Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://pullerjsecu.medium.com/how-i-was-able-to-turn-a-xss-into-a-account-takeover-ae0c478640e7
Medium
How I was able to Turn a XSS into a Account Takeover
To begin,this is a vulnerability that I found during a bug bounty engagement.I would split this into two parts, or two separate…
Information Security
https://research.nccgroup.com/2021/02/02/investigating-potential-security-vulnerability-manifestation-through-various-analyses-inferences-regarding-internet-rfcs-and-how-rfc-security-might-be-improved/
NCC Group Research
Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding Internet RFCs (and…
Overview RFCs have played a pivotal role in helping to formalise ideas and requirements for much of the Internet’s design and engineering. They have facilitated peer review amongst engineers,…
Information Security
https://jub0bs.com/posts/2021-01-29-great-samesite-confusion/
Jub0Bs
The great SameSite confusion
In this post, I dissect a common misconception about the SameSite cookie attribute and I explore its potential impact on Web security.
TL;DR ¶ The SameSite cookie attribute is not well understood. Conflating site and origin is a common but harmful mistake.…
Information Security
https://github.com/forrest-orr/ExploitDev/blob/master/Exploits/Re-creations/Forrest_Orr_CVE-2020-0674_32bit.html
Information Security
https://a13xp0p0v.github.io/2020/11/30/slab-quarantine.html
Alexander Popov
Linux kernel heap quarantine versus use-after-free exploits
It's 2020. Quarantines are everywhere – and here I'm writing about one, too. But this quarantine is of a different kind. In this article I'll describe the Linux Kernel Heap Quarantine that I developed for mitigating kernel use-after-free exploitation.
Information Security
https://docs.google.com/presentation/d/1O7MxvbIfRcPSlbyZbFxD-fAR34XlquQSlRAHPb2kR4E/edit#slide=id.g5d0d863a9e_0_2
Google Docs
State of DNS Rebinding DEF CON
State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin Gérald Doussot & Roger Meyer | DEF CON 27 Today we are going to discuss the current state of DNS rebinding including recent attack & prevention techniques. We will discuss…
Information Security
https://ajinabraham.com/blog/detecting-zero-days-in-software-supply-chain-with-static-and-dynamic-analysis
Ajin Abraham
Detecting zero days in software supply chain with static and dynamic analysis
This blog shares some ideas about detecting zero-days in the software supply chain even before they get flagged by your typical Software Composition Analysis (SCA) or Dependency checking tools. Also shares the proof of concept code to detect malicious behavior…
Information Security
https://sourque.dev/writeups/htbq21/wafflesorder/
Information Security
https://luemmelsec.github.io/Relaying-101/
luemmelsec.github.io
Relaying 101
Hello fellas, or as we say in Germany: “Hallo Freunde der fettfreien Leberwurst.”
In today’s blog-post we´ll be talking about relaying attacks, or more precisely about NTLM relaying attacks. So let´s get started.
As you already know I am new to the pentest…
Information Security
https://afinepl.medium.com/testing-and-exploiting-java-deserialization-in-2021-e762f3e43ca2
Medium
Testing and exploiting Java Deserialization in 2021
Since 2015 when java deserialization was a major threat, lots of patches and improvements has been introduced. How to approach testing for…
Information Security
https://www.horizon3.ai/disclosures/librenms-second-order-sqli
Horizon3.ai
%%title%% %%page%% %%sep%% %%sitename%% | Blog
LibreNMS is an open source solution for network monitoring based on PHP, MySQL and SNMP. While reviewing its source code, we discovered a second-order SQL injection vulnerability, CVE-2020-35700, in the Dashboard feature.
Information Security
https://securitylab.github.com/advisories/GHSL-2020-214_223-onedev
GitHub Security Lab
GHSL-2020-214_223: 10 CVEs in OneDev ranging from pre-auth Remote Code Execution (RCE) to Arbitrary File Read/Write
Multiple vulnerabilities were found in the OneDev project ranging from pre-auth Remote Code Execution (RCE) to Arbitrary File Read/Write
Information Security
https://github.com/GameHackingAcademy
GitHub
Game Hacking Academy
Game Hacking Academy has 26 repositories available. Follow their code on GitHub.
Information Security
https://twitter.com/steventseeley/status/1359212311312035848?s=20
Twitter
ϻг_ϻε
CVE-2021-24071 is a patch bypass for CVE-2020-17120 “Microsoft SharePoint SPSqlDataSource Information Disclosure Vulnerability”. It allows an attacker to connect back to a rogue MySQL server and leak the web.config file for RCE if the MySQL driver is installed.
Information Security
https://igor-blue.github.io/2021/02/07/sybase.html
Igor's Blog
Abusing Sybase for lateral movement
A few years ago I was asked to help on a red-team exercise in a company doing hardware R&D.
Information Security
https://github.com/pkb1s/SharpRelay
GitHub
GitHub - pkb1s/SharpRelay
Contribute to pkb1s/SharpRelay development by creating an account on GitHub.
Information Security
https://lkmidas.github.io/posts/20210123-linux-kernel-pwn-part-1/
My cool site
Learning Linux Kernel Exploitation - Part 1
The first part of the series about learning Linux kernel exploitation through hxpCTF2020 kernel-rop: Setting up the environment and the simplest technique of ret2usr
Information Security
https://swarm.ptsecurity.com/swarm-of-palo-alto-pan-os-vulnerabilities/
PT SWARM
Swarm of Palo Alto PAN-OS vulnerabilities
Palo Alto Networks next-generation firewall (NGFW) is one of the leading enterprise firewalls used by companies around the world to protect against various cyber-attacks. It runs on its own operating system «PAN-OS». In this article, we will analyze the vulnerabilities…
Information Security
https://github.com/dolevf/Damn-Vulnerable-GraphQL-Application
GitHub
GitHub - dolevf/Damn-Vulnerable-GraphQL-Application: Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL…
Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practising GraphQL Security. - dolevf/Damn-Vulnerable-GraphQL-Appli...
Information Security
https://halove23.blogspot.com/2021/02/windows-installer-file-read-0day_12.html