pro MQTT Protocol Overview By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 15:21:53 GMT This whitepaper provides an overview of the MQTT protocol. MQTT is a is an open OASIS and ISO standard (ISO/IEC PRF 20922) lightweight, simple machine to machine TCP/IP based protocol which can be used for communication between IoT devices. Full Article
pro Data Leak Revealed At South Africa's Main Electricity Provider By packetstormsecurity.com Published On :: Wed, 06 Feb 2019 13:58:54 GMT Full Article headline hacker data loss africa scada
pro NEC Univerge SV9100/SV8100 WebPro 10.0 Remote Configuration Download By packetstormsecurity.com Published On :: Tue, 23 Jan 2018 04:51:52 GMT NEC Univerge SV9100/SV8100 WebPro version 10.0 suffers from a remote configuration download vulnerability. The gzipped telephone system configuration file 'config.gz' or 'config.pcpx' that contains the unencrypted data file 'conf.pcpn', can be downloaded by an attacker from the root directory if previously generated by a privileged user. Full Article
pro ProCheckUp Security Advisory 2009.16 By packetstormsecurity.com Published On :: Thu, 15 Jul 2010 00:49:36 GMT Procheckup has found by making a malformed request to the Juniper IVE Web interface without authentication, that a vanilla cross site scripting (XSS) attack is possible. Full Article
pro DevSecOps: A Secured Approach By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:35:06 GMT Whitepaper called DevSecOps: A Secure Approach. Full Article
pro From Zero Credentials To Full Domain Compromise By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 14:19:17 GMT Whitepaper called From Zero Credentials to Full Domain Compromise. This paper covers techniques penetration testers can use in order to accomplish an initial foothold on target networks and achieve full domain compromise without executing third party applications or reusing clear text credentials. Full Article
pro Asterisk Project Security Advisory - AST-2018-001 By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 23:02:22 GMT Asterisk Project Security Advisory - The RTP support in Asterisk maintains its own registry of dynamic codecs and desired payload numbers. While an SDP negotiation may result in a codec using a different payload number these desired ones are still stored internally. When an RTP packet was received this registry would be consulted if the payload number was not found in the negotiated SDP. This registry was incorrectly consulted for all packets, even those which are dynamic. If the payload number resulted in a codec of a different type than the RTP stream (for example the payload number resulted in a video codec but the stream carried audio) a crash could occur if no stream of that type had been negotiated. This was due to the code incorrectly assuming that a stream of the type would always exist. Full Article
pro Windows UAC Protection Bypass (Via Slui File Handler Hijack) By packetstormsecurity.com Published On :: Thu, 31 May 2018 20:50:19 GMT This Metasploit module will bypass UAC on Windows 8-10 by hijacking a special key in the Registry under the Current User hive, and inserting a custom command that will get invoked when any binary (.exe) application is launched. But slui.exe is an auto-elevated binary that is vulnerable to file handler hijacking. When we run slui.exe with changed Registry key (HKCU:SoftwareClassesexefileshellopencommand), it will run our custom command as Admin instead of slui.exe. The module modifies the registry in order for this exploit to work. The modification is reverted once the exploitation attempt has finished. The module does not require the architecture of the payload to match the OS. If specifying EXE::Custom your DLL should call ExitProcess() after starting the payload in a different process. Full Article
pro Windows UAC Protection Bypass By packetstormsecurity.com Published On :: Thu, 13 Dec 2018 19:20:15 GMT This Metasploit module modifies a registry key, but cleans up the key once the payload has been invoked. The module does not require the architecture of the payload to match the OS. Full Article
pro VMware Host VMX Process COM Class Hijack Privilege Escalation By packetstormsecurity.com Published On :: Mon, 25 Mar 2019 16:02:25 GMT The VMX process (vmware-vmx.exe) process configures and hosts an instance of VM. As is common with desktop virtualization platforms the VM host usually has privileged access into the OS such as mapping physical memory which represents a security risk. To mitigate this the VMX process is created with an elevated integrity level by the authentication daemon (vmware-authd.exe) which runs at SYSTEM. This prevents a non-administrator user opening the process and abusing its elevated access. Unfortunately the process is created as the desktop user which results in the elevated process sharing resources such as COM registrations with the normal user who can modify the registry to force an arbitrary DLL to be loaded into the VMX process. Affects VMware Workstation Windows version 14.1.5 (on Windows 10). Also tested on VMware Player version 15. Full Article
pro Windows 10 UAC Protection Bypass Via Windows Store (WSReset.exe) And Registry By packetstormsecurity.com Published On :: Thu, 05 Sep 2019 23:59:01 GMT This Metasploit module exploits a flaw in the WSReset.exe file associated with the Windows Store. This binary has autoelevate privs, and it will run a binary file contained in a low-privilege registry location. By placing a link to the binary in the registry location, WSReset.exe will launch the binary as a privileged user. Full Article
pro Windows Escalate UAC Protection Bypass By packetstormsecurity.com Published On :: Mon, 18 Nov 2019 15:34:40 GMT This Metasploit module will bypass Windows UAC by hijacking a special key in the Registry under the current user hive, and inserting a custom command that will get invoked when Windows backup and restore is launched. It will spawn a second shell that has the UAC flag turned off. This module modifies a registry key, but cleans up the key once the payload has been invoked. Full Article
pro Trend Micro Security 2019 Security Bypass Protected Service Tampering By packetstormsecurity.com Published On :: Fri, 17 Jan 2020 16:42:02 GMT Trend Micro Maximum Security is vulnerable to arbitrary code execution as it allows for creation of registry key to target a process running as SYSTEM. This can allow a malware to gain elevated privileges to take over and shutdown services that require SYSTEM privileges like Trend Micros "Asmp" service "coreServiceShell.exe" which does not allow Administrators to tamper with them. This could allow an attacker or malware to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. Note administrator privileges are required to exploit this vulnerability. Full Article
pro School ERP Pro 1.0 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:32:10 GMT School ERP Pro version 1.0 suffers from a remote code execution vulnerability. Full Article
pro Open-AudIT Professional 3.3.1 Remote Code Execution By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:43:06 GMT Open-AudIT Professional version 3.3.1 suffers from a remote code execution vulnerability. Full Article
pro NetBSD Stack Clash Proof Of Concept By packetstormsecurity.com Published On :: Thu, 29 Jun 2017 13:33:33 GMT NetBSD stack clash proof of concept exploit. Full Article
pro Poor Protocol Design For IoT Devices Fueling DDoS By packetstormsecurity.com Published On :: Wed, 18 Sep 2019 16:39:00 GMT Full Article headline denial of service flaw
pro SWAPGS Attack Proof Of Concept By packetstormsecurity.com Published On :: Fri, 14 Feb 2020 14:46:42 GMT SWAPGS attack proof of concept exploit that demonstrates an information disclosure in the windows kernel. Full Article
pro Broadcom Wi-Fi KR00K Proof Of Concept By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:14:05 GMT Broadcom Wi-Fi device KR00K information disclosure proof of concept exploit. It works on WPA2 AES CCMP with Frequency 2.4GHz WLANs. Full Article
pro HP ThinPro 6.x / 7.x Information Disclosure By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:23:36 GMT HP ThinPro versions 7.1, 7.0, 6.2.1, and 6.2 suffer from a local physical access information disclosure vulnerability. Full Article
pro Cisco Discovery Protocol (CDP) Remote Device Takeover By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 17:05:56 GMT Armis has discovered five critical, zero-day vulnerabilities in various implementations of the Cisco Discovery Protocol (CDP) that can allow remote attackers to completely take over devices. Full Article
pro Asterisk Project Security Advisory - AST-2017-011 By packetstormsecurity.com Published On :: Wed, 08 Nov 2017 23:44:44 GMT Asterisk Project Security Advisory - A memory leak occurs when an Asterisk pjsip session object is created and that call gets rejected before the session itself is fully established. When this happens the session object never gets destroyed. Full Article
pro Dridex Banking Trojan Compromises FTP Sites In New Campaign By packetstormsecurity.com Published On :: Fri, 19 Jan 2018 15:48:28 GMT Full Article headline malware bank trojan cybercrime fraud
pro NanoCore Trojan Is Protected In Memory From Being Killed Off By packetstormsecurity.com Published On :: Wed, 16 Jan 2019 13:35:39 GMT Full Article headline malware trojan
pro US Says It Can Prove Huawei Has Backdoor Access To Mobile Phone Networks By packetstormsecurity.com Published On :: Wed, 12 Feb 2020 18:13:47 GMT Full Article headline government usa phone china cyberwar backdoor
pro FSB Contractor Breach Exposes Secret Cyber Weapons Program By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:28 GMT Full Article headline government russia cyberwar
pro Spy Campaign Spams Pro-Tibet Group With ExileRAT By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 15:02:59 GMT Full Article headline malware email fraud cyberwar spyware phish
pro India's Wipro Investigating Phishing Of Employee Accounts By packetstormsecurity.com Published On :: Tue, 16 Apr 2019 22:07:35 GMT Full Article headline india password phish
pro Further Details On Wipro Phishing Attack Revealed By packetstormsecurity.com Published On :: Thu, 02 May 2019 01:38:59 GMT Full Article headline hacker india cyberwar phish
pro Hackers Target Oil Producers With Attacks By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:00 GMT Full Article headline hacker phish
pro Spear-Phishing Campaign Compromises Executives At 150+ Companies By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:50 GMT Full Article headline hacker africa password phish
pro Building A Simple Proxy Fuzzer For THe MQTT Protocol Using The Polymorph Framework By packetstormsecurity.com Published On :: Tue, 24 Apr 2018 23:51:18 GMT Whitepaper that shows how easy you can build a fuzzer for the MQTT protocol by using the Polymorph framework. Full Article
pro ISO-8385 Protocol Fuzzer By packetstormsecurity.com Published On :: Wed, 05 Feb 2020 18:22:40 GMT This python script is a fuzzer for the ISO-8385 financial protocol. It is compatible with sulley and bofuzz and is now part of the official bofuzz release. Full Article
pro Probe Into Hacker Attack On FG Website By packetstormsecurity.com Published On :: Mon, 10 Jan 2011 16:30:35 GMT Full Article headline hacker ireland
pro Irish Data Protection Authority Rules On Facebook By packetstormsecurity.com Published On :: Thu, 22 Dec 2011 19:57:14 GMT Full Article headline privacy facebook social ireland
pro Ireland Passes SOPA-Like Anti-Piracy Legislation Despite Protests By packetstormsecurity.com Published On :: Thu, 01 Mar 2012 16:22:30 GMT Full Article headline government riaa mpaa pirate ireland
pro Irish Data Watchdog Is Probing Facebook Transfers To US By packetstormsecurity.com Published On :: Tue, 20 Oct 2015 15:43:57 GMT Full Article headline government privacy usa data loss facebook social ireland
pro Irish Broadband Provider Bluebox Hacked By packetstormsecurity.com Published On :: Mon, 30 Nov 2015 17:01:14 GMT Full Article headline hacker privacy data loss ireland
pro Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
pro CursedChrome Turns Your Browser Into A Hacker's Proxy By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:12 GMT Full Article headline hacker flaw google chrome
pro HPP Protection Patch For ModSecurity 2.5.9 By packetstormsecurity.com Published On :: Mon, 06 Jul 2009 18:09:02 GMT HPP (HTTP Parameter Pollution) protection patch for ModSecurity version 2.5.9. Full Article
pro Iranians Resist Internet Censorship Amid Deadly Street Protests By packetstormsecurity.com Published On :: Tue, 02 Jan 2018 17:50:31 GMT Full Article headline government iran twitter censorship
pro Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
pro Protests In Russia Target Internet Iron Curtain Legislation By packetstormsecurity.com Published On :: Mon, 11 Mar 2019 14:35:35 GMT Full Article headline government russia cyberwar censorship
pro Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
pro Bruce Schneier Proposes Hacking Society For A Better Tomorrow By packetstormsecurity.com Published On :: Sun, 01 Mar 2020 15:40:23 GMT Full Article headline hacker conference cryptography rsa
pro Tor Project Loses A Third Of Staff In Coronavirus Cuts By packetstormsecurity.com Published On :: Mon, 20 Apr 2020 15:06:31 GMT Full Article headline privacy virus cryptography
pro Create-Project Manager 1.07 Cross Site Scripting / HTML Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:30:17 GMT Create-Project Manager version 1.07 suffers from cross site scripting and html injection vulnerabilities. Full Article
pro Facebook And Twitter Profiles Silently Slurped By Shady Code By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:06 GMT Full Article headline privacy malware phone data loss fraud facebook social twitter
pro Microsoft Windows Vista/Server 2008 nsiproxy.sys Denial Of Service By packetstormsecurity.com Published On :: Wed, 18 May 2011 09:09:09 GMT Microsoft Windows Vista/Server 2008 nsiproxy.sys local kernel denial of service exploit. Full Article