Technical White Paper: Finding and Exploiting the Check Point ZoneAlarm Anti-Virus for Local Privilege Escalation – illumant llc
https://www.illumant.com/blog/2019/01/16/check-point-anti-virus-technical-white-paper/
https://www.illumant.com/blog/2019/01/16/check-point-anti-virus-technical-white-paper/
illumant llc
Technical White Paper: Finding and Exploiting the Check Point ZoneAlarm Anti-Virus for Local Privilege Escalation
Introduction Illumant has discovered a critical vulnerability in Check Point’s ZoneAlarm anti-virus software. This vulnerability allows a low-privileged user to escalate privileges to SYSTEM-level with the anti-virus software enabled. The vulnerability is…
Proj 17: MITM with Evilginx2 (15 pts.)
https://samsclass.info/129S/proj/p17evilginx.htm
https://samsclass.info/129S/proj/p17evilginx.htm
How To Backdoor Any Electron Application | Context Information Security UK
https://www.contextis.com/en/blog/basic-electron-framework-exploitation
https://www.contextis.com/en/blog/basic-electron-framework-exploitation
Accenture
Accenture | Let there be change
Across industries and around the world, we’re creating better experiences for people using emerging technologies and human ingenuity. Together, we can reinvent anything.
Top 10 OSINT Tools to Help You Do Recon A Domain – Dalvik bytecode – Medium
https://medium.com/@dalvikbytecode/top-10-osint-tools-to-help-you-do-recon-a-domain-53d3af8b1ad2
https://medium.com/@dalvikbytecode/top-10-osint-tools-to-help-you-do-recon-a-domain-53d3af8b1ad2
Medium
Top 10 OSINT tools to help recon a website
Open-source intelligence (OSINT) is data collected from publicly available sources to be used in an intelligence context. In the…
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram…
https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1
https://medium.com/@lukeberner/how-i-abused-2fa-to-maintain-persistence-after-a-password-change-google-microsoft-instagram-7e3f455b71a1
Medium
How I abused 2FA to maintain persistence after a password change (Google, Microsoft, Instagram, Cloudflare, etc)
TL;DR: Waiting in the 2FA page could allow you to log in without knowing the current password in many major websites.
Electronegativity is finally out! · Doyensec's Blog
https://blog.doyensec.com/2019/01/24/electronegativity.html
https://blog.doyensec.com/2019/01/24/electronegativity.html
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell - Malware - 0x00sec - The Home of the Hacker
http://0x00sec.org/t/bypassing-crowdstrike-falcon-detection-from-phishing-email-to-reverse-shell/10802
http://0x00sec.org/t/bypassing-crowdstrike-falcon-detection-from-phishing-email-to-reverse-shell/10802
0x00sec - The Home of the Hacker
Bypassing Crowdstrike Falcon detection, from phishing email to reverse shell
Update 2019/01/14: Crowdstrike asked me to share an official statement: “We appreciate you reporting this detection miss to us and allowing us to rapidly address this gap on January 11th. We do have a bug bounty program www.hackerone.com/crowdstrike or via…
Setting up IDA to analyze the ARM firmware. In this video we learn more about memory segments and about the interrupt vector table.
https://t.co/71sVhhcaWa https://t.co/x4s9NttzdT
https://t.co/71sVhhcaWa https://t.co/x4s9NttzdT
YouTube
Setup and Find Entry-point in ARM Firmware - Hardware Wallet Research #4
We are using IDA to setup segments for the ARM hardware and then find the entry-point through static and dynamic analysis. GPIO: http://hertaville.com/stm32f...
GitHub - zMarch/Orc: Orc is a post-exploitation framework for Linux written in Bash
https://github.com/zMarch/Orc
https://github.com/zMarch/Orc
GitHub
GitHub - zMarch/Orc: Orc is a post-exploitation framework for Linux written in Bash
Orc is a post-exploitation framework for Linux written in Bash - zMarch/Orc
Intrusion Testing – From Evil Printers to Parent Domain Controllers – Checkmate
http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
http://niiconsulting.com/checkmate/2019/01/intrusion-testing-from-evil-printers-to-parent-domain-controllers/
UAC Bypass via SystemPropertiesAdvanced.exe and DLL Hijacking – egre55 – thoughts on security
https://egre55.github.io/system-properties-uac-bypass/
https://egre55.github.io/system-properties-uac-bypass/
egre55.github.io
SystemPropertiesAdvanced.exe DLL Hijacking UAC Bypass
Custom-Meterpreter loader in 2019 – Astr0baby's not so random thoughts _____ rand() % 100;
https://astr0baby.wordpress.com/2019/01/26/custom-meterpreter-loader-in-2019/
https://astr0baby.wordpress.com/2019/01/26/custom-meterpreter-loader-in-2019/
Astr0baby's not so random thoughts _____ rand() % 100;
Custom-Meterpreter loader in 2019
I have been using this generator for quite a while and it has always worked for me. Decided to enhance it with an additional function that spoofs certificates from websites and signs executable fro…
Open Url Redirects & exploiting them - Tutorial by zseano | BugBountyNotes.com
https://www.bugbountynotes.com/mobile/tutorial?id=1
https://www.bugbountynotes.com/mobile/tutorial?id=1
Hackers abusing Google App Engine to spread PDF malware
https://www.hackread.com/hackers-abusing-google-app-engine-to-spread-pdf-malware/
https://www.hackread.com/hackers-abusing-google-app-engine-to-spread-pdf-malware/
HackRead | Latest Cybersecurity and Hacking News Site
Hackers abusing Google App Engine to spread PDF malware
The Cobalt Strike strikes back.
21 things you can do with XSS – Somdev Sangwan
https://s0md3v.github.io/21-things-xss/
https://s0md3v.github.io/21-things-xss/
SSRF — Server Side Request Forgery (Types and ways to exploit it) Part-3
https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-3-b0f5997e3739
https://medium.com/@madrobot/ssrf-server-side-request-forgery-types-and-ways-to-exploit-it-part-3-b0f5997e3739
Medium
SSRF — Server Side Request Forgery (Types and ways to exploit it) Part-3
Lets get in to Live Examples
Bypass file upload filter with .htaccess // Personnal security blog
https://thibaudrobin.github.io/articles/bypass-filter-upload/
https://thibaudrobin.github.io/articles/bypass-filter-upload/
Exploiting Android Devices Running Insecure Remote ADB Service
https://medium.com/@madrobot/exploiting-android-devices-running-insecure-remote-adb-service-4490cc6a2282
https://medium.com/@madrobot/exploiting-android-devices-running-insecure-remote-adb-service-4490cc6a2282
Medium
Exploiting Android Devices Running Insecure Remote ADB Service
What is ADB? Android Debug Bridge (adb) is a versatile command-line tool that lets you communicate with a device. The adb command…
A Deeper Look into XSS Payloads | Digital Interruption Research
https://research.digitalinterruption.com/2018/12/18/a-deeper-look-into-xss-payloads/
https://research.digitalinterruption.com/2018/12/18/a-deeper-look-into-xss-payloads/
Digitalinterruption
A Deeper Look into XSS Payloads | Digital Interruption Research
Over time, the type of vulnerabilities seen in the web app landscape changes. One that has persisted year in, year out, is cross-site scripting. It’s been a ...