This one is pretty cool.. with the help of @vulncheck we found active exploitation of an unpatched 0-day that doesn't even have a proper CVE entry yet.
https://www.greynoise.io/blog/active-exploitation-of-zero-day-zyxel-cpe-vulnerability-cve-2024-40891
=> More informations about this toot | View the thread
(Aww, I got giftcard spam on this post! I so rarely get to report/block on the Fediverse :) )
=> More informations about this toot | View the thread
Process injection shenanigans are dear to my heart - it's one of the first things I ever learned in security.
Inspired by an Akamai blog last month, this blog digs into techniques to tinker with other processes on Linux, and show you how to write a little debugger in C!
https://www.labs.greynoise.io/grimoire/2025-01-28-process-injection/
[#]linux #reversing #strace #ptrace #gdb
=> More informations about this toot | View the thread
I love this kind of ridiculous project / solution, it's the kinda thing I do but used for good!
https://medium.com/@tomysshadow/fixing-the-loading-in-myst-iv-revelation-86e2814afbf8
=> More informations about this toot | View the thread
I posted a quick/fun little blog about the dangers of invisible bytes, particularly when everybody copies/pastes exploits without understanding them:
https://www.labs.greynoise.io/grimoire/2024-11-20-null-problem/
[#]vulnerability #exploit #greynoise #null #byte
=> More informations about this toot | View the thread
Favorite quote from WatchTowr's blog about PAN-OS vuln:
=> More informations about this toot | View the thread
Last night was our final improv class before our showcase. We rapid-fire played 20+ improv games we might do for our showcase, then picked the handful to do live.
Super excited for Saturday!
If you happen to be an #improv nerd in #seattle, come see me in the Jet City 201 showcase this Saturday :)
=> More informations about this toot | View the thread
At improv class last night, we all had to mingle at a party with an objective. This was mine. I spent the whole time asking people questions about themselves.
When it came time to guess, everybody just thought I was a kind and respectful party guest.
Is this the secret to parties???
[#]improv
=> More informations about this toot | View the thread
Filled in my ballot, just need to drop it off. First time voting in a US presidential election as a new citizen! Exciting! Hope my wishes come true
=> More informations about this toot | View the thread
I have the worst superpower: extremely high tolerance to dental numbing.
Even with double extra bonus numbing, I've never gotten a filling without having to stop and freeze more due to extreme pain
=> More informations about this toot | View the thread
I love it when companies put their name in the PoC, it makes it so much easier to track down what I'm seeing when it gets sprayed out on the internet. Thanks watchTowr!
(This is Palo Alto Expedition - CVE-2024-9463)
@greynoise
[#]vulnerability #exploit #greynoise
=> More informations about this toot | View the thread
I analyzed three months of data from path-traversal attacks against SolarWinds Serv-U and wrote up my findings. Check it out on the @greynoise Grimoire!
https://www.labs.greynoise.io/grimoire/2024-09-30-whatchu-looking-for/
[#]Cybersecurity #blog #PathTraversal #Exploit
=> More informations about this toot | View the thread
Super cool write-up on weird mysterious traffic that we constantly see flooding the internet: https://darthnull.org/noisestorms/
=> More informations about this toot | View the thread
I'd like to fill in two weak spots in my vulnerability skills: Deserialization and SSTI attacks: can anybody recommend good resources (especially books) that cover one or both of these topics in depth?
=> More informations about this toot | View the thread
There's nothing more cringe than posting a bunch of vague crap before an embargo is lifted. Please, just don't.
Either release the info or shut up until you can talk details. Posting, hyping, dropping hints, stuff like that helps nobody.
[#]cybersecurity #vulnerability
=> More informations about this toot | View the thread
Me: Search for from 2012
Website: Result: (12 years old)
Me: No, that can't be right, I said 2012. ....oh.
=> More informations about this toot | View the thread
I love it when I'm trying to learn something new, like .NET Remoting, and I run into a super detailed blog with PCAPs, examples, and more. Thanks to @parsiya for doing the hard work so I don't have to!
https://parsiya.net/blog/2015-11-14-intro-to-.net-remoting-for-hackers/
[#]cybersecurity #tutorial
=> More informations about this toot | View the thread
Holy smokes!
https://www.rapid7.com/blog/post/2024/09/09/etr-multiple-vulnerabilities-in-veeam-backup-and-replication/
[#]Cybersecurity #veeam #vulnerability
=> More informations about this toot | View the thread
=> This profile with reblog | Go to iagox86@infosec.exchange account This content has been proxied by September (3851b).Proxy Information
text/gemini