Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://parsiya.net/blog/2021-03-17-attack-surface-analysis-part-2-custom-protocol-handlers/
parsiya.net
Attack Surface Analysis - Part 2 - Custom Protocol Handlers
Custom protocol handlers are an obscure attack surface. They allow us to convert
local attacks into remote ones and are an alternative way to
jump the browser sandbox without 0days).
Similar to the…
Information Security
https://blog.p6.is/time-based-regex-injection/
POSIX
Time based Regex Injection
Revisiting ReDoS: A Rough Idea of Data Exfiltration by ReDoS and Side-channe TechniquesThe technique I will introduce this time is Time based Regex Injection.This is a recently announced technique on
Information Security
http://www.devttys0.com/2011/05/reverse-engineering-firmware-linksys-wag120n/
Information Security
https://jcjc-dev.com/2016/12/14/reversing-huawei-5-reversing-firmware/
Hack The World
Practical Reverse Engineering Part 5 - Digging Through the Firmware
Information Security
https://www.jonbottarini.com/2017/03/09/bypassing-apples-ios-10-restrictions-settings-twice/
Security and Bug Hunting
Bypassing Apple's iOS 10 Restrictions Settings - Twice - Security and Bug Hunting
By default, Apple has a feature that allows all of their iOS devices to be assigned restrictions, so that employees and mostly children cannot access naughty websites and other types of less-desirable content. You can enable these settings by visiting Settings…
Information Security
https://phpsecurity.readthedocs.io/en/latest/
Information Security
https://blog.assetnote.io/2021/03/18/h2c-smuggling/
Information Security
https://blog.cryptohack.org/twitter-secrets
CryptoHack
Recovering a full PEM Private Key when half of it is redacted
The @CryptoHack__ account was pinged today by ENOENT, with a CTF-like challenge found in the wild: Source tweet. Here’s a write-up covering how given a partially redacted PEM, the whole private key can be recovered.
Information Security
https://portswigger.net/research/hidden-oauth-attack-vectors
PortSwigger Research
Hidden OAuth attack vectors
Intro The OAuth2 authorization protocol has been under fire for the past ten years. You've probably already heard about plenty of "return_uri" tricks, token leakages, CSRF-style attacks on clients, an
Information Security
https://www.youtube.com/watch?v=h_6_0ZE_9zA
YouTube
DHCP.py
When NTB-NS/ARP/LLMNR is disable, you still have DHCP.py in Responder's tools/ folder.
Information Security
https://www.easymetadata.com/2019/04/lets-use-powershell-to-review-dlls-without-certs/
EasyMetaData
Lets use PowerShell to review DLL’s without certs
The other day I got bored and decided to do a little PowerShell one-liner on my Windows 10 gaming rig. I wanted to see if I have any DLL’s that are unsigned or invalid in my C:\Windows direct…
Information Security
https://redalert.nshc.net/2019/03/28/threat-actor-group-using-uac-bypass-module-to-run-bat-file/
Information Security
https://www.ptsecurity.com/ww-en/analytics/antisandbox-techniques/
ptsecurity.com
Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
In most cases, hackers
Information Security
https://securitylab.github.com/research/fuzzing-apache-2/
Information Security
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
Go350
Exfiltrate files using the DNS
yes you can
Information Security
https://mikko-kenttala.medium.com/zero-click-vulnerability-in-apples-macos-mail-59e0c14b106c
Medium
Zero click vulnerability in Apple’s macOS Mail
Zero-Click Zip TL;DR
Information Security
https://blog.can.ac/2021/03/22/speculating-x86-64-isa-with-one-weird-trick/
blog.can.ac
Speculating the entire x86-64 Instruction Set In Seconds with This One Weird Trick
<p>As cheesy as the title sounds, I promise it cannot beat the cheesiness of the technique I’ll be telling you about in this post. The morning I saw Mark Ermolov’s tweet about the undocume
Information Security
https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup
security-research
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Information Security
https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/
Information Security
https://fly.io/blog/docker-without-docker/
Fly
Docker without Docker
Our users deliver software to us as Docker containers, but we don’t use Docker to run them. We transmogrify container images into Firecracker micro-VMs. Here's how.