Information Security
@sec_nerd_en
414
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
414 subscribers
Information Security
https://www.youtube.com/watch?v=_Q9h2yuIY3A&feature=youtu.be
YouTube
iOS 13.1.3 / 13 / 12.4.1 Unc0ver JAILBREAK News: NEW Kernel Bug PoC Released! (A12 too)
▶
Enter the awesome iMyFone Halloween giveaway contest and get your iPhone 11 for FREE at this link*: http://bit.ly/2BKlKJI In today's video, we're discussin...
Information Security
https://www.youtube.com/watch?v=34A1jtgfgsU
YouTube
FuzzFactory: Domain-Specific Fuzzing with Waypoints
Authors: Rohan Padhye, Caroline Lemieux, Koushik Sen, Laurent Simon, Hayawardh Vijayakumar
Presented at SPLASH 2019
Information Security
https://github.com/machport/poc/releases
iOS 13.1.3 PoC iPA Released
:)
Supports:
A7-A13
GitHub
machport/poc
proof of concept of @S0rryMybad 's bug. Contribute to machport/poc development by creating an account on GitHub.
Information Security
https://hugeh0ge.github.io/2019/11/04/Getting-Arbitrary-Code-Execution-from-fopen-s-2nd-Argument/
The Pwnbroker
Getting Arbitrary Code Execution from fopen's 2nd Argument
hugeh0ge's blog
Information Security
https://sid-500.com/2019/11/04/powershell-do-while-vs-do-until/
SID-500.COM
PowerShell: Do-While vs. Do-Until vs. While
Understanding the differences between a do-while, do-until and while loop could be confusing. Is it the same? Why then two different techniques?
Information Security
https://blog.xpnsec.com/protecting-your-malware/
XPN InfoSec Blog
@_xpn_ - Protecting Your Malware with blockdlls and ACG
In Cobalt Strike, blockdlls was introduced to allow protection of spawned processes from non-Microsoft signed DLL's. In this post I will show just how this works, and look at an additional process security option which could help us to deter endpoint security…
Information Security
https://blog.stealthbits.com/creating-persistence-with-dcshadow/
Insider Threat Security Blog
Creating Persistence with DCShadow | Insider Threat Security Blog
Now that we understand the basics of the DCShadow feature, let’s look at some ways in which attackers can leverage DCShadow in a real world attack scenario. As we learned, DCShadow requires elevated rights such as Domain Admin, so you can assume an attacker…
Information Security
https://www.hahwul.com/2019/11/upgrade-self-xss-to-exploitable-xss.html
HAHWUL
Upgrade self XSS to Exploitable XSS an 3 Ways Technic
오늘은 Self-XSS를 유효한 XSS로 업그레이드 하는 방법 3가지에 대해 이야기 할까 합니다.
Information Security
https://n4r1b.netlify.com/en/posts/2019/11/understanding-wdboot-windows-defender-elam/
Netlify
Understanding WdBoot (Windows Defender ELAM)
Explanation on how the Windows Defender ELAM Driver (WdBoot) works
Information Security
https://twitter.com/xme/status/1191652711462244353
Twitter
Xavier Mertens
🛡
Need to download a file from the Internet? Stay stealthy by using Excel (or any other Office app). "Excel.exe https://t.co/6QWyr7WvPQ" #CERTEUConf19
Information Security
Information Security
https://twitter.com/xme/status/1191652711462244353
https://twitter.com/xme/status/1191707747752071168?s=20
Twitter
Xavier Mertens
🛡
@BeingSheerazAli Loaded into Excel, then you can write a macro to dump them to disk...
Information Security
https://blog.ripstech.com/2019/sql-injection-big-tree/
Sonarsource
Sonar Blogs
Sonar's blogs showcase our solutions and products: SonarQube Cloud, SonarQube Server, and SonarQube for IDE - trusted by 400k+ organizations globally.
Information Security
https://github.com/williballenthin/python-registry
GitHub
GitHub - williballenthin/python-registry: Pure Python parser for Windows Registry hives.
Pure Python parser for Windows Registry hives. Contribute to williballenthin/python-registry development by creating an account on GitHub.
Information Security
https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
Teddy Katz’s Blog
Bypassing GitHub’s OAuth flow
For the past few years, security research has been something I’ve done in my spare time. I know there are people that make a living off of bug bounty programs, but I’ve personally just spent a few hours here and there whenever I feel like it.
Information Security
https://github.com/W00t3k/Awesome-Cellular-Hacking
GitHub
GitHub - W00t3k/Awesome-Cellular-Hacking: Awesome-Cellular-Hacking
Awesome-Cellular-Hacking. Contribute to W00t3k/Awesome-Cellular-Hacking development by creating an account on GitHub.
Information Security
https://github.com/SZFsir/laravel_POP_RCE
GitHub
SZFsir/laravel_POP_RCE
laravel 5.8 rce pop chain. Contribute to SZFsir/laravel_POP_RCE development by creating an account on GitHub.
Information Security
https://www.hackingarticles.in/dhcp-penetration-testing/
Hacking Articles
DHCP Penetration Testing
DHCP stands for Dynamic Host Configuration Protocol and a DHCP server dynamically assigns an IP address to enable hosts (DHCP Clients). Basically, the DHCP server reduces the
Information Security
Bypass Fix of OB XXE Using Different encoding and get 2x bounty
😁
1. Encode Payload to UTF-7
2. Encode Payload to UTF-16
3. Encode Payload to UTF-16BE
- Try with other encodings as well, if accepted by the XML parser.
Information Security
https://pentestmag.com/metasploit-cheat-sheet/
Pentestmag
Metasploit Cheat Sheet - Pentestmag
Metasploit Cheat Sheet by Tim Keary Widely reputed as the most used penetration testing framework, Metasploit helps security teams identify …
Information Security
https://medium.com/threat-hunters-forge/threat-hunter-playbook-mordor-datasets-binderhub-open-infrastructure-for-open-8c8aee3d8b4
Medium
Threat Hunter Playbook
⚔
+ Mordor Datasets
📜
+ BinderHub
🌎
= Open Infrastructure
🏗
for Open Hunts
🏹
💜
It has been almost three years since I started documenting detections publicly, and I always wondered “How could I share detections in a…