Information Security
@sec_nerd_en
417
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
417 subscribers
Information Security
https://www.jonbottarini.com/2017/03/09/bypassing-apples-ios-10-restrictions-settings-twice/
Security and Bug Hunting
Bypassing Apple's iOS 10 Restrictions Settings - Twice - Security and Bug Hunting
By default, Apple has a feature that allows all of their iOS devices to be assigned restrictions, so that employees and mostly children cannot access naughty websites and other types of less-desirable content. You can enable these settings by visiting Settings…
Information Security
https://phpsecurity.readthedocs.io/en/latest/
Information Security
https://blog.assetnote.io/2021/03/18/h2c-smuggling/
Information Security
https://blog.cryptohack.org/twitter-secrets
CryptoHack
Recovering a full PEM Private Key when half of it is redacted
The @CryptoHack__ account was pinged today by ENOENT, with a CTF-like challenge found in the wild: Source tweet. Here’s a write-up covering how given a partially redacted PEM, the whole private key can be recovered.
Information Security
https://portswigger.net/research/hidden-oauth-attack-vectors
PortSwigger Research
Hidden OAuth attack vectors
Intro The OAuth2 authorization protocol has been under fire for the past ten years. You've probably already heard about plenty of "return_uri" tricks, token leakages, CSRF-style attacks on clients, an
Information Security
https://www.youtube.com/watch?v=h_6_0ZE_9zA
YouTube
DHCP.py
When NTB-NS/ARP/LLMNR is disable, you still have DHCP.py in Responder's tools/ folder.
Information Security
https://www.easymetadata.com/2019/04/lets-use-powershell-to-review-dlls-without-certs/
EasyMetaData
Lets use PowerShell to review DLL’s without certs
The other day I got bored and decided to do a little PowerShell one-liner on my Windows 10 gaming rig. I wanted to see if I have any DLL’s that are unsigned or invalid in my C:\Windows direct…
Information Security
https://redalert.nshc.net/2019/03/28/threat-actor-group-using-uac-bypass-module-to-run-bat-file/
Information Security
https://www.ptsecurity.com/ww-en/analytics/antisandbox-techniques/
ptsecurity.com
Sandbox detection and evasion techniques. How malware has evolved over the last 10 years
In most cases, hackers
Information Security
https://securitylab.github.com/research/fuzzing-apache-2/
Information Security
https://www.go350.com/posts/exfiltrate-files-using-the-dns/
Go350
Exfiltrate files using the DNS
yes you can
Information Security
https://mikko-kenttala.medium.com/zero-click-vulnerability-in-apples-macos-mail-59e0c14b106c
Medium
Zero click vulnerability in Apple’s macOS Mail
Zero-Click Zip TL;DR
Information Security
https://blog.can.ac/2021/03/22/speculating-x86-64-isa-with-one-weird-trick/
blog.can.ac
Speculating the entire x86-64 Instruction Set In Seconds with This One Weird Trick
<p>As cheesy as the title sounds, I promise it cannot beat the cheesiness of the technique I’ll be telling you about in this post. The morning I saw Mark Ermolov’s tweet about the undocume
Information Security
https://google.github.io/security-research/pocs/linux/bleedingtooth/writeup
security-research
BleedingTooth: Linux Bluetooth Zero-Click Remote Code Execution
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
Information Security
https://pentest.blog/unexpected-journey-7-gravcms-unauthenticated-arbitrary-yaml-write-update-leads-to-code-execution/
Information Security
https://fly.io/blog/docker-without-docker/
Fly
Docker without Docker
Our users deliver software to us as Docker containers, but we don’t use Docker to run them. We transmogrify container images into Firecracker micro-VMs. Here's how.
Information Security
https://leethax0.rs/2021/04/ElectricChrome/
Information Security
https://muzec0318.github.io/posts/BufferOverflow.html
Information Security
https://googleprojectzero.github.io/0days-in-the-wild//0day-RCAs/2021/CVE-2021-1647.html
Information Security
https://shenaniganslabs.io/2021/04/13/Airstrike.html
Shenanigans Labs
Airstrike Attack - FDE bypass and EoP on domain joined Windows workstations (CVE-2021-28316)
By default, domain joined Windows workstations allow access to the network selection UI from the lock screen.
An attacker with physical access to a locked device with WiFi capabilities (such as a laptop or a workstation) can abuse this functionality to force…