Froxlor v2.0.6 Remote Command Execution (CVE-2023-0315) https://shells.systems/froxlor-v2-0-6-remote-command-execution-cve-2023-0315/
Shells.Systems
Froxlor v2.0.6 Remote Command Execution (CVE-2023-0315) - Shells.Systems
Estimated Reading Time: 8 minutesSummary about Froxlor Froxlor is a web-based server management software for Linux-based operating systems. It is primarily used to manage web hosting environments and allows users to create and manage websites, email accounts…
Precision Munitions for Denial of Service https://beny23.github.io/posts/precision_munitions_for_denial_of_service/
beny23.github.io
Precision Munitions for Denial of Service
There’s a metaphor about the fight between attackers and defenders in the Denial of Service cybersecurity game. It’s an “arms race” between ever bigger attacks throwing huge amounts of traffic at ever more sophisticated defenses (e.g. AWS shield).
Incidentally…
Incidentally…
PowerShell-FIM: Proof-of-concept file integrity monitor written in PowerShell https://github.com/CsaProtocol/PowerShell-FIM
Come to the dark side: hunting IT professionals on the dark web https://securelist.com/darknet-it-headhunting/108526/
Securelist
IT specialists search and recruitment on the dark web
We have analyzed more than 800 IT job ads and resumes on the dark web. Here is what the dark web job market looks like.
How to Develop Intuition for Security Research: Apply the Scientific Method https://www.researchinnovations.com/post/how-to-develop-intuition-for-security-research-apply-the-scientific-method
Research Innovations
How to Develop Intuition for Security Research: Apply the Scientific Method
Intuition plays a prominent role in security research. It guides a researcher’s thought process to determine how to prioritize system components for analysis. What is the source of intuition? Can its source be defined and systematized so new researchers can…
CVE-2023-22374: F5 BIG-IP Format String Vulnerability https://www.rapid7.com/blog/post/2023/02/01/cve-2023-22374-f5-big-ip-format-string-vulnerability/
Rapid7
CVE-2023-22374: F5 BIG-IP Format String Vulnerability | Rapid7 Blog
Rapid7 found an additional vulnerability in the appliance-mode REST interface. We disclosing it in accordance with our vulnerability disclosure policy.
Jumping into SOCKS https://sensepost.com/blog/2023/jumping-into-socks/
🔥1
Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1 https://www.cyberark.com/resources/threat-research-blog/breaking-docker-named-pipes-systematically-docker-desktop-privilege-escalation-part-1
Cyberark
Breaking Docker Named Pipes SYSTEMatically: Docker Desktop Privilege Escalation – Part 1
Everything started when I was researching Windows containers. It required installing Docker Desktop for Windows, and I couldn’t help but notice that there were many Docker processes. Since some of...
A collection of Frida.re instrumentation scripts to facilitate reverse engineering of mobile apps https://github.com/0xdea/frida-scripts
GitHub
GitHub - 0xdea/frida-scripts: A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more.
A collection of my Frida instrumentation scripts to reverse engineer mobile apps and more. - 0xdea/frida-scripts
ImageMagick: The hidden vulnerability behind your online images https://www.metabaseq.com/imagemagick-zero-days/
Tracing the Linux kernel using Exein Pulsar: a 5 Minute Tutorial https://blog.exein.io/pulsar-tutorial
Exein
Tracing the Linux kernel using Exein Pulsar: a 5 Minute Tutorial
This hands on tutorial goes through the installation, setup and usage of Exein Pulsar.
Pulsar is an open-source security observability framework that uses eBPF to trace events in the kernel space.
Pulsar is an open-source security observability framework that uses eBPF to trace events in the kernel space.
HyperDbg Debugger: open-source, community-driven, hypervisor-assisted, user-mode, and kernel-mode Windows debugger https://github.com/HyperDbg/HyperDbg
GitHub
GitHub - HyperDbg/HyperDbg: State-of-the-art native debugging tools
State-of-the-art native debugging tools. Contribute to HyperDbg/HyperDbg development by creating an account on GitHub.
PixPirate: a new Brazilian Banking Trojan https://www.cleafy.com/cleafy-labs/pixpirate-a-new-brazilian-banking-trojan
Cleafy
PixPirate: a new Brazilian Banking Trojan | Cleafy LABS
Learn about PixPirate, the new Android banking trojan discovered by Cleafy TIR. This malware uses ATS to automate malicious money transfers via the Pix payment platform used by multiple Brazilian banks. Discover its features, including interception of banking…
Incident Response in Google Cloud: Forensic Artifacts https://blog.sygnia.co/incident-response-in-google-cloud-forensic-artifacts
Sygnia
XZ Utils Backdoor – Advisory for Mitigation and Response
Organizations Urged to Address Newly Discovered Security Flaw to Prevent Unauthorized Access to Linux Machines.
Breaking out of Docker via runC – Explaining CVE-2019-5736 https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/
Unit 42
Breaking out of Docker via runC – Explaining CVE-2019-5736
Last week (2019-02-11) a new vulnerability in runC was reported by its maintainers, originally found by Adam Iwaniuk and Borys Poplawski. Dubbed
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847) https://www.codelivly.com/linux-privilege-escalation-dirtypipe/
Codelivly
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)
CVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman present in Linux Kernel itself post versions
OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
JFrog
OpenSSH Pre-Auth Double Free CVE-2023-25136 - Writeup and Proof-of-Concept
Understanding the OpenSSH CVE-2023-25136 high vulnerability. Read our analysis with Proof-of-Concept, learn what's vulnerable, and discover remediations.
Writing Malware With ChatGPT https://moohax.substack.com/p/writing-malware-with-chatgpt
moohax blog
Writing Malware With ChatGPT
There are a lot of articles floating around about how ChatGPT can or can't write malware, and I tend to avoid them. But having been in this blended ML Security space for a while now, I thought I might have something useful to share. In this post I'll write…
Information disclosure or GDPR breach? A Google tale… https://medium.com/@lukeberner/information-disclosure-to-gdpr-breach-a-google-tale-f9e99fd5d648
Medium
Information disclosure or GDPR breach? A Google tale…
This is a vulnerability I reported back in April, 2022