Information Security
@sec_nerd_en
408
subscribers
157
photos
5
videos
9
files
2.28K
links
Information Security News
we are
@sec_nerd
twin brother
Download Telegram
Join
Information Security
408 subscribers
Information Security
https://github.com/googleprojectzero/Hyntrospect
GitHub
GitHub - googleprojectzero/Hyntrospect
Contribute to googleprojectzero/Hyntrospect development by creating an account on GitHub.
Information Security
https://devcraft.io/2021/05/04/exiftool-arbitrary-code-execution-cve-2021-22204.html
devcraft.io
ExifTool CVE-2021-22204 - Arbitrary Code Execution
Background
Information Security
https://twitter.com/_Bugbountytips_/status/1393483510556545024?s=20
Twitter
BugBountyTips.tech
How to Find Secret token , apikey, etc in js files & source code using bash (xkeys) | recon youtube.com/watch?v=_7EM7f… #bugbounty #recon #bash #bugbountytips The post How to Find Secret token , apikey, etc in js files & source code using bash (xke… appeared…
Information Security
https://blog.doyensec.com/2021/05/20/graphql-csrf.html
Information Security
https://voidsec.com/reverse-engineering-and-exploiting-dell-cve-2021-21551/
Information Security
https://googleprojectzero.blogspot.com/2021/05/fuzzing-ios-code-on-macos-at-native.html
Blogspot
Fuzzing iOS code on macOS at native speed
Or how iOS apps on macOS work under the hood Posted by Samuel Groß, Project Zero This short post explains how code compiled for iOS ...
Information Security
https://github.com/samwcyo/CVE-2021-27651-PoC/blob/main/RCE.md
GitHub
CVE-2021-27651-PoC/RCE.md at main · samwcyo/CVE-2021-27651-PoC
RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2 - samwcyo/CVE-2021-27651-PoC
Information Security
https://docs.google.com/presentation/d/19JaXHFMT-R2le6x-vPKw5D1Cxlw2aLtxHEIDwWBNXCQ/edit?usp=drivesdk
Google Docs
2021, PHDays: Fuzzing the Linux kernel
Fuzzing the Linux kernel Andrey Konovalov, xairy.io May 20th 2021
Information Security
https://www.zerodayinitiative.com/blog/2021/5/17/cve-2021-31166-a-wormable-code-execution-bug-in-httpsys
Zero Day Initiative
Zero Day Initiative — CVE-2021-31166: A Wormable Code Execution Bug in HTTP.sys
In this excerpt of a Trend Micro Vulnerability Research Service vulnerability report, Kc Udonsi and Yazhi Wang of the Trend Micro Research Team detail a recent code execution vulnerability in the Microsoft Internet Information Services (IIS) for Windows.…
Information Security
https://cyllective.com/blog/post/plone-authenticated-rce-cve-2021-32633/
Cyllective
cyllective AG - Plone Authenticated RCE (CVE-2021-32633)
Join the journey into Plone CMS that lead us to discover an authenticated RCE vulnerability
Information Security
https://www.zerodayinitiative.com/blog/2021/6/1/cve-2021-31181-microsoft-sharepoint-webpart-interpretation-conflict-remote-code-execution-vulnerability
Zero Day Initiative
Zero Day Initiative — CVE-2021-31181: Microsoft SharePoint WebPart Interpretation Conflict Remote Code Execution Vulnerability
In May of 2021, Microsoft released a patch to correct CVE-2021-31181 – a remote code execution bug in the supported versions of Microsoft SharePoint Server. This bug was reported to the ZDI program by an anonymous researcher and is also known as ZDI-21…
Information Security
https://blog.liquidsec.net/2021/06/01/asp-net-cryptography-for-pentesters/
Blacklanternsecurity
ASP.NET Cryptography for Pentesters
This article was originally posted to blog.liquidsec.net on June 1, 2021.
Information Security
https://gitlab.com/dee-see/notkeyhacks
GitLab
dee-see / notkeyhacks · GitLab
Information Security
https://labs.detectify.com/2021/06/08/what-is-a-prototype-pollution-vulnerability-and-how-does-page-fetch-help/
Labs Detectify
What is a Prototype Pollution vulnerability and how does page-fetch help? - Labs Detectify
Prototype Pollution is a problem affecting JavaScript applications, and now you can use Detectify's page-fetch tool to find it in the wild.
Information Security
https://gccybermonks.com/posts/popups/
Information Security
https://blog.oversecured.com/Two-weeks-of-securing-Samsung-devices-Part-1/
News, Techniques & Guides
Two weeks of securing Samsung devices: Part 1
After spending two weeks looking for security bugs in the pre-installed apps on Samsung devices, we were able to find multiple dangerous vulnerabilities.
Information Security
https://thezerohack.com/apple-vulnerability-bug-bounty
The Zero Hack
How I Found A Vulnerability To Hack iCloud Accounts and How Apple Reacted To It - The Zero Hack
This article is about how I found a vulnerability on Apple forgot password endpoint that allowed me to takeover an iCloud account. The vulnerability is completely patched by Apple security team and it no longer works. Apple Security Team rewarded me $18,000…
Information Security
https://blog.xpnsec.com/debugging-into-net/
XPN InfoSec Blog
@_xpn_ - Debugging into .NET
.NET for post-exploitation is here to stay. It has been bundled with most C2 frameworks, common tools have been ported, AMSI has been added (then bypassed) and new and clever ways have been found to launch unmanaged code. The process of loading a .NET assembly…
Information Security
https://labs.detectify.com/2021/06/28/aem-crx-bypass-0day-control-over-some-enterprise-aem-crx-package-manager/
Labs Detectify
Undocumented authentication bypass issue in AEM Package Manager [Blog updated] - Labs Detectify
Detectify Crowdsource ethical hackers found an undocumented authentication bypass in Adobe Experience Manager. Comments from Adobe added.
Information Security
https://pentestbook.six2dez.com/enumeration/cloud
Six2Dez
Cloud | Pentest Book