Hack-tualité by G-echo - Security : hacks, exploits, protection, tools - Semaine 2019/5

Security : hacks, exploits, protection, tools - Semaine 2019/5

Sat, 02 Feb 2019 21:33:07 GMT
Remote Recon and Collection<p>RemoteRecon provides the ability to execute post-exploitation capabilities against a remote host, without having to expose …
Windows Privilege Escalation Guide
Sat, 02 Feb 2019 21:29:40 GMT
Ryan McFarland
Privilege escalation always comes down to proper enumeration. But to accomplish proper enumeration you need to know what to check and look for. This …
Reverse engineering of a mobile game, part 2: they updated, we dumped memory
Sat, 02 Feb 2019 21:28:07 GMT
Guillaume LesniakBlockedUnblockFollowFollowing<p>Feb 2<p>In my previous story, I successfully reverse-engineered a mobile Tower Defense game on Android, …
Radare2 Community Survey Results · The Official Radare Blog
Sat, 02 Feb 2019 13:06:35 GMT
The radare team
…things like FLIRT that works out of the box…<p>Different answers asked us to support FLIRT Signatures, the truth is - that radare2 is already …
Writeup – Samsung Galaxy Apps Store RCE via MITM
Wed, 30 Jan 2019 13:36:36 GMT
29 January, 2019<p><b>Authors</b>: André Baptista @0xacb, Luís Maia @0xfad0 and Rolando Martins @rolandomartins.<p>The update architecture of a mobile operating …
APT Groups and Operations
Tue, 29 Jan 2019 21:01:40 GMT
1<p>2<p>Topic<p>Comment<p>3<p>Motive<p>Cyber security companies and Antivirus vendors use diffferent names for the same threat actors and often refer to the reports …
identYwaf: A Tool to Help You Identify Web Application Firewalls
Sun, 27 Jan 2019 12:09:23 GMT
I have been a fan of <i>sqlmap</i> for long and when the author released <b>identYwaf</b> recently, I wanted to try it out. Infact, all his other tools are awesome …
Exploiting the Magellan bug on 64-bit Chrome Desktop
Thu, 24 Jan 2019 08:13:32 GMT
Author: Ki Chan Ahn<p>In December 2018, the Tencent Blade Team released an advisory of a bug named “Magellan”, which was described to be exploitable for …
AndrewSpecial – stealthy lsass.exe memory dumping
Tue, 22 Jan 2019 06:47:17 GMT
Ultra short entry here. When reading a very interesting article on bypassing one End Point Security product to silently dump lsass.exe without …
Improved Fallout EK comes back after short hiatus
Fri, 18 Jan 2019 17:50:49 GMT
After a short hiatus in early January, the Fallout exploit kit is back in business again with some new features for the new year. During its absence, …
A Deeper Look into XSS Payloads
Fri, 18 Jan 2019 06:52:30 GMT
Over time, the type of vulnerabilities seen in the web app landscape changes. One that has persisted year in, year out, is cross-site scripting. It’s …
Awesome YARA
Fri, 18 Jan 2019 06:50:33 GMT
README.md<p>A curated list of awesome YARA rules, tools, and resources. Inspired by awesome-python and awesome-php.<p>YARA is an ancronym for: YARA: …
Thu, 17 Jan 2019 21:18:17 GMT
README.adoc<p><b>Project health</b><p>Builds malware analysis Windows virtual machines so that you don’t have to.<p>https://github.com/gosecure/malboxes<p>Table of …
How To: Use Ettercap to Intercept Passwords with ARP Spoofing
Wed, 16 Jan 2019 07:35:50 GMT
ARP spoofing is an attack against an Ethernet or Wi-Fi network to get between the router and the target user. In an ARP spoofing attack, messages …
PRETty - "PRinter Exploitation Toolkit" LAN Automation Tool
Mon, 14 Jan 2019 22:24:25 GMT
PRETty is useful when a large number of printers are present on a network. Instead of scanning, logging, and manually running PRET againt each …
Mon, 14 Jan 2019 07:38:44 GMT
This part of the repository is focused on hash collisions for MD5 and SHA1.<p>This is a collaboration with Marc Stevens.<p>The idea is to explore existing …
Blowing the Dust off of an IBM AS/400 Server
Sun, 13 Jan 2019 20:52:24 GMT
by: Tom Nardi
If you’ve never seen an IBM AS/400 machine, don’t feel bad. Most people haven’t. Introduced in 1988 as a mid-range server line, it used a unique …
Intro to NFC Payment Relay Attacks
Sun, 13 Jan 2019 15:30:27 GMT
<b>Disclaimer</b><p>This is a simple intro to relay attacks using NFC payment data. I will add different types of relays during next year.<p><b>Intro</b><p>A NFC payment …
Dump iOS apps in Javascript (Part I)
Sat, 12 Jan 2019 22:58:32 GMT
codecoloristBlockedUnblockFollowFollowing<p>Jan 12<p>The very first step of iOS app penetration is to dump decrypted binary from app store, with a …
Z-WASP attack: hackers used Zero-Width spaces to bypass Office 365 protections
Sat, 12 Jan 2019 14:30:51 GMT
Pierluigi Paganini
<b>Z-WASP attack: Phishers are using a recently fixed flaw in Office 365 that allows them to bypass protections using zero-width spaces and deliver</b> …
Sat, 12 Jan 2019 07:07:30 GMT
Windows Kernel Explorer (you can simply call it as "WKE") is a free but powerful Windows kernel research tool. It supports from Windows XP to Windows …
Spoofing: RFID and SMS
Thu, 10 Jan 2019 21:21:13 GMT
Spoofing, in Simple Terms<p>First, let’s start with a definition – What is Spoofing?<br>According to ForcePoint, “Spoofing is the act of disguising a …
New Systemd Privilege Escalation Flaws Affect Most Linux Distributions
Thu, 10 Jan 2019 15:23:39 GMT
January 10, 2019
Security researchers have discovered three vulnerabilities in Systemd, a popular init system and service manager for most Linux operating systems, …
Heartbreaking Emails: "Love You" Malspam, Author: Brad Duncan
Thu, 10 Jan 2019 09:36:27 GMT
SANS Internet Storm Center
<i>Introduction</i><p>Malicious spam (malspam) using zipped JavaScript (.js) files as email attachments--this is a well-established tactic used by cyber …
Stretcher - Tool Designed To Help Identify Open Elasticsearch Servers That Are Exposing Sensitive Information
Wed, 09 Jan 2019 20:21:20 GMT
Stretcher is a tool to search for open elasticsearch servers. <b><br>Installation</b><p><b>Disclaimer</b><br>Code samples are provided for educational purposes. Adequate …
By G-echo

Pour aller plus loin