the grugq's newsletter

Subscribe
Archives
October 12, 2024

October 12, 2024

October 12, 2024

making one of those "uuid generator" websites where i give out uuids scraped out of github projects to drive down entropy in the universe

— emma (@carrot_c4k3) October 11, 2024


ICYMI, this bulletin on SVR cyber activities released yesterday by NSA/etc. contains a rather interesting list of vulnerabilities that have not necessarily been publicly confirmed to be under wide exploitation but that the agencies suggest you pay special attention to.🤔 https://t.co/bm3vsllvdT pic.twitter.com/4DazIWZjeR

— Brian in Pittsburgh (@arekfurt) October 11, 2024


THC RELEASE: 🎁Execute arbitrary backdoors 🚪on targets that do NOT allow execution 🙈 (noexec). Without ptrace() or mmap(). With only BASH or PHP.👉Trick BASH to make (any)❗️SYSCALLS ❗️to the kernel. 🤪 #ISPScarehttps://t.co/pvRFYpkEs4 pic.twitter.com/FhVGHIRlJE

— The Hacker's Choice (@thc@infosec.exchange) (@hackerschoice) October 10, 2024


Army to replace robots with cheaper, more expendable Marines https://t.co/nQfXeinNbW

— Duffel Blog (@DuffelBlog) October 11, 2024


Proof of Concept Exploit for CVE-2024-9464 : https://t.co/MJdY8KUVOJ

Palo Alto Expedition: From N-Day to Full Compromise : https://t.co/skvf12XotI pic.twitter.com/Vj3AEWDRfR

— Binni Shah (@binitamshah) October 11, 2024


Building an EDR From Scratch Part 3 - Creating The Agent (Endpoint Detection and Response) : https://t.co/250zVPD9gn

Part 2 : Hooking DLL (Endpoint Detection and Response) : https://t.co/LHZCFvXGFD

Part 1 - Intro (Endpoint Detection and Response) : https://t.co/nbANOFf2jd…

— Binni Shah (@binitamshah) October 11, 2024


I wrote an explained writeup for a windows kernel ctf challenge that came in Sekai Ctf 2024 . The author of the challenge is @bienpnn .
This is a nice challenge for those who want to try windows kernel. I also learnt something new.
Thanks @bienpnn .https://t.co/z6IrGmQ7DU

— nu1lptr (@_4bhishek) October 10, 2024


"Techniques to exploit information could include stealing an adversary's battleplan or trying to understand the location of its tactical assets." https://t.co/9ru9D4DdDs

— Texas NatSec Review (@TXNatSecReview) October 12, 2024


Today I released a Ghidra data type archive that I've created while analyzing Windows drivers. All of the definitions are ones that weren't present in publicly available GDT files. Whenever I create new definitions I'll be updating the public versionhttps://t.co/nCCsFmyP9d

— サイバー犯罪さん🔻 (@g0jirasan) October 10, 2024


Checkout these two projects on github project that aims to help secure AD CS. https://t.co/EfKmi679MG
And a honeypot AD CS https://t.co/ONbkAOz6q6

— Justin Bollinger (@Bandrel) October 10, 2024


I just published a blog post focused on details of using offensive .NET for both enumeration and exploitation of #activedirectory environments! Including some customized code examples from a tool I've been developing!https://t.co/SpseqUqoAp

I had lots of fun with this one!

— Logan Goins (@_logangoins) October 11, 2024


Somedays I just love AI so much pic.twitter.com/QgSPMeOcKb

— Justin Joque (@jjoque) October 10, 2024


CellGuard & BaseTrace are Open Source!
The CellGuard iOS app aims to uncover cellular attacks targeting your iPhonehttps://t.co/9yVBcSttSh

— Lukas Arnold (@lukasarnld) October 11, 2024


Introduction | CellGuard

CellGuard is a research project that analyzes how cellular networks are operated and possibly surveilled.


Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X