Plus récents

fileless-xec is enable to execute a remote binary on a local machine directly from memory without dropping them on disk

github.com/ariary/fileless-xec

🇺🇸 Lists Entities Involved in the Support of 🇨🇳 Ch︀i︀na Military Quantum Computing Applications, 🇵🇰 Pakistani Nuclear and Missile Proliferation, and 🇷🇺 R︀ussi︀a's Military - The U.S Commerce Department's Bureau of Industry and Security (BIS) has issued a final rule adding 27 foreign entities and individuals to the Entity List for engaging in activities that are contrary to the national security or foreign policy interests of the 🇺🇸 United States. The 27 entities and individuals are located in the 🇨🇳 People's Republic of Ch︀i︀na (PRC), 🇯🇵 Japan, 🇵🇰 Pakistan and 🇸🇬 Singapore. One entity based in 🇷🇺 R︀ussi︀a was added to the Military End-User (MEU) list.

govinfo.gov/content/pkg/FR-202

GPUSleep - How to makes your Cobalt Strike beacon disappear into GPU memory (and eventually come back)

oxis.github.io/GPUSleep/

Point d'étape & plan d'action sur les travaux relatifs à la qualité de l'exploitation des réseaux fibre optique et aux raccordements finals

arcep.fr/uploads/tx_gspublicat

SQLRecon is a C# MS-SQL toolkit designed for offensive reconnaissance & post-exploitation

github.com/skahwah/SQLRecon

Picky PPID Spoofing - Parent Process ID (PPID) Spoofing is one of the techniques employed by authors to blend in the target system.

captmeelo.com//redteam/maldev/

XpFibre (Altice, ex-SFR FttH) dans le collimateur de l'ARCEP, le gendarme des télécoms. La société et ses filiales ne respectent pas leur obligation de fournir aux opérateurs tiers, aux collectivités et aux usagers un accès satisfaisant à son réseau de fibre optique. Une enquête administrative est ouverte.

Filiales:

  • Corsica Fibre
  • Debitex Telecom
  • Eure et Loir THD
  • Gravelines Network
  • Isère Fibre
  • Loiret THD
  • Agglo LaRochelle THD
  • Oise Numérique
  • Connect 76
  • Tarn Fibre
  • THD 64
  • Valofibre
  • Gard Fibre
  • Martinique THD
  • Guadeloupe Digital#france

arcep.fr/uploads/tx_gsavis/21-

CheckCert is a small utility to request and parse the SSL certificate from a public or private web application

github.com/skahwah/CheckCert

We were able to retrieve the key in a couple of days with a 49$ module by only using tools available in stores and, cherry on the cake, without breaking the . Bitlocker is the Full Disk Encryption () solution offered by for its operating systems

blog.scrt.ch/2021/11/15/tpm-sn

3 bugs (CVE-2021-1940, CVE-2021-1968 & CVE-2021-1969) in NPU exploited together enables me (Man Yue Mo) to execute arbitrary code in the kernel from an untrusted app with ease. I'll then use these primitives to create a reverse root shell with SELinux disabled on devices

securitylab.github.com/researc

Oh365UserFinder was created as a successor of o365Creeper. This tool is used for identifying valid o365 accounts and domains without the risk of account lockouts.

github.com/dievus/Oh365UserFin

Sketch is a popular UI/UX design app for . This post covers a vulnerability in Sketch that I discovered back in July - CVE-2021-40531. In its simplest form, it is a macOS quarantine bypass, but in context it can be used for RCE

jonpalmisc.com/2021/11/22/cve-

🇸🇪 employees are told not to open the emails, regardless of who sent them, and to report them to the IT department immediately. The and trojans both lead to further compromise and ultimately the deployment of on a breached network. Due to the severity of these infections and the likely compromise of their Exchange servers, IKEA is treating this security incident as a significant cyberattack that could potentially lead to a far more disruptive attack.

bleepingcomputer.com/news/secu

9 hommes soupçonnés d'avoir pratiqué l'arnaque au « Allo », du nom d'une combine téléphonique, mis en examen ce jeudi 25 novembre 2021. Ces voyous d'une vingtaine d'années originaires de cités du sud de 🇫🇷 achetaient sur le des données personnelles volées à la suite de piratages informatiques puis ils usurpaient les numéros de des agences bancaires des victimes et enfin ils téléphonaient aux victimes en se faisant passer pour les conseillers bancaires en prétextant une détection d' frauduleux. Les victimes ainsi conditionnées donnaient purement et simplement leur n° de CB, dates de validité, cryptogramme,..

lci.fr/justice-faits-divers/vi

🇪🇸 Los Mossos de Tarragona detienen a una pareja que utilizaba teminales a la venta de El Corte Inglés y Mediamarkt para fabricar criptomonedas por control remoto

lavanguardia.com/tecnologia/20

Plus anciens