Simplifying XSS Detection with Nuclei - A New Approach
https://blog.projectdiscovery.io/simplifying-xss-detection-with-nuclei/
https://blog.projectdiscovery.io/simplifying-xss-detection-with-nuclei/
ProjectDiscovery
Simplifying XSS Detection with Nuclei - A New Approach — ProjectDiscovery Blog
XSS (Cross-Site Scripting) detection has long been a challenge, balancing accuracy with avoiding excessive false positives. Traditionally, this meant creating specific reflection based string matchers for each target, leading to complex and hard-to-maintain…
👍3👎3
StarkeBlog - CVE Wednesday - CVE-2024-20439
https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
https://starkeblog.com/cve-wednesday/cisco/2024/09/20/cve-wednesday-cve-2024-20439.html
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
https://blog.coffinsec.com/0day/2024/08/30/exploiting-CVE-2024-20017-four-different-ways.html
hyprblog
4 exploits, 1 bug: exploiting CVE-2024-20017 4 different ways
a post going over 4 exploits for CVE-2024-20017, a remotely exploitable buffer overflow in a component of the MediaTek MT7622 SDK.
👏1
Hacking and securing ElectronJS apps
https://pentesting.academy/p/hacking-and-securing-electronjs-apps
https://pentesting.academy/p/hacking-and-securing-electronjs-apps
What HackerOne Customers Say About the Problems Hackers Solve
https://www.hackerone.com/customer-stories/hackers-solve-problems
https://www.hackerone.com/customer-stories/hackers-solve-problems
HackerOne
What HackerOne Customers Say About the Problems Hackers Solve | HackerOne
Learn why organizations work with ethical hackers, like preventing breaches, meeting regulatory compliance, and helping the security budget.
Unauthenticated API Endpoint to Create Support Ticket Worth $500
https://vijetareigns.medium.com/unauthenticated-api-endpoint-to-create-support-ticket-worth-500-789e91ad9a00
https://vijetareigns.medium.com/unauthenticated-api-endpoint-to-create-support-ticket-worth-500-789e91ad9a00
Medium
Unauthenticated API Endpoint to Create Support Ticket Worth $500
Unauthenticated API Endpoint to Create Support Ticket Worth $500 FREE ARTICLE LINK👈 Hello hackers, I am back with a new bug bounty write-up. In this blog, I am going to show how I am able to …
256 - Future of the Windows Kernel and Encryption Nonce Reuse
https://dayzerosec.com/podcast/256.html
https://dayzerosec.com/podcast/256.html
dayzerosec
Future of the Windows Kernel and Encryption Nonce Reuse
In this week's episode, we discuss Microsoft's summit with vendors on their intention to lock down the Windows kernel from endpoint security drivers and possibly anti-cheats. We also talk cryptography and about the problems of nonce reuse.
Forwarded from Android Security & Malware
A step-by-step guide to writing an iOS kernel exploit
https://alfiecg.uk/2024/09/24/Kernel-exploit.html
https://alfiecg.uk/2024/09/24/Kernel-exploit.html
Alfie CG
A step-by-step guide to writing an iOS kernel exploit
Introduction Memory management in XNU Page tables Physical use-after-free Exploitation strategy Heap spray Kernel memory read/write Conclusion Bonus: arm64e, PPL and SPTM
❤9
Feedback-Driven Interviewing at HackerOne
https://www.hackerone.com/culture-and-talent/feedback-driven-interviewing-hackerone
https://www.hackerone.com/culture-and-talent/feedback-driven-interviewing-hackerone
HackerOne
Feedback-Driven Interviewing at HackerOne | HackerOne
The Talent Acquisition team currently has a net promoter score (NPS) of 56%, while the industry standard is 50%. However, we can improve and refine our hiring practices to attract and retain the best talent while maintaining a strong employer brand. The Catalyst…
👍2
API Security: The 6 biggest challenges AppSec teams face, and how to solve them.
https://portswigger.net/blog/api-security-the-6-biggest-challenges-appsec-teams-face-and-how-to-solve-them
https://portswigger.net/blog/api-security-the-6-biggest-challenges-appsec-teams-face-and-how-to-solve-them
PortSwigger Blog
API Security: The 6 biggest challenges AppSec teams face, and how to solve them.
Uncover the top 6 API security challenges facing AppSec teams, and learn how to solve them with Burp Suite Enterprise Edition
❤3
CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive – Horizon3.ai
https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/
https://www.horizon3.ai/attack-research/cve-2024-28987-solarwinds-web-help-desk-hardcoded-credential-vulnerability-deep-dive/
Horizon3.ai
CVE-2024-28987: SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive
CVE-2024-28987 SolarWinds Web Help Desk Hardcoded Credential Vulnerability Deep-Dive and Indicators of Compromise. This blog details a hardcoded credentials vulnerability which allows an unauthenticated attacker to read and modify all help desk tickets.
RedTeam Pentesting GmbH - WatchGuard SSO Protocol is Unencrypted and Unauthenticated
https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-006/
https://www.redteam-pentesting.de/en/advisories/rt-sa-2024-006/
www.redteam-pentesting.de
RedTeam Pentesting - WatchGuard SSO Protocol is Unencrypted and Unauthenticated
The protocol that is used by the WatchGuard Single Sign-On (SSO) agent to communicate with the respective client services is neither encrypted, nor authenticated. The unprotected information that is communicated is used to decide which firewall rules should…
👍3
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments | Wiz Blog
https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability
https://www.wiz.io/blog/wiz-research-critical-nvidia-ai-vulnerability
wiz.io
Wiz Research Finds Critical NVIDIA AI Vulnerability Affecting Containers Using NVIDIA GPUs, Including Over 35% of Cloud Environments…
Critical severity vulnerability CVE-2024-0132 affecting NVIDIA Container Toolkit and GPU Operator presents high risk to AI workloads and environments.
Attacking UNIX Systems via CUPS, Part I
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
https://www.evilsocket.net/2024/09/26/Attacking-UNIX-systems-via-CUPS-Part-I/
evilsocket
Attacking UNIX Systems via CUPS, Part I
10 Years of the GitHub Security Bug Bounty Program
https://www.hackerone.com/customer-stories/10-years-github-security-bug-bounty-program
https://www.hackerone.com/customer-stories/10-years-github-security-bug-bounty-program
HackerOne
10 Years of the GitHub Security Bug Bounty Program | HackerOne
Celebrating 10 years of GitHub's bug bounty program! Learn insights into bug bounty growth from a top program.
❤1