Pentester Lab Pro Subscription Giveaway

InfoSec Write-ups - Medium-- InfoSec Writeups’ first collaboration with PentesterLabHello folks!We are super excited to announce that Infosec Write-ups is conducting its first-ever competition in collaboration with PentesterLab — the biggest and best online resource that makes learning web hacking easier!The winners will receive 1-month PentesterLab Pro Lab Coupons, using which they can access all the pro labs … Continue reading Pentester Lab Pro Subscription Giveaway

VideoBytes: Ransomware gets wasted!

Malwarebytes Labs-- Hello dear readers, and welcome to the latest edition of VideoBytes! On today’s episode, we’re talking about how ransomware is on the rise again, focused on attacking corporations with malware that not only encrypts files, but also steals it.  The tactics used to deploy these forms of ransomware have become more capable and … Continue reading VideoBytes: Ransomware gets wasted!

Increasing XSS impact using XSScope

InfoSec Write-ups - Medium-- During Bug Hunting, everyone aims for triggering the “1” alert. However, if you want to escalate your impact of XSS, now you can do this easily by using XSScope.What is XSScope?What is XSScope? XSScope is an advanced XSS payload generator platform for Client-Side attacks and also with an aim of increaing the impact … Continue reading Increasing XSS impact using XSScope

Researchers Fingerprint Exploit Developers Who Help Several Malware Authors

The Hacker News-- Writing advanced malware for a threat actor requires different groups of people with diverse technical expertise to put them all together. But can the code leave enough clues to reveal the person behind it? To this effect, cybersecurity researchers on Friday detailed a new methodology to identify exploit authors that use their … Continue reading Researchers Fingerprint Exploit Developers Who Help Several Malware Authors

Explore Data Analysis & Deep Learning with This $40 Training Bundle

Null Byte « WonderHowTo-- Data makes the world go round. It has gotten to the point that it's considered the most valuable resource, perhaps even more important than oil. Businesses use data to collect critical information about their users and improve their services; governments utilize it to improve things like public transportation; doctors analyze data … Continue reading Explore Data Analysis & Deep Learning with This $40 Training Bundle

How to Escape Restricted Shell Environments on Linux

Null Byte « WonderHowTo-- The moment arrives when you finally pop a shell on the web server you've been working on, only you find yourself in a strange environment with limited functionality. Restricted shells are often used as an additional line of defense and can be frustrating for an attacker to stumble upon. But with … Continue reading How to Escape Restricted Shell Environments on Linux

Exploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)

InfoSec Write-ups - Medium-- IntroductionIn part 1 we compromised an account with multiple permissions, but no Administrator access. We found a potential role that would allow us to escalate privileges, following one of the methods in Rhinosecuritylab’s post. Briefly explained, we’ll try to create an instance and attach to it a privileged role at creation … Continue reading Exploiting AWS IAM permissions for total cloud compromise: a real world example (part 2/2)

Chaos in a cup: When ransomware creeps into your smart coffee maker

Malwarebytes Labs-- When the fledgling concept of the Internet of Things (IoT) was beginning to excite the world almost a decade ago, perhaps no coffee lover at that time would’ve imagined including the coffee machine in the roster of internet-connected devices—even in jest. True, the simple, utilitarian coffee machine may not be as popular now … Continue reading Chaos in a cup: When ransomware creeps into your smart coffee maker