Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://cybercx.com.au/blog/2020/12/15/logrhythm-zero-days/
Information Security
https://www.adambarth.com/papers/2008/barth-jackson-mitchell.pdf
Information Security
https://twitter.com/h3xstream/status/1341080890018066432?s=20
Twitter
Philippe Arteau
Small #SSTI trick: Blind Template Injection with handling of some sandbox escapes. Payload in the workshop below. #dns #freemarker #pentest #BurpSuite Based on work from @olekmirosh and @pwntester https://t.co/H1YxMeD4o1
Information Security
https://halove23.blogspot.com/2020/12/oh-so-you-have-antivirus-nameevery-bug.html
Information Security
https://github.com/cyberark/shimit
GitHub
GitHub - cyberark/shimit: A tool that implements the Golden SAML attack
A tool that implements the Golden SAML attack. Contribute to cyberark/shimit development by creating an account on GitHub.
Information Security
https://ysamm.com/?p=510
Information Security
https://owasp.org/www-chapter-vancouver/assets/presentations/2020-01_Attacking_and_Securing_JWT.pdf
Information Security
https://www.shielder.it/blog/2020/04/1-click-rce-on-keybase/
Shielder
Shielder - 1-click RCE on Keybase
Keybase client allowed inject arbitrary links with arbitrary protocols. This caused a Remote Command Execution on Windows and MacOS.
Information Security
https://www.betterhacker.com/2021/01/the-burp-extension-no-one-told-you-about.html
Betterhacker
The Burp Extension No One Told You About
Some time last year, I came across a Burp extension on Github that replicates the Invoke Applications functionality from OWASP ZAP in Burp....
Information Security
https://medium.com/bugbountywriteup/the-type-of-recon-that-you-may-skip-on-purpose-but-this-is-why-you-shouldnt-272aa74e08be
Medium
The type of recon that you may skip on purpose, but this is why you shouldn’t
, or why being too quick can lead to a false positive
Information Security
https://www.hackingarticles.in/android-penetration-testing-frida/
Hacking Articles
Android Penetration Testing: Frida
Learn how to use Frida for Android penetration testing, including hooking, injecting, and analyzing Android apps for security vulnerabilities.
Information Security
https://iustin24.github.io/Cache-Key-Normalization-Denial-of-Service
Information Security
https://medium.com/@valeriyshevchenko/10-000-for-a-vulnerability-that-doesnt-exist-9dbc63684e94
Medium
$10,000 for a vulnerability that doesn’t exist
A couple of months ago, an interesting story happened to me. I caught a Path Traversal issue with no chance to reproduce it again.
Information Security
https://alex.studer.dev/2021/01/04/mw41-1
Alex Studer
Getting root on a 4G LTE mobile hotspot
I reverse engineered a special tool that lets you switch an Alcatel MW41 hotspot into a debug mode, granting root access to the device.
Information Security
https://x0r19x91.gitlab.io/post/reversing-go-part-1/
Information Security
https://microsoftedge.github.io/edgevr/posts/deep-dive-into-site-isolation-part-2/
Microsoft Browser Vulnerability Research
Deep Dive into Site Isolation (Part 2)
In the previous blog post, I explained how Site Isolation and related security features help mitigate attacks such as UXSS and Spectre. However, security bugs in a renderer process are really common, and therefore Chromium’s threat model assumes that a renderer…
Information Security
https://unit42.paloaltonetworks.com/bumblebee-webshell-xhunt-campaign
Unit 42
xHunt Campaign: New BumbleBee Webshell and SSH Tunnels Used for Lateral Movement
The BumbleBee webshell is used by the xHunt Campaign to upload and download files to a compromised server and to move laterally on the network.
Information Security
https://bugs.xdavidhu.me/google/2021/01/11/stealing-your-private-videos-one-frame-at-a-time/
bugs.xdavidhu.me
Stealing Your Private YouTube Videos, One Frame at a Time
David Schütz's bug bounty writeups
Information Security
https://www.ambionics.io/blog/laravel-debug-rce
Ambionics
Laravel <= v8.4.2 debug mode: Remote code execution
Ambionics Security team discovered an RCE in Laravel, when the framework is in debug mode.
Information Security
https://adepts.of0x.cc/shadowmove-hijack-socket/
Hijacking connections without injections: a ShadowMoving approach to the art of pivoting |
Hijacking connections without injections: a ShadowMoving approach to the art of pivoting | AdeptsOf0xCC
Proof of concept of hiding conections with ShadowMove technique