InfoSec Write-ups - Medium-- My Journey On Achieving The OSCP CertificationContinue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Category: Articles
How to Use Linux Smart Enumeration to Discover Paths to Privesc
Null Byte « WonderHowTo-- Privilege escalation is the technique used to exploit certain flaws to obtain elevated permissions relative to the current user. There are a vast number of methods out there to go from user to root on Linux, and keeping track of them all can be difficult. This is where automation comes into … Continue reading How to Use Linux Smart Enumeration to Discover Paths to Privesc
Master AWS with This Extensive $30 Training Bundle
Null Byte « WonderHowTo-- Cloud computing has come a long way since the days of simple online storage and server networking. Virtually every major company in the world now relies on complex cloud computing infrastructures to reach customers, innovate products, and streamline communications. Their reliance on advanced cloud computing platforms is only going to grow … Continue reading Master AWS with This Extensive $30 Training Bundle
How to keep K–12 distance learners cybersecure this school year
Malwarebytes Labs-- With the pandemic still in full swing, educational institutions across the US are kicking off the 2020–2021 school year in widely different ways, from re-opening classrooms to full-time distance learning. Sadly, as schools embracing virtual instruction struggle with compounding IT challenges on top of an already brittle infrastructure, they are nowhere near closing … Continue reading How to keep K–12 distance learners cybersecure this school year
Cisco Alerts About IOS XR Zero-Day Under Active Exploitation
Latest Hacking News-- Cisco has recently disclosed a zero-day IOS XR flaw that has caught the attention of criminals. While patches are in Cisco Alerts About IOS XR Zero-Day Under Active Exploitation on Latest Hacking News. View original article on Latest Hacking News
Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows
Latest Hacking News-- Microsoft recently warned of a new malware targeting Windows systems. Also dubbed Anubis, this Windows malware is not related to Microsoft Warns Of Another ‘Anubis’ Malware Targeting Windows on Latest Hacking News. View original article on Latest Hacking News
SS7 Attack Panel: Yet Another Rising SCAM on Social Media
InfoSec Write-ups - Medium-- Note: The primary aim of this article is not to pinpoint any individual SCAM, but to shed light on the methods adopted by Scammers/Attackers which peddles the Scam Business. Here, a Real-Life Use Case of SCAM is selected to provide detailed insight!SS7 (Signalling System #7) is an interesting field where newbies often … Continue reading SS7 Attack Panel: Yet Another Rising SCAM on Social Media
New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data
The Hacker News-- Cybercriminal groups are constantly evolving to find new ways to pilfer financial information, and the latest trick in their arsenal is to leverage the messaging app Telegram to their benefit. In what's the latest tactic adopted by Magecart groups, the encrypted messaging service is being used to send stolen payment details from … Continue reading New Web-Based Credit Card Stealer Uses Telegram Messenger to Exfiltrate Data
How a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 1/2)
InfoSec Write-ups - Medium-- IntroductionIn this write up we’ll see how we were able to combine direct sqlmap connection to a database with BMC/IPMI exploitation to compromise a big cloud-hosted client.Getting a footholdA couple of years ago, our team was tasked with performing an infrastructure pentest in an Openstack network. It was formed by about 2000 … Continue reading How a badly configured DB allowed us to own an entire cloud of over 25K hosts (part 1/2)
A Short Story of IDOR To Account Takeover
InfoSec Write-ups - Medium-- Hello Guys ! I am Jeya Seelan a Security Researcher and a Bug Hunter. This Is My First Bug Bounty Writeup. We are Going to See A Short Story of IDOR and How Could I Have Taken Over Your Account Through It.Before Getting into Details Let’s See What is An IDOR.What is an IDOR?IDOR Stands … Continue reading A Short Story of IDOR To Account Takeover






