Xerox legal threat reportedly silences researcher at Infiltrate security conference Security News & Discussion |
- Xerox legal threat reportedly silences researcher at Infiltrate security conference
- How I Might Have Hacked Any Microsoft Account
- PoC Exploit in SaltStack Minion
- Introduction to privilege escalation + Basic examples of abusing elevation control mechanisms
- CVE-2020-28243 - SaltStack Minion LPE
- Best Practices to Mitigate JSON Interoperability Vulnerabilities
- CertWatcher — Automating Certificate Transparency OSINT with Apps Script
- NATO approved firewall: Highly critical authentication bypass vuln & PoC video
- Hunting for Bugs in Windows Mini-Filter Drivers
- The Hafnium Threat Group is targeting Exchange Servers with 0-day exploits. Detection commands to search for potential exploitation are included in the article (Immediately update exchange servers).
- Unauth cmd injection as root on login / logout (plus other hilarious vulns) in Micro Focus Operations Bridge Reporter
- Qualcomm IPQ40xx: Analysis of Critical QSEE Vulnerabilities
- Alternative Shellcode Injection via windows callback functions. I am still working on this and will update it as I find more. More info about callback functions here: https://docs.microsoft.com/en-us/dotnet/framework/interop/callback-functions
- dwisiswant0/stargather - A fast GitHub stargazers information gathering tool
You are subscribed to email updates from /r/netsec - Information Security News & Discussion. To stop receiving these emails, you may unsubscribe now. | Email delivery powered by Google |
Google, 1600 Amphitheatre Parkway, Mountain View, CA 94043, United States |
No comments:
Post a Comment