Taking control of VMWare through the universal host controller interface
Part 1: https://www.zerodayinitiative.com/blog/2019/5/7/taking-control-of-vmware-through-the-universal-host-controller-interface-part-1
Part 2: https://www.zerodayinitiative.com/blog/2019/8/15/taking-control-of-vmware-through-the-universal-host-control-interface-part-2
#ITSecurity #pentest #hacking #hack #it
Part 1: https://www.zerodayinitiative.com/blog/2019/5/7/taking-control-of-vmware-through-the-universal-host-controller-interface-part-1
Part 2: https://www.zerodayinitiative.com/blog/2019/8/15/taking-control-of-vmware-through-the-universal-host-control-interface-part-2
#ITSecurity #pentest #hacking #hack #it
Zero Day Initiative
Zero Day Initiative — Taking Control of VMware Through the Universal Host Controller Interface: Part 1
Pwn2Own is a heck of an amazing contest. Not only because of all the media and vibe that goes with it, but because of the caliber of skills that we see demonstrated. It’s also quite fascinating to see new people burst onto the scene with mad skills. Additionally…
gophish: Open-source phishing toolkit designed for businesses and penetration testers. It provides the ability to quickly and easily setup and execute phishing engagements and security awareness training.
https://t.co/socwoZRCPq
https://t.co/socwoZRCPq
GitHub
gophish/gophish
Open-Source Phishing Toolkit. Contribute to gophish/gophish development by creating an account on GitHub.
Hiding in plain sights with rogue/fake computer accounts:
1/2) https://t.co/qmoAW70RFz
2/2) https://t.co/E57cqSzKom
1/2) https://t.co/qmoAW70RFz
2/2) https://t.co/E57cqSzKom
blog.menasec.net
Threat Hunting #6 - Hiding in plain sights with real or rogue computer accounts - Part 1/2
Every Windows computer that joins a domain has a computer account. Similar to user accounts, computer accounts provide a means for authentic...
Quick Tip: While you are trying to find more subdomains and you use the Google Dork: site:*.example.com, NEVER forget to check
site:*.*.example.com and
site:*.*.*.example.com
site:*.*.example.com and
site:*.*.*.example.com
CVE-2019-12527: Code Execution on Squid Proxy Through a Heap Buffer Overflow - the Trend Micro Research team provides details about this recently patched vuln. https://t.co/9G2nBaU4kx
Zero Day Initiative
Zero Day Initiative — CVE-2019-12527: Code Execution on Squid Proxy Through a Buffer Overflow
In this excerpt of a Trend Micro Vulnerability Research Service report, Saran Neti and Sivathmican Sivakumaran of the Trend Micro Research Team detail a recent buffer overflow vulnerability in the Squid web proxy. A remote, unauthenticated attacker could…