- SonicWall identified a coordinated attack on its internal systems by highly sophisticated threat actors exploiting probable zero-day vulnerabilities on certain SonicWall secure remote access products
- MSSQL Lateral Movement via .NET CLR
- RIFT: Analysing a Lazarus Shellcode Execution Method
- Introduction to Ghidra Scripting for Embedded ELFs and UPX Packed Executables
- Securing Custom Protocols With Noise
- A Red Team Guide for a Hardware Penetration Test
- BruteShark v1.1.5 released: single command mode was implemented. Extract Kerberos, NTLM, Cram-MD5, HTTP-Digest, FTP, Telnet passwords and more by a single command from your shell. All hashes exported as Hashcat input files. Would love to get feedbacks! https://github.com/odedshimon/BruteShark
- Who Will Control the Software That Powers the Internet? - Andreessen Horowitz
- LloydLabs/delete-self-poc - A way to delete a locked file, or current running executable, on disk
Posted: 23 Jan 2021 03:17 AM PST |
MSSQL Lateral Movement via .NET CLR Posted: 22 Jan 2021 11:40 PM PST |
RIFT: Analysing a Lazarus Shellcode Execution Method Posted: 23 Jan 2021 05:50 AM PST |
Introduction to Ghidra Scripting for Embedded ELFs and UPX Packed Executables Posted: 23 Jan 2021 08:25 AM PST |
Securing Custom Protocols With Noise Posted: 22 Jan 2021 05:44 PM PST |
A Red Team Guide for a Hardware Penetration Test Posted: 23 Jan 2021 05:42 AM PST |
Posted: 22 Jan 2021 04:43 PM PST |
Who Will Control the Software That Powers the Internet? - Andreessen Horowitz Posted: 23 Jan 2021 06:28 AM PST |
LloydLabs/delete-self-poc - A way to delete a locked file, or current running executable, on disk Posted: 22 Jan 2021 12:51 PM PST |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment