linuxmagazine, to python
@linuxmagazine@fosstodon.org avatar

Did you miss the Linux Update newsletter yesterday? Read it now and subscribe free to get it every Thursday! https://mailchi.mp/linux-magazine.com/linux-update-python-in-the-browser #Python #Linux #JunoComputers #SnoopGod #pentesting #Xidel #AlmaLinux #FOSSASIA #Docker

Heliograph, to mastodon
@Heliograph@mastodon.au avatar

nice write up in #TheCrux thanks @daedalus :awesome: 👏

"​Federated social media software #Mastodon had an impersonation vulnerability that was patched last week. More than half the instance admins patched it in less than 24 hours. I enjoyed the comment from Elliott Wilkes, chief technology officer at Advanced Cyber Defence Systems, saying “there's just not the same investment in security because there's not massive revenue supporting the platform, and each owner of an instance has to perform security management on their own” as I look wistfully in the direction of Microsoft and its massively lucrative portfolio of security binfires."
Bugs were reported by German #pentesting outfit #Cure53 during a #Mozilla-requested audit.
https://www.theregister.com/2024/02/02/critical_vulnerability_in_mastodon_is/ #fediverse #socksup

YourAnonRiots, to Cybersecurity Japanese

Reviving Exploits Against Cred Structs - Six Byte Cross Cache Overflow to Leakless Data-Oriented Kernel Pwnage https://willsroot.io/2022/08/reviving-exploits-against-cred-struct.html #Pentesting #CyberSecurity #Infosec

YourAnonRiots, to Cybersecurity Japanese
YourAnonRiots, to Cybersecurity Japanese
YourAnonRiots, to infosec Japanese
YourAnonRiots, to windows Japanese
YourAnonRiots, to Cybersecurity Japanese

Form Tools Remote Code Execution: We Need To Talk About PHP https://labs.watchtowr.com/form-tools-we-need-to-talk-about-php/ #Pentesting #CyberSecurity #Infosec

AstraKernel, to rust

🪲 Shellcode evasion using WebAssembly and Rust

👉 Delivering metasploit stager payload using the WebAssembly to evade AV detection

https://balwurk.com/shellcode-evasion-using-webassembly-and-rust/

ericmann, to php
@ericmann@tekton.network avatar

I write #php. I'm pretty good with #security. I'm open to doing tech/architecture/code/security reviews for either PHP or specifically #WordPress projects. This includes #pentesting.

I'm not spinning up a dedicated site to solicit leads yet. But if this is a space you work in and you're interested in hiring a consultant/contractor to get you to the finish line ... drop me a DM.

Or email eric@eamann.com and we can discuss scopes/timelines/budgets.

apiratemoo, to hacking

I found this article refreshing for its honesty.

On a side note, have you noticed how many “training” sites there are now? It’s almost like people are making more money teaching hacking than actually doing it."

I agree, but it's worth noting the education market has been saturated with non-material, often designed as a ploy to encourage spending for a very long time now.

A cogwheel grift to get people spending.

Training resources (and the industry) suffer from the following issues:

  • Redundancy
  • Unnecessary word bloat
  • Staleness to dynamic alternatives
  • Outdated and unrealistic

https://assume-breach.medium.com/im-not-a-pentester-and-you-might-not-want-to-be-one-either-8b5701808dfc

#hacking #infosec #informationsecurity #penetrationtesting #pentesting
#hack

aev, to jenkins
@aev@mastodon.sdf.org avatar
YourAnonRiots, to infosec Japanese
YourAnonRiots, to infosec Japanese
secbsd, to infosec Spanish

🔐 SecBSD 1.4 Released for ARM64!

We are thrilled to announce the release of SecBSD 1.4 for Raspberry Pi, Apple M1/M2 Pine64 and more!

Download SecBSD 1.4 for ARM64:

https://mirror.secbsd.org/pub/SecBSD/snapshots/arm64
https://mirror.laylo.nl/pub/SecBSD/snapshots/arm64

Supported hardware:

Apple Mac mini (M1, 2020)
Apple MacBook Air (13-inch, M2, 2022)
Apple MacBook Air (M1, 2020)
Apple MacBook Pro (13-inch, M1, 2020)
Apple MacBook Pro (13-inch, M2, 2022)
Apple MacBook Pro (14-inch, M1 Pro/Max, 2021)
Apple MacBook Pro (14-inch, M2 Pro/Max, 2023)
Apple MacBook Pro (16-inch, M1 Pro/Max, 2021)
Apple MacBook Pro (16-inch, M2 Pro/Max, 2023)
Apple MacBoot Air (15-inch, M2, 2023)
Apple Studio (M1 Max/Ultra, 2022)
Apple iMac (24-inch, M1, 2021)
Banana Pi BPI-M5
NanoPi A64
NanoPi R5S
Orange Pi PC2
Orange Pi Zero Plus
Pine64 H64
Pine64 Pine 64/64+
Pine64 Pinebook
Pine64 ROCK64
Pine64 ROCKPro64
Pinebook Pro
Qualcomm Snapdragon 7cx
Qualcomm Snapdragon 8cx Gen 3
Raspberry Pi 3
Raspberry Pi 3 Model B+
Raspberry Pi 4
Raspberry Pi 400
Raspberry Pi Compute Module 4

In the coming days, we'll be adding more hacking tools for arm64. Stay tuned for updates!

#SecBSD #OpenBSD #Hackers #infosec #hacking #CyberSecurity #Hacktivism #BSD #Pentesting #RUNBSD #OpenSource #security #privacy #RaspberryPi

YourAnonRiots, to infosec Japanese

Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9

https://youtube.com/watch?v=NWpvswSlcKw

SecureOwl, to infosec

One of the best, and most underrated ways to get the most out of a pen test is to be a good pen test client. Seems easy, but you’d be surprised. What does it mean to be a good pen test client?

  1. make sure all the pre-test tasks, like provisioning of credentials, needed approvals etc, are completed well ahead of time. You ain’t paying the pentester to stand around and wait for access to be provisioned - so don’t. They also don’t want to stand around. They want to be pentesting.

  2. be responsive to questions and clarifications requested during the engagement. Pentesters have a tiny time window in which to maximize the value they can give you. Help them, don’t hinder them.

  3. give feedback on reports. Good, bad, neutral. Whatever, a lot of work goes into writing them (it should anyway, no ChatGPT you sneaky buggers), make people feel like their work has been reviewed accordingly.

  4. don’t fight to have things removed from the report because they are embarrassing. Fix the issue, have the tester retest and move on. You can say “we had a bug and our testing found it”, which is why you had a pen test in the first place. Putting pressure on people to hide finds isn’t fair.

  5. if you want a non-standard report format, mention that before the test begins. It’s your right to ask for the test results to be delivered to you however you please - in a spreadsheet for example, but asking a tester to reformat a report completely after delivery is lame. Don’t do it.

#infosec #pentesting #pentest

SecureOwl, to infosec

The Infosec Diaries: A collection of short stories, each episode in each series is based on a real-life story from the field.

Available on Kindle, Paperback and Audiobook

https://www.infosecdiaries.com

#infosec #DFIR #pentest #pentesting #cybersecurity #cybersecurityreads

AstraKernel, to infosec

🪲 Don't just stop at creating a video to crack software; also tag the corresponding software provider in the tweet

🤯 😅😂

#infosec #cybersecurity #Pentesting

SecureOwl, to infosec
null0perat0r, to Cybersecurity

Great research on how a Bitwarden vault could be opened without password or biometrics via it's Windows Hello implementation.
#redteam #pentesting #CyberSecurity #passwordless
https://blog.redteam-pentesting.de/2024/bitwarden-heist/

codinginquarantine, to keyboards
bane, to Cybersecurity
@bane@exploit.social avatar

Looking for contract work or leads. I finished setting up my company, so any potential work will be appreciated.

I can start as soon as possible.

https://secureorigin.io

kpwn, to infosec

CVE Crowd Top 10: Rank 10 to 7

The year is coming to a close. Take a look back with me at which CVEs were the most popular on https://cvecrowd.com.

See information about CVEs and popular posts below 🧵

#Pentesting #AppSec #InfoSec #CyberSecurity #BugBounty #Hacking #CVE #CveCrowd

kpwn, to infosec

Huge update to https://cvecrowd.com - the place to go for current discussions about the latest CVEs.

I have now added the federated timeline of infosec.exchange as a data source.

This should find posts from non-Mastodon instances much more reliable than before!

Read more below 🧵

#Pentesting #AppSec #InfoSec #CyberSecurity #BugBounty #Hacking #CVE #CveCrowd

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • everett
  • magazineikmin
  • mdbf
  • thenastyranch
  • khanakhh
  • rosin
  • Youngstown
  • ethstaker
  • slotface
  • modclub
  • kavyap
  • DreamBathrooms
  • Durango
  • provamag3
  • ngwrru68w68
  • InstantRegret
  • tacticalgear
  • GTA5RPClips
  • cubers
  • normalnudes
  • osvaldo12
  • tester
  • anitta
  • cisconetworking
  • megavids
  • Leos
  • lostlight
  • All magazines