Incident Response in Google Cloud: Forensic Artifacts https://blog.sygnia.co/incident-response-in-google-cloud-forensic-artifacts
Sygnia
XZ Utils Backdoor – Advisory for Mitigation and Response
Organizations Urged to Address Newly Discovered Security Flaw to Prevent Unauthorized Access to Linux Machines.
Breaking out of Docker via runC – Explaining CVE-2019-5736 https://unit42.paloaltonetworks.com/breaking-docker-via-runc-explaining-cve-2019-5736/
Unit 42
Breaking out of Docker via runC – Explaining CVE-2019-5736
Last week (2019-02-11) a new vulnerability in runC was reported by its maintainers, originally found by Adam Iwaniuk and Borys Poplawski. Dubbed
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847) https://www.codelivly.com/linux-privilege-escalation-dirtypipe/
Codelivly
Linux Privilege Escalation: DirtyPipe (CVE 2022-0847)
CVE 2022-0847 is a privilege escalation vulnerability discovered by Max Kellerman present in Linux Kernel itself post versions
OpenSSH Pre-Auth Double Free CVE-2023-25136 – Writeup and Proof-of-Concept https://jfrog.com/blog/openssh-pre-auth-double-free-cve-2023-25136-writeup-and-proof-of-concept/
JFrog
OpenSSH Pre-Auth Double Free CVE-2023-25136 - Writeup and Proof-of-Concept
Understanding the OpenSSH CVE-2023-25136 high vulnerability. Read our analysis with Proof-of-Concept, learn what's vulnerable, and discover remediations.
Writing Malware With ChatGPT https://moohax.substack.com/p/writing-malware-with-chatgpt
moohax blog
Writing Malware With ChatGPT
There are a lot of articles floating around about how ChatGPT can or can't write malware, and I tend to avoid them. But having been in this blended ML Security space for a while now, I thought I might have something useful to share. In this post I'll write…
Information disclosure or GDPR breach? A Google tale… https://medium.com/@lukeberner/information-disclosure-to-gdpr-breach-a-google-tale-f9e99fd5d648
Medium
Information disclosure or GDPR breach? A Google tale…
This is a vulnerability I reported back in April, 2022
Analyzing an Old Netatalk dsi_writeinit Buffer Overflow Vulnerability in NETGEAR Router https://medium.com/@cq674350529/analyzing-an-old-netatalk-dsi-writeinit-buffer-overflow-vulnerability-in-netgear-router-4e9d59064584
Medium
Analyzing an Old Netatalk dsi_writeinit Buffer Overflow Vulnerability in NETGEAR Router
Due to lack of proper validation on certain fields, a buffer overflow would occur when calling memcpy() in dsi_writeinit()
👍1
The Linux Kernel and the Cursed Driver https://www.cyberark.com/resources/threat-research-blog/the-linux-kernel-and-the-cursed-driver
Cyberark
The Linux Kernel and the Cursed Driver
Introduction NTFS is a filesystem developed by Microsoft that was introduced in 1993. Since then, it has become the primary filesystem for Windows. In recent years, the need for an NTFS...
👍1
How to bypass sudo — exploit cve-2023–22809 vulnerability https://medium.com/@dev.nest/how-to-bypass-sudo-exploit-cve-2023-22809-vulnerability-296ef10a1466
Medium
How to bypass sudo — exploit cve-2023–22809 vulnerability
Recently, a new security vulnerability was discovered and reported by security researchers, named CVE-2023–22809.
👍1
Mr Steal Yo Crypto CTF: a set of challenges to learn offensive security of smart contracst https://github.com/0xToshii/mr-steal-yo-crypto-ctf-foundry
GitHub
GitHub - 0xToshii/mr-steal-yo-crypto-ctf-foundry: Solidity CTF challenges for mrstealyocrypto.xyz (foundry)
Solidity CTF challenges for mrstealyocrypto.xyz (foundry) - 0xToshii/mr-steal-yo-crypto-ctf-foundry
The Approach of TA413 for Tibetan Targets https://malgamy.github.io/malware-analysis/The-Approach-of-TA413-for-Tibetan-Targets/
MalGamy
The Approach of TA413 for Tibetan Targets
Summary This attack chain begins with the victim receiving a malicious RTF file through a phishing attack. When the victim opens the RTF file, it contains a hidden encoded file which is then decoded and executed using a shellcode. The executed file then performs…
Bit old, but worth reading it » 10 macOS Malware Outbreaks from 2019
https://www.sentinelone.com/blog/macos-malware-2019-first-six-months/
https://www.sentinelone.com/blog/macos-malware-2019-first-six-months/
SentinelOne
10 macOS Malware Outbreaks from 2019
The macOS Backdoor Trojan is just one of many malware threats for 2019. Learn about common macOS malware here with our comprehensive guide.
A guest in another process - a story of a remote thread crash https://m417z.com/A-guest-in-another-process-a-story-of-a-remote-thread-crash/
M417Z
A guest in another process - a story of a remote thread crash
In one of my previous blog posts, Implementing Global Injection and Hooking in Windows, I wrote about my journey in implementing global DLL injection for Windhawk, the customization marketplace for Windows programs. If you haven’t read it yet, I invite you…
All about LeakSanitizer https://maskray.me/blog/2023-02-12-all-about-leak-sanitizer
MaskRay
All about LeakSanitizer
Clang and GCC 4.9 implemented LeakSanitizer in 2013. LeakSanitizer (LSan) is a memory leak detector. It intercepts memory allocation functions and by default detects memory leaks at atexit time. The i
How I hacked into a Telecom Network — Part 1 (Getting the RCE) https://infosecwriteups.com/how-i-hacked-into-a-telecom-network-part-1-getting-the-rce-167c2bb320e6
Medium
How I hacked into a Telecom Network — Part 1 (Getting the RCE)
TLDR; Red Team Engagement for a telecom company. Got a foothold on the company’s Network Monitoring System (NMS). Sorted reverse shell…
CVE-2022-22655 - TCC - Location Services Bypass
https://theevilbit.github.io/posts/cve-2022-22655/
https://theevilbit.github.io/posts/cve-2022-22655/
theevilbit blog
CVE-2022-22655 - TCC - Location Services Bypass
This is a quick blogpost about a vulnerability I covered in our Black Hat Europe 2022 talk with Wojciech Regula.
In contrary to what people would expect, clients which can access location services are not maintained in one of the TCC databased, but in a separate…
In contrary to what people would expect, clients which can access location services are not maintained in one of the TCC databased, but in a separate…
Exploiting a remote heap overflow with a custom TCP stack https://www.synacktiv.com/publications/exploiting-a-remote-heap-overflow-with-a-custom-tcp-stack.html
Synacktiv
Exploiting a remote heap overflow with a custom TCP stack
XXE with Auto-Update in install4j https://frycos.github.io/vulns4free/2023/02/12/install4j-xxe.html
Frycos Security Diary
XXE with Auto-Update in install4j
Storyline
Understanding Stealerium Malware and Its Evasion Techniques https://www.uptycs.com/blog/understanding-stealerium-malware-and-its-evasion-techniques
Uptycs
Understanding Stealerium Malware and Its Evasion Techniques
We observed an increase in promotion of Stealerium on hacker forums. This malware is used by cybercriminals focused on stealing account credentials.