Hack-tualité by G-echo - Security : hacks, exploits, protection, tools - Semaine 2019/2

Security : hacks, exploits, protection, tools - Semaine 2019/2

Blowing the Dust off of an IBM AS/400 Server
Sun, 13 Jan 2019 20:52:24 GMT
by: Tom Nardi
If you’ve never seen an IBM AS/400 machine, don’t feel bad. Most people haven’t. Introduced in 1988 as a mid-range server line, it used a unique …
Intro to NFC Payment Relay Attacks
Sun, 13 Jan 2019 15:30:27 GMT
<b>Disclaimer</b><p>This is a simple intro to relay attacks using NFC payment data. I will add different types of relays during next year.<p><b>Intro</b><p>A NFC payment …
Dump iOS apps in Javascript (Part I)
Sat, 12 Jan 2019 22:58:32 GMT
codecoloristBlockedUnblockFollowFollowing<p>Jan 12<p>The very first step of iOS app penetration is to dump decrypted binary from app store, with a …
Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
Sat, 12 Jan 2019 14:30:51 GMT
Pierluigi Paganini
<b>Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver</b> …
Sat, 12 Jan 2019 07:07:30 GMT
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful Windows kernel research tool. It supports from Windows XP to Windows …
Spoofing: RFID and SMS
Thu, 10 Jan 2019 21:21:13 GMT
Spoofing, in Simple Terms<p>First, let’s start with a definition – What is Spoofing?<br>According to ForcePoint, “Spoofing is the act of disguising a …
New Systemd Privilege Escalation Flaws Affect Most Linux Distributions
Thu, 10 Jan 2019 15:23:39 GMT
January 10, 2019
Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, …
Heartbreaking Emails: "Love You" Malspam, Author: Brad Duncan
Thu, 10 Jan 2019 09:36:27 GMT
SANS Internet Storm Center
<i>Introduction</i><p>Malicious spam (malspam) using zipped JavaScript (.js) files as email attachments--this is a well-established tactic used by cyber …
Stretcher - Tool Designed To Help Identify Open Elasticsearch Servers That Are Exposing Sensitive Information
Wed, 09 Jan 2019 20:21:20 GMT
Stretcher is a tool to search for open elasticsearch servers. <b><br>Installation</b><p><b>Disclaimer</b><br>Code samples are provided for educational purposes. Adequate …
Advance XSS Persistence With Oauth
Tue, 08 Jan 2019 07:55:16 GMT
README.md<p>When you ask "What's the worst thing that an attacker can do with Cross Site Scripting" in an interview setting, one of the first answers …
ZERODIUM - How to Sell Your 0day Exploit to ZERODIUM
Mon, 07 Jan 2019 19:57:19 GMT
Program Overview<p><b>ZERODIUM is the leading exploit acquisition platform</b> for premium zero-days and advanced cybersecurity capabilities. <b>We pay BIG</b> …
2018-20512 - EPON CPE-WiFi devices 2.0.4-X000 are vulnerable to escalation of privileges by sending cooLogin=1, c - CVE-Search
Fri, 04 Jan 2019 08:05:53 GMT
http://github.com/pidgeyl/cve-search - cve-search
Summary<p>EPON CPE-WiFi devices 2.0.4-X000 are vulnerable to escalation of privileges by sending cooLogin=1, cooUser=admin, and timestamp=-1 cookies.
Using your BMC as a DMA device: plugging PCILeech to HPE iLO 4
Thu, 03 Jan 2019 23:04:49 GMT
2018 has been a really tough year for BMCs! Although their attack surface was not something new (IPMI has been studied by Dan Farmer back in 2013, …
ss7MAPer – A SS7 pen testing toolkit
Mon, 31 Dec 2018 08:58:59 GMT
by Daniel Mende
While running some SS7 pentests last year, I developed a small tool automating some of the well-known SS7 attack cases. Today I’m releasing the first …
Windows Zero-Day Bug Allows Overwriting Files with Arbitrary Data
Mon, 31 Dec 2018 08:56:43 GMT
Ionut Ilascu
A security researcher has disclosed exploit code for a fourth zero-day vulnerability in Windows operating system in just as many months. The bug …
Basic Static Analysis (Part 1)
Sun, 30 Dec 2018 18:11:39 GMT
As mentioned in my prior post (https://medium.com/@tstillz17/introduction-to-malware-analysis-b98d895fb50), I’ve found that malware analysis can be …
Writing a Basic Keylogger for macOS in Python
Sun, 30 Dec 2018 18:11:02 GMT
A brief look at how to covertly log user activity on macOS<p>Andrew ScottBlockedUnblockFollowFollowing<p>Sep 5<p>⚠️<b>This post is for educational purposes only</b>⚠️<p>…
Beware of Deserialisation in .NET Methods and Classes + Code Execution via Paste!
Sat, 29 Dec 2018 23:12:58 GMT
In light of practical exploitation for deserialisation issues in the .NET Framework [1] [2] [3], we thought it might be useful to identify .NET …
BeRoot For Windows
Sat, 01 Dec 2018 09:43:23 GMT
BeRoot(s) is a post exploitation tool to check common Windows misconfigurations to find a way to escalate our privilege.<br>A compiled version is …
Windows Toolkit
Fri, 28 Dec 2018 08:18:57 GMT
Binary<p>Native Binaries<p>IDA Pro<p>IDA Plugins<p>Preferred<p>Neutral<p>Unreviewed<p>Diaphora<p>X<p>Lighthouse<p>X<p>uEmu<p>X<p>BinCAT<p>X<p>IDArling<p>X<p>MSDN …
radius-audit - A RADIUS authentication server audit tool
Thu, 27 Dec 2018 08:40:17 GMT
<i>radius-audit</i> allows to conduct configuration audits of RADIUS (RFC 2865) servers setup as authentication servers in a 802.1X environment.<p>More …
Pocsuite v2.0.8 - Remote Vulnerability Testing Framework Developed By The Knownsec Security Team
Tue, 25 Dec 2018 15:55:30 GMT
Pocsuite is an open-sourced remote vulnerability testing and proof-of-concept development framework developed by the <b>Knownsec Security Team</b>. It comes …
Hatch - Tool To Brute Force Most Websites
Mon, 24 Dec 2018 23:09:43 GMT
Hatch is a brute force tool that is used to brute force most websites<p><b>Installation Instructions</b> <b><br>Requirements</b><br>chrome driver and chrome are also required! …
Dissecting Cozy Bear’s malicious LNK file
Sun, 23 Dec 2018 21:45:30 GMT
Weaponized LNK files are not very popular way of distributing malware, but, of course, sometimes they take place. One of a good examples of such …
Next Reality » Augmented & Mixed Reality News, Rumors & Dev Guides
Sat, 22 Dec 2018 11:15:28 GMT
In a world where augmented reality is becoming the hero of the movie marketing, Universal Studios has decided to use the technology to reinvent the …
By G-echo