Siddharth
@parad0xr
Security @ MPL | Bug Hunter | F1 Enthusiast | Web3 noob | Gamer | My opinions are my own
You might like
Cut our AWS bill from $52K to $18K per month. Took 3 weeks of detective work. The audit: - Started with AWS Cost Explorer - Noticed NAT Gateway was $8K/month - Data transfer was $12K/month - RDS storage was $6K/month What we found: - Logs were being sent to S3 via NAT Gateway -…
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW. The leak originated…
When we decompile an APK and see an unreadable index.android.bundle, it could be Hermes bytecode. Using github.com/P1sec/hermes-d… we can make it readable and look for interesting endpoints, keys, or app flows. #bugbounty
That is actually the real exploit. I went through all the decoding and stuff. It finally is the payload that creates spinstall0.aspx which then gets you the machine keys that allow you to craft your own Viewstates.
Super easy win for defenders… block everything from LoLRMM lolrmm.io
Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN
Reading Microsoft’s new Void Blizzard report, one thing stands out (again): Everything is about credential theft, phishing, and tokens. Initial access comes from buying or stealing creds - often through low-effort phishing. All the real action happens in the cloud, not on…
Microsoft has discovered worldwide cloud abuse activity by new Russia-affiliated threat actor Void Blizzard (LAUNDRY BEAR), whose cyberespionage activity targets gov't, defense, transportation, media, NGO, and healthcare in Europe and North America. msft.it/6011S9JpN
This vulnerability not only affects users of PuTTY but also extends to several other tools... Affected Products - PuTTY 0.68 - 0.80 - FileZilla 3.24.1 - 3.66.5 - WinSCP 5.9.5 - 6.3.2 - TortoiseGit 2.4.0.2 - 2.15.0 - TortoiseSVN 1.10.0 - 1.14.6
CVE-2024-31497: Critical PuTTY Vulnerability Exposes Private Keys securityonline.info/cve-2024-31497…
Vulnerability in Putty: "attacker in possession of a few dozen signed messages and the public key has enough information to recover the private key" * Revoke keys immediately including public in authorized_keys * Generate a new key pair and replace chiark.greenend.org.uk/~sgtatham/putt…
I spent the last 5 months reverse engineering Denuvo's protection in Hogwarts Legacy and finally managed to bypass it using more than 2000 hooks 😂 One of the toughest challenges of my life. Here's my blog post about it: momo5502.com/posts/2024-03-…
The results are in! We're proud to announce the Top 10 Web Hacking Techniques of 2023! portswigger.net/research/top-1…
Interesting Thread on a massive dump from a Chinese 🇨🇳 Ministry of Public Security (MPS) private industry contractor called iSoon (aka Anxun) Leak contains: - Spyware - Espionage Ops - “Twitter Monitoring Platform” - And a lot more 🔥 This is a crazy NTC Vulkan-level leak ⚠️
#threatintel someone just leaked a bunch of internal Chinese government documents on GitHub github.com/I-S00N/I-S00N/
I recently came across a weird case of cache deception vulnerability on a @SynackRedTeam target. I'm very excited to share the details with y'all. Also, I'm trying a new blog format this time. I hope you folks like it. Here you go: kuldeep.io/posts/web-cach…
Check out our new blog post! We hacked into Apple Travel Portal (yes, again!) using a 0-day Remote Code Execution exploit. Part 1 is live now, stay tuned for the follow-up on another RCE worth a total bounty of $40k! blog.projectdiscovery.io/hello-lucee-le…
projectdiscovery.io
Hello Lucee! Let us hack Apple again? — ProjectDiscovery Blog
Last year we conducted an in-depth analysis of multiple vulnerabilities within Adobe ColdFusion, we derived valuable insights, one of which revolved around CFM and CFC handling, parsing and executi...
"Guide to Reversing and Exploiting iOS binaries Part 2: ARM64 ROP Chains" #infosec #pentest #redteam inversecos.com/2022/06/guide-…
im never gonna use etherscan again
🧊 IceKube: Finding complex attack paths in Kubernetes clusters Bloodhound for Kubernetes Uses Neo4j to store & analyze Kubernetes resource relationships → identify attack paths & security misconfigs Currently has 25 attack techniques By @WithSecure labs.withsecure.com/tools/icekube-…
United States Trends
- 1. Blue Origin 9,070 posts
- 2. Megyn Kelly 32.4K posts
- 3. New Glenn 9,792 posts
- 4. Vine 35.4K posts
- 5. Senator Fetterman 19.6K posts
- 6. Brainiac 6,879 posts
- 7. CarPlay 4,538 posts
- 8. #NXXT_JPMorgan N/A
- 9. Portugal 66.2K posts
- 10. World Cup 105K posts
- 11. Eric Swalwell 29.1K posts
- 12. Matt Gaetz 15.5K posts
- 13. #2025CaracasWordExpo 4,794 posts
- 14. Padres 29.4K posts
- 15. Man of Tomorrow 7,016 posts
- 16. GeForce Season 1,111 posts
- 17. Grade 1 26.9K posts
- 18. Black Mirror 5,392 posts
- 19. Judge 132K posts
- 20. Katie Couric 10.1K posts
Something went wrong.
Something went wrong.