“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations https://labs.guard.io/scammers-paradise-exploring-telegrams-dark-markets-breeding-ground-for-modern-phishing-a2225e51898e
Medium
“Scammers Paradise” —Exploring Telegram’s Dark Markets, Breeding Ground for Modern Phishing Operations
By Oleg Zaytsev, Nati Tal (Guardio Labs)
CVE-2023-6246: Heap-based buffer overflow in the glibc's syslog() https://www.qualys.com/2024/01/30/cve-2023-6246/syslog.txt
Ransomware’s PLAYing a Broken Game https://www.cyberark.com/resources/threat-research-blog/ransomwares-playing-a-broken-game
Cyberark
Ransomware’s PLAYing a Broken Game
Abstract The Play ransomware group is one of the most successful ransomware syndicates today. All it takes is a quick peek with a disassembler to know why this group has become infamous. This is...
ModSecurity: Path Confusion and really easy bypass on v2 and v3 https://blog.sicuranext.com/modsecurity-path-confusion-bugs-bypass/
Sicuranext Blog
ModSecurity: Path Confusion and really easy bypass on v2 and v3
TL;DR both ModSecurity v2 and v3 share a similar bug that can result in a really simple WAF bypass. The bug in the v3 branch has been fixed in version 3.0.12 and has been assigned the CVE number CVE-2024-1019. However, the bug in the v2 line remains
Bypassing ASLR and DEP on Windows 7: The Audio Converter Case https://tekwizz123.blogspot.com/2014/02/bypassing-aslr-and-dep-on-windows-7.html
Blogspot
Bypassing ASLR and DEP on Windows 7: The Audio Converter Case
Intro Just before we start, a little shoutout to http://formatmysourcecode.blogspot.co.uk/ for making all the exploit code look neat n ti...
Persistence – Windows Setup Script https://pentestlab.blog/2024/02/05/persistence-windows-setup-script/
Penetration Testing Lab
Persistence – Windows Setup Script
When the Windows Operating system is installed via a clean installation or via an upgrade, the Windows Setup binary is executed. The Windows setup allows custom scripts to be executed such as the S…
OPC UA Deep Dive Series (Part 9): Chaining Vulnerabilities to Exploit Softing OPC UA Integration Server https://claroty.com/team82/research/opc-ua-deep-dive-series-part-9-chaining-vulnerabilities-to-exploit-softing-opc-ua-integration-server
Claroty
OPC UA Deep Dive Series (Part 9): Chaining Vulnerabilities to Exploit Softing OPC UA Integration Server
In part nine of Claroty Team82's OPC UA Deep Dive Series, we describe remote code execution (RCE) attacks against OPC UA integration servers. We uncovered five new vulnerabilities during our research of the Softing Secure Integration Server, which we were…
Uncovering Hidden Threats with VirusTotal Code Insight https://blog.virustotal.com/2024/01/uncovering-hidden-threats-with.html
Virustotal
Uncovering Hidden Threats with VirusTotal Code Insight
In the constantly changing world of cybersecurity, generative AI is becoming an increasingly valuable tool. This blog post shows various exa...
Resolving code review comments with ML https://research.google/blog/resolving-code-review-comments-with-ml/
research.google
Resolving code review comments with ML
Posted by Alexander Frömmgen, Staff Software Engineer, and Lera Kharatyan, Senior Software Engineer, Core Systems & Experiences Code-change rev...
SSD Advisory – TOTOLINK LR1200GB Auth Bypass https://ssd-disclosure.com/ssd-advisory-totolink-lr1200gb-auth-bypass/
SSD Secure Disclosure
SSD Advisory - TOTOLINK LR1200GB Auth Bypass - SSD Secure Disclosure
Summary A vulnerability in TOTOLINK LR1200GB allows remote unauthenticated attackers to become authenticated due to a stack overflow vulnerability in the web interface. Additional post-auth vulnerabilities in the product allow for command injection and their…
APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints https://www.cyberark.com/resources/blog/apt29s-attack-on-microsoft-tracking-cozy-bears-footprints
Cyberark
APT29’s Attack on Microsoft: Tracking Cozy Bear’s Footprints
A new and concerning chapter has unfolded in these troubled times of geopolitical chaos. The Cozy Bear threat actor has caused significant breaches targeting Microsoft and HPE, and more are likely...
Windows Tasks Scheduler https://www.winitor.com/pdf/Windows-Task-Scheduler.pdf
Running BOFs with our 'bof-launcher' library https://blog.z-labs.eu/2024/02/08/bof-launcher.html
Overview: Evidence Collection of Ivanti Connected Secure Appliances https://medium.com/@DCSO_CyTec/overview-evidence-collection-of-ivanti-connected-secure-appliances-ce91b5eb4b18
Medium
Overview: Evidence Collection of Ivanti Connected Secure Appliances
This article summarizes methods that can be used to gather forensic evidence from Ivanti appliances.
The Art of Exploiting UAF by Ret2bpf in
Android Kernel https://i.blackhat.com/EU-21/Wednesday/EU-21-Jin-The-Art-of-Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-wp.pdf
Android Kernel https://i.blackhat.com/EU-21/Wednesday/EU-21-Jin-The-Art-of-Exploiting-UAF-by-Ret2bpf-in-Android-Kernel-wp.pdf
Unicode XSS via Combining Characters https://gist.github.com/paj28/86c7b8f37371d89c9a36ed0280fcf450
Gist
index.md
GitHub Gist: instantly share code, notes, and snippets.
Quick check for WP sites https://twitter.com/_4ft3rd4rk/status/1732989992409112827?s=20
X (formerly Twitter)
Lavesh Verma (@_4ft3rd4rk) on X
Whenever I see a wordpress site -
1. Run wpscan
2. /wp-json/wp/v2/users /wp-json/?rest_route=/wp/v2/users[/n] /?author=n and try common passwords.
3. /wp-admin/install.php
4. /wp-config.php.zip /wp-config.php.bak
5. /wp-content/debug.log
6. SSRF /wp-jso…
1. Run wpscan
2. /wp-json/wp/v2/users /wp-json/?rest_route=/wp/v2/users[/n] /?author=n and try common passwords.
3. /wp-admin/install.php
4. /wp-config.php.zip /wp-config.php.bak
5. /wp-content/debug.log
6. SSRF /wp-jso…
CVE-2024-0517 (Out of Bounds Write in V8) https://cwresearchlab.co.kr/entry/CVE-2024-0517-Out-of-Bounds-Write-in-V8
CW Research
CVE-2024-0517 (Out of Bounds Write in V8)
Introduction CVE-2024-0517은 Maglev가 derived constructor를 컴파일하는 과정에서 allocation folding을 처리할 때 발생하는 버그로, out of bounds write를 이용하여 arbitrary code execution이 가능한 취약점입니다. Environment Setting # install depot_tools cd ~ git clone https://chromium.googlesource…