the grugq's newsletter

Subscribe
Archives
September 11, 2024

September 11, 2024

September 11, 2024

Photos released in Aug. 2024 reportedly showing US Special Forces training on CNE/CNA operations to disrupt and/or gain access to their target's devices (WiFi, IoT/cameras, smartlocks, etc.) for covert infiltration.

Source: https://t.co/nA6vX1WheC pic.twitter.com/fqHzuPO0j7

— Spy Collection (@SpyCollection1) September 11, 2024

Green Berets Hijacked WiFi To Control Home Security System Then Vanish In Mock Raid

Green Berets also used electronic warfare gear to eliminate evidence of their activities during the realistic infiltration and raiding exercise.


Nice tutorial on Linux kernel exploitation. For the record, ignore anyone saying you don't need to learn C for cybersecurity. Not knowing C will seriously hamstring you in many ways in Linux and general cybersecurity. You don't need to be a C wizard, but basic understanding is a… https://t.co/FJcbOUxT09

— Craig Rowland - Agentless Linux Security (@CraigHRowland) September 10, 2024

Beginners intro to Linux kernel exploitation (env setup and ret2usr)

Part 1: https://t.co/0gZAvBeESl
Part 2: https://t.co/n9xCkOwOR3#Linux #cybersecurity pic.twitter.com/dz4e8Te5Pr

— 0xor0ne (@0xor0ne) September 10, 2024


My first thought was "Wow malware is scraping images". Then I opened iPhoto and typed a few words that appeared in photos. Like "Stream Deck" pulled up a picture of my desk.

My guess is malware is just reading from the OS's photo index database and not doing any scraping at all.… https://t.co/KCRAMqZJp4

— ippsec (@ippsec) September 10, 2024


.@bunsofwrath12 shared some incredibly useful PowerShell scripts with us for working with @thor_scanner in a forensic lab settinghttps://t.co/Jj8nU7rmmS pic.twitter.com/dyDDzcwSs3

— Florian Roth (@cyb3rops) September 10, 2024


A new Pwndbg release is here with features showing regs/mem values in disasm context via emulation, Binary Ninja integration, dumping Go info, glibc UAF heap tracker and more!

Changelog on https://t.co/WhcMZugrso

Also ships with portable archives for ARM64, RISC-V and ARMv7

— Disconnect3d (@disconnect3d_pl) September 10, 2024


IPA : GUI analyzer for deep-diving into PDF files (Detect malicious payloads, understand object relationships, and extract key information for threat analysis) : https://t.co/nG4qzPA0Ls pic.twitter.com/zOyeJB1YC6

— Binni Shah (@binitamshah) September 10, 2024


My daughter told me there is a small get together at school on Friday.
I asked her, "How small?"
She replied,
"Just you, me, and the principal.

— єℓαιηє (@elainesim28) September 10, 2024


Microsoft Says Windows Update Zero-Day Being Exploited to Undo Security Fixes - CVE-2024-43491 - https://t.co/CYrcg0G0fy

— SecurityWeek (@SecurityWeek) September 10, 2024


Just Released: The Technique Inference Engine (TIE) uses machine learning to predict likely adversary activities based on observed techniques. Learn more: https://t.co/BrRPZm3glU #threatinformeddefense #cybersecurity #machinelearning

— MITRE Engenuity (@MITREengenuity) September 10, 2024


New blog post on our server side RCE project! 👀 https://t.co/PWLzN9olj0

— 那个饺子🦆(JJ) (@thatjiaozi) September 10, 2024



Don't miss what's next. Subscribe to the grugq's newsletter:
Start the conversation:
X