- An interesting recon script was dropped/run in the honeypot recently. The script looks for cookies, domain trusts, domain admins, local users, installed patches, connected/listening services, installed applications, etc.
- Securing memory at EPYC scale
- From 0 to 1337. brief security analysis of a large service provider
- A Fundamental Tool in the Toolkit: Evasive Shellcode Launchers – Part 1
- AWS Automatic Remediation - Part II: S3 Buckets
- qdPM v9.1 Authenticated RCE Exploit - Full Walk Through + Custom Exploit [OC]
- [Project] Machine Learning for Phishing Websites Detection
- Cache poisoning DoS in CloudFoundry gorouter (CVE-2020-5401)
- CVE-2020-1938: Ghostcat vulnerability
Posted: 28 Feb 2020 04:19 AM PST |
Posted: 28 Feb 2020 11:18 AM PST |
From 0 to 1337. brief security analysis of a large service provider Posted: 28 Feb 2020 07:38 AM PST |
A Fundamental Tool in the Toolkit: Evasive Shellcode Launchers – Part 1 Posted: 28 Feb 2020 04:06 AM PST |
AWS Automatic Remediation - Part II: S3 Buckets Posted: 28 Feb 2020 06:33 AM PST |
qdPM v9.1 Authenticated RCE Exploit - Full Walk Through + Custom Exploit [OC] Posted: 27 Feb 2020 10:58 PM PST |
[Project] Machine Learning for Phishing Websites Detection Posted: 27 Feb 2020 07:21 PM PST |
Cache poisoning DoS in CloudFoundry gorouter (CVE-2020-5401) Posted: 28 Feb 2020 01:30 AM PST |
CVE-2020-1938: Ghostcat vulnerability Posted: 28 Feb 2020 09:52 AM PST |
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment