Tag: Cracking

LLMNR Poisoning and WPAD Spoofing
active-dicrectory, BugBountywriteup

LLMNR Poisoning and WPAD Spoofing

I recently started an internship at as a Pentesting intern. Before starting, I knew that Active Directory would be a huge target, but did not ... Read More

DEF CON Voting Village matures as industry keeps its distance
2016 elections, 2020 elections

DEF CON Voting Village matures as industry keeps its distance

(Stephen Valasco / Flickr) technology Written by Sean Lyngaas Aug 12, 2019 | CYBERSCOOP The third annual Voting Village at the DEF CON hacking conference was ... Read More

PsiXBot Continues to Evolve with Updated DNS Infrastructure
Cyber threat

PsiXBot Continues to Evolve with Updated DNS Infrastructure

Overview Earlier this year, FoxIT published research regarding the evolution of a .NET based malware known as “PsiXBot.” We have continued to observe the malware ... Read More

Pen-testing Technique.

暗网网址 onion dir🔰 Tor links

暗网网址 onion dir Tor links dirnxxdraygbifgc.onion – Your copy and paste friendly .onion link list. Feel free to copy this list to forums, pastebins etc ... Read More

Pen-testing Technique.

暗网网址400个 2019年8月11日更新

暗网网址400个 2019年8月11日更新 Darknet Markets : Darknet marketplace is the market where one can sell or buy products online. In darknet markets the payment mode where ... Read More

Critical vulnerabilities discovered in Prima FlexAir access control platform
hacker, SecurityLAB

Critical vulnerabilities discovered in Prima FlexAir access control platform

Exploiting vulnerabilities gives an attacker full access to the control system. The United States Cybersecurity Agency (CISA) warned of multiple dangerous vulnerabilities in the Prima ... Read More

LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards
Cyber threat

LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards

Overview Between July 19 and July 25, 2019, several spear phishing emails were identified targeting three US companies in the utilities sector. The phishing emails appeared ... Read More

macOS / iOS JavaScriptCore – Loop-Invariant Code Motion (LICM) Leaves Object Property Access Unguarded
remote code execution

macOS / iOS JavaScriptCore – Loop-Invariant Code Motion (LICM) Leaves Object Property Access Unguarded

- Exploit Details While fuzzing JavaScriptCore, I encountered the following (modified and commented) JavaScript program which crashes jsc from current HEAD and release (/System/Library/Frameworks/JavaScriptCore.framework/Resources/jsc): function ... Read More

Attackers can find out the iPhone phone number through AirDrop
hacker, SecurityLAB

Attackers can find out the iPhone phone number through AirDrop

Problems arose in iOS 10.3.1 and higher, including in beta versions of iOS 13. A team of hexway researchers was able to identify the iPhone's ... Read More