IT admins can request access to our code to test servers (code is not yet public to prevent abuse): github.com/vanhoefm/tun...
Academic paper: papers.mathyvanhoef.com/usenix2025-t...
IT admins can request access to our code to test servers (code is not yet public to prevent abuse): github.com/vanhoefm/tun...
Academic paper: papers.mathyvanhoef.com/usenix2025-t...
Here's the story of my first day on the job: www.reddit.com/r/talesfromt...
And something from my 20th anniversary in the industry: www.welivesecurity.com/2010/07/16/a...
Hope you find them interesting reading. :)
Here's the story of my first day on the job: www.reddit.com/r/talesfromt...
And something from my 20th anniversary in the industry: www.welivesecurity.com/2010/07/16/a...
Hope you find them interesting reading. :)
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them.
blog.fndsec.net/2024/11/25/s...
ShadowHound is a PowerShell alternative to SharpHound for Active Directory enumeration, using native PowerShell or ADModule (ADWS). As a bonus I also talk about some MDI detections and how to avoid them.
blog.fndsec.net/2024/11/25/s...
▪️-r 1.rule -r 2.rule
You can even add more rules, but it will quickly use a lot of memory. Save the rules that cracked a hash with:
▪️--debug-mode=1 --debug-file=found.rule
▪️-r 1.rule -r 2.rule
You can even add more rules, but it will quickly use a lot of memory. Save the rules that cracked a hash with:
▪️--debug-mode=1 --debug-file=found.rule
AKA fortijump
CVE-2024-47575
💾 PoC:
github.com/watchtowrlab...
🔖 Blog post:
labs.watchtowr.com/hop-skip-for...
AKA fortijump
CVE-2024-47575
💾 PoC:
github.com/watchtowrlab...
🔖 Blog post:
labs.watchtowr.com/hop-skip-for...
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
Looks like this got caught by chance. Wonder how long it would have taken otherwise.
www.openwall.com/lists/oss-se...
It has everything: malicious upstream, masterful obfuscation, detection due to performance degradation, inclusion in OpenSSH via distro patches for systemd support…
Now I’m curious what it does in RSA_public_decrypt
The hooked RSA_public_decrypt verifies a signature on the server's host key by a fixed Ed448 key, and then passes a payload to system().
It's RCE, not auth bypass, and gated/unreplayable.
802.11 Attack tool built in Rust 🦀
github.com/Ragnt/AngryO...
The documentation is pretty nice, also has recommendations for WiFi hardware.
github.com/Ragnt/AngryO...
802.11 Attack tool built in Rust 🦀
github.com/Ragnt/AngryO...
The documentation is pretty nice, also has recommendations for WiFi hardware.
github.com/Ragnt/AngryO...
Streaming media
streaming.media.ccc.de/37c3/
Videos archived
media.ccc.de/c/37c3
Schedule
fahrplan.events.ccc.de/congress/202...
Streaming media
streaming.media.ccc.de/37c3/
Videos archived
media.ccc.de/c/37c3
Schedule
fahrplan.events.ccc.de/congress/202...