnerabilities - GitHub Security Lab
This post describes how to perform variant analysis with CodeQL to catch missing type checking in Ghostscript, leading to the discovery of 3 new type confusion vulnerabilities (CVE-2018-19134, CVE-2018-19476, CVE-2018-19477)
GitHub - chryzsh/DarthSidious: Building an Active Directory domain and hacking it
https://github.com/chryzsh/DarthSidious/
https://github.com/chryzsh/DarthSidious/
GitHub
GitHub - chryzsh/DarthSidious: Building an Active Directory domain and hacking it
Building an Active Directory domain and hacking it - chryzsh/DarthSidious
Silence group targeting Russian Banks via Malicious CHM - ReaQta
https://reaqta.com/2019/01/silence-group-targeting-russian-banks/
https://reaqta.com/2019/01/silence-group-targeting-russian-banks/
Ibm
IBM QRadar EDR - Endpoint Detection and Response Solutions
IBM QRadar EDR is SaaS for endpoint detection and response. It helps secure endpoints from cyberattacks, detect anomalous behavior and remediate in near real time.
Microsoft Windows ".contact" File HTML Injection Mailto: Link Remote Code Execution 0day ZDI-CAN-7591 - CXSecurity.com
https://cxsecurity.com/issue/WLB-2019010225
https://cxsecurity.com/issue/WLB-2019010225
Cxsecurity
Microsoft Windows ".contact" File HTML Injection Mailto: Link Remote Code Execution 0day ZDI-CAN-7591 - CXSecurity.com
hyp3rlinx has realised a new security note Microsoft Windows ".contact" File HTML Injection Mailto: Link Remote Code Execution 0day ZDI-CAN-7591
GitHub - vulnersCom/api: Vulners Python API wrapper
https://github.com/vulnersCom/api
https://github.com/vulnersCom/api
GitHub
GitHub - vulnersCom/api: Vulners Python API wrapper
Vulners Python API wrapper. Contribute to vulnersCom/api development by creating an account on GitHub.
Technical White Paper: Finding and Exploiting the Check Point ZoneAlarm Anti-Virus for Local Privilege Escalation – illumant llc
https://www.illumant.com/blog/2019/01/16/check-point-anti-virus-technical-white-paper/
https://www.illumant.com/blog/2019/01/16/check-point-anti-virus-technical-white-paper/
illumant llc
Technical White Paper: Finding and Exploiting the Check Point ZoneAlarm Anti-Virus for Local Privilege Escalation
Introduction Illumant has discovered a critical vulnerability in Check Point’s ZoneAlarm anti-virus software. This vulnerability allows a low-privileged user to escalate privileges to SYSTEM-level with the anti-virus software enabled. The vulnerability is…
Proj 17: MITM with Evilginx2 (15 pts.)
https://samsclass.info/129S/proj/p17evilginx.htm
https://samsclass.info/129S/proj/p17evilginx.htm
How To Backdoor Any Electron Application | Context Information Security UK
https://www.contextis.com/en/blog/basic-electron-framework-exploitation
https://www.contextis.com/en/blog/basic-electron-framework-exploitation
Accenture
Accenture | Let there be change
Across industries and around the world, we’re creating better experiences for people using emerging technologies and human ingenuity. Together, we can reinvent anything.
Top 10 OSINT Tools to Help You Do Recon A Domain – Dalvik bytecode – Medium
https://medium.com/@dalvikbytecode/top-10-osint-tools-to-help-you-do-recon-a-domain-53d3af8b1ad2
https://medium.com/@dalvikbytecode/top-10-osint-tools-to-help-you-do-recon-a-domain-53d3af8b1ad2
Medium
Top 10 OSINT tools to help recon a website
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the…
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram…
https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1
https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1
Medium
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram, Cloudflare, etc)
TL;DR: Waiting in the 2FA page could allow you to log in without knowing the current password in many major websites.
Electronegativity is finally out! · Doyensec's Blog
https://blog.doyensec.com/2019/01/24/electronegativity.html
https://blog.doyensec.com/2019/01/24/electronegativity.html
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell - Malware - 0x00sec - The Home of the Hacker
http://0x00sec.org/t/bypassing-crowdstrike-falcon-detection-from-phishing-email-to-reverse-shell/10802
http://0x00sec.org/t/bypassing-crowdstrike-falcon-detection-from-phishing-email-to-reverse-shell/10802
0x00sec - The Home of the Hacker
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell
Update 2019/01/14: Crowdstrike asked me to share an official statement: “We appreciate you reporting this detection miss to us and allowing us to rapidly address this gap on January 11th. We do have a bug bounty program www.hackerone.com/crowdstrike or via…
Setting up IDA to analyze the ARM firmware. In this video we learn more about memory segments and about the interrupt vector table.
https://t.co/71sVhhcaWa https://t.co/x4s9NttzdT
https://t.co/71sVhhcaWa https://t.co/x4s9NttzdT
YouTube
Setup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4
We are using IDA to setup segments for the ARM hardware and then find the entry-point through static and dynamic analysis. GPIO: http://hertaville.com/stm32f...
GitHub - zMarch/Orc: Orc is a post-exploitation framework for Linux written in Bash
https://github.com/zMarch/Orc
https://github.com/zMarch/Orc
GitHub
GitHub - zMarch/Orc: Orc is a post-exploitation framework for Linux written in Bash
Orc is a post-exploitation framework for Linux written in Bash - zMarch/Orc
Intrusion Testing – From Evil Printers to Parent Domain Controllers – Checkmate
http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking – egre55 – thoughts on security
https://egre55.github.io/system-properties-uac-bypass/
https://egre55.github.io/system-properties-uac-bypass/
egre55.github.io
SystemPropertiesAdvanced.exe DLL Hijacking UAC Bypass