Information Security
@sec_nerd_en
416
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
416 subscribers
Information Security
https://hackingiscool.pl/cmdhijack-command-argument-confusion-with-path-traversal-in-cmd-exe/
HACKINGISCOOL
Cmd Hijack - a command/argument confusion with path traversal in cmd.exe
This one is about an interesting behavior
đź¤
I identified in cmd.exe in result of many weeks of intermittent (private time, every now and then) research in pursuit of some new OS Command Injection attack vectors.
So I was mostly trying to:
* find an encoding…
Information Security
https://github.com/Microsvuln/cve-2019-1458_POC
GitHub
GitHub - Microsvuln/cve-2019-1458_POC: POC for cve-2019-1458
POC for cve-2019-1458. Contribute to Microsvuln/cve-2019-1458_POC development by creating an account on GitHub.
Information Security
https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/
Artem Kondratenko
CVE-2017-3881 Cisco Catalyst RCE Proof-Of-Concept
Digging deep into CIA Vault 7 documents to craft Proof-Of-Concept remote code execution for Cisco Catalyst switches
Information Security
http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/
Information Security
https://zerosum0x0.blogspot.com/2016/09/reverse-engineering-cisco-asa-for.html
Blogspot
Reverse Engineering Cisco ASA for EXTRABACON Offsets
Update Sept. 24: auxiliary/admin/cisco/cisco_asa_extrabacon is now in the Metasploit master repo. There is support for the original ExtraBa...
Information Security
https://blog.talosintelligence.com/2020/05/dynamic-data-resolver-1-0.html
Cisco Talos Blog
Dynamic Data Resolver (DDR) — IDA Plugin 1.0 beta
10/20/20 Update: A new version of this software and associated blog can be found here
Executive summary Static reverse-engineering in IDA can often be problematic. Certain values are calculated at run time, which makes it difficult to understand what a…
Information Security
https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-fun-and-profit/
www.thirtythreeforty.net
Hacking Reolink cameras for fun and profit
Dragging Reolink, kicking and screaming, into the light of the open-standards day
Information Security
https://www.youtube.com/watch?v=4urMITJKQQs
YouTube
Reverse engineering with #Ghidra: Breaking an embedded firmware encryption scheme
In this video we will look at reverse engineering and hacking the firmware encryption used on Moxa industrial control gateways using Ghidra.
Links:
Twitter: https://twitter.com/ghidraninja
Moxa W2150A: https://www.moxa.com/en/products/industrial-edge-co…
Information Security
https://cjhackerz.net/posts/writeup-first-ever-real-like-simulated-iot-security-challenge/
cjhackerz.net
WriteUp: First ever real like simulated IoT security challenge
This is technical writeup for personal CTF challenge I create to show off my understading in hardware/IoT security testcases
Information Security
https://www.solomonsklash.io/pe-parsing-defeating-hooking.html
www.solomonsklash.io
PE Parsing and Defeating AV/EDR API Hooks in C++ - SolomonSklash.io
A look at code to parse the PE header and remove API hooks placed by AV/EDR.
Information Security
https://know.bishopfox.com/advisories/oob-to-rce-exploitation-of-the-hobbes-functional-interpreter
Bishop Fox
OOB to RCE: Exploitation of the Hobbes Functional Interpreter
Morgan Stanley's Hobbes lacks bounds checking, allowing exploitation of an OOB read/write vulnerability that leads to both local and remote code execution.
Information Security
https://github.com/damienvanrobaeys/PS1-To-EXE-Generator
GitHub
GitHub - damienvanrobaeys/PS1-To-EXE-Generator: PS1 to EXE Generator: Create an EXE for your PS1 scripts
PS1 to EXE Generator: Create an EXE for your PS1 scripts - GitHub - damienvanrobaeys/PS1-To-EXE-Generator: PS1 to EXE Generator: Create an EXE for your PS1 scripts
Information Security
https://saelo.github.io/presentations/offensivecon_20_no_clicks.pdf
Information Security
https://www.pnfsoftware.com/blog/reversing-dexguard/
Information Security
https://pberba.github.io/security/2020/05/28/lastpass-phishing/
pepe berba
Bypassing LastPass’s “Advanced” YubiKey MFA: A MITM Phishing Attack
How to deploy a phishing attack on LastPass users, even when they are protected with Yubikey physical keys, and why U2F helps us prevent phishing
Information Security
https://gist.github.com/xillwillx/96e2c5011577d8583635ad7bf6d4fb58
Gist
mimikatz.cs one-liner
mimikatz.cs one-liner. GitHub Gist: instantly share code, notes, and snippets.
Information Security
https://talosintelligence.com/vulnerability_reports/TALOS-2020-1045
Information Security
https://blog.vincss.net/2020/06/cve49-microsoft-windows-lnk-remote-code-execution-vuln-cve-2020-1299-eng.html
Information Security
https://github.com/0x742/noia
GitHub
GitHub - 0x742/noia: [WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re).
[WIP] Simple mobile applications sandbox file browser tool. Powered with [frida.re](https://www.frida.re). - 0x742/noia
Information Security
https://unicode.org/reports/tr36/