unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Rss
黑夜模式
Shooting Yourself in the .flags – Jailbreaking the Sonos Era 100
Research performed by Ilya Zhuravlev supporting the ExploitDevelopment Gro...
2023-12-4 18:25:38 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
sonos
rootfs
emmc
firmware
era
Technical Advisory: Adobe ColdFusion WDDX Deserialization Gadgets
Vendor: AdobeVendor URL: https://www.adobe.com/uk/products/coldfusion-fami...
2023-11-21 17:0:0 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
coldfusion
loglevel
cfc
wizardhash
cfide
Is this the real life? Is this just fantasy? Caught in a landslide, NoEscape from NCC Group
Author: Alex Jessop (@ThisIsFineChief)SummaryTl;drThis post...
2023-11-20 17:0:0 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
ransomware
utilised
noescape
windows
dumping
The Spelling Police: Searching for Malicious HTTP Servers by Identifying Typos in HTTP Responses
At Fox-IT (part of NCC Group) identifying servers that host nefarious activ...
2023-11-15 21:54:51 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
malicious
typos
deviations
anomalous
anomalies
Public Report – WhatsApp Auditable Key Directory (AKD) Implementation Review
In August 2023, Meta engaged NCC Group’s Cryptography Services practice to...
2023-11-15 04:59:18 | 阅读: 5 |
收藏
|
NCC Group Research - research.nccgroup.com
conscrypt
windows
akd
families
ransomware
Don’t throw a hissy fit; defend against Medusa
Unveiling the Dark Side: A Deep Dive into Active Ransomware Families Au...
2023-11-13 22:1:45 | 阅读: 16 |
收藏
|
NCC Group Research - research.nccgroup.com
powershell
medusa
windows
ransomware
malicious
Demystifying Cobalt Strike’s “make_token” Command
IntroductionIf you are a pentester and enjoy tinkering with Windows, you ha...
2023-11-10 22:51:39 | 阅读: 15 |
收藏
|
NCC Group Research - research.nccgroup.com
windows
security
runas
netonly
network
Tool Release: Magisk Module – Conscrypt Trust User Certs
Android 14 introduced a new feature which allows to remotely install CA...
2023-11-8 22:31:13 | 阅读: 26 |
收藏
|
NCC Group Research - research.nccgroup.com
conscrypt
apex
magisk
cacerts
blister
Post-exploiting a compromised etcd – Full control over the cluster and its nodes
Kubernetes is essentially a framework of various services that make up its...
2023-11-7 16:0:0 | 阅读: 13 |
收藏
|
NCC Group Research - research.nccgroup.com
etcd
pods
kubernetes
plane
kube
D0nut encrypt me, I have a wife and no backups
Unveiling the Dark Side: A Deep Dive into Active Ransomware FamiliesAut...
2023-11-7 02:6:47 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
ransomware
systembc
network
lateral
c2
Popping Blisters for research: An overview of past payloads and exploring recent developments
Blister is a piece of malware that loads a payload embedded inside it....
2023-11-1 20:0:0 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
blister
mythic
cobalt
Technical Advisory: Insufficient Proxyman HelperTool XPC Validation
Vendor: Proxyman LLCVendor URL: https://proxyman.io/Versions affected: co...
2023-11-1 04:3:27 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
proxyman
helpertool
proxy
nsproxy
leaf
Unveiling the Dark Side: A Deep Dive into Active Ransomware Families
Not so lucky: BlackCat is back! Authors: Alex Jessop @ThisIsFineChief...
2023-11-1 04:1:57 | 阅读: 22 |
收藏
|
NCC Group Research - research.nccgroup.com
ransomware
windows
blackcat
veeam
Public Report – Zcash FROST Security Assessment
Here are some related articles you may find interesting...
2023-10-23 20:6:7 | 阅读: 11 |
收藏
|
NCC Group Research - research.nccgroup.com
caliptra
connectize
g6
security
Technical Advisory – Multiple Vulnerabilities in Connectize G6 AC2100 Dual Band Gigabit WiFi Router (CVE-2023-24046, CVE-2023-24047, CVE-2023-24048, CVE-2023-24049, CVE-2023-24050, CVE-2023-24051, CVE-2023-24052)
Connectize’s G6 WiFi router was found to have multiple vulnerabilities expo...
2023-10-19 21:53:42 | 阅读: 52 |
收藏
|
NCC Group Research - research.nccgroup.com
attacker
connectize
victim
network
g6
Public Report – Caliptra Security Assessment
During August and September of 2023, Microsoft engaged NCC Group to conduct...
2023-10-19 02:26:29 | 阅读: 14 |
收藏
|
NCC Group Research - research.nccgroup.com
caliptra
security
firmware
dpe
rom
Introduction to AWS Attribute-Based Access Control
AWS allows tags, arbitrary key-value pairs, to be assigned to many resources...
2023-10-2 20:1:0 | 阅读: 8 |
收藏
|
NCC Group Research - research.nccgroup.com
sns
ec2
tagging
abac
resourcetag
On Multiplications with Unsaturated Limbs
This post is about a rather technical coding strategy choice that arises whe...
2023-9-19 01:4:8 | 阅读: 10 |
收藏
|
NCC Group Research - research.nccgroup.com
risc
addcarry
crrl
limbs
dalek
From ERMAC to Hook: Investigating the technical differences between two Android malware variants
Authored by Joshua Kamp (main author) and Alberto Segura.SummaryHoo...
2023-9-11 17:3:24 | 阅读: 31 |
收藏
|
NCC Group Research - research.nccgroup.com
ermac
victim
c2
decompiled
Ruling the rules
Mathew Vermeer is a doctoral candidate at the Organisation Governance dep...
2023-9-8 22:55:30 | 阅读: 12 |
收藏
|
NCC Group Research - research.nccgroup.com
fox
nids
security
network
ruleset
Previous
3
4
5
6
7
8
9
10
Next