Understanding how Kerberos works, but also WHY it works the way it does Security News & Discussion |
- Understanding how Kerberos works, but also WHY it works the way it does
- Kinsing Malware. Uses Shakespear's Hamlet to bypass static detection engines.
- Overview of dnsmasq Vulnerabilities: The Dangers of DNS Cache Poisoning
- CVE-2020-5377: Dell OpenManage Server Administrator File Read
- Run .Net assemblies using rundll32.exe
- Exploring Nim language - Writing a ransomware
- The great SameSite confusion
- Dangling DNS: Amazon EC2 IPs (Current State)
- CORS Misconfiguration in Verizon’s Residential Account Portal [2020]
- MSDAT v2.1 (& 2.0) is released. Many improvements in OLE automation, reverse shell, etc. New features and Python 3 compatible only now.
- GitHub security update: A bug related to handling of authenticated sessions
- VOOdoo - Remotely Compromising VOO Cable Modems
- Prime+Probe 1, JavaScript 0: Overcoming Browser-based Side-Channel Defenses
- Fuzzing grub: part 1
- Activists turn hacktivists - new ransomware that does not demand money [Article on SARBLOH Ransomware]
- BruteShark Version v1.2.0 Released: BruteShark is now can operate a Sniffer :-) live capture and build a visual network diagram, extract credentials and hashes including Kerberos and NTLM hashes on real time. I would love to get your feedback's! (p.s, contributors are also welcome)
- dwisiswant0/proxylogscan - A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855) / ProxyLogon.
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment