Latest Hacking News-- Google has recently removed three different Android apps for kids for violating the data collection policy. The apps had millions Google Removed Three Kids Android Apps For Data Collection Violations on Latest Hacking News. View original article on Latest Hacking News
Decoder++ – An Extensible Application For Penetration Testers And Software Developers To Decode/Encode Data Into Various Formats
KitPloit - PenTest Tools!-- An extensible application for penetration testers and software developers to decode/encode data into various formats.Setup Decoder++ can be either installed by using pip or by pulling the source from this repository: # Install using pippip3 install decoder-plus-plus Overview This section provides you with an overview about the individual ways of interacting … Continue reading Decoder++ – An Extensible Application For Penetration Testers And Software Developers To Decode/Encode Data Into Various Formats
Google patches actively exploited zero-day bug that affects Chrome users
Malwarebytes Labs-- Google has recently released Chrome version 86.0.4240.111 to patch several holes. One is for a zero-day flaw – that means a vulnerability that is being actively exploited in the wild. The flaw, which is officially designated as CVE-2020-15999, occurs in the way FreeType handles PNG images embedded in fonts using the Load_SBit_Png function. … Continue reading Google patches actively exploited zero-day bug that affects Chrome users
Firefox Brings Site Isolation Feature For Testing In Nightly Builds
Latest Hacking News-- Mozilla Firefox now plans to roll out the much-awaited site isolation feature for user testing. Users can presently experience this Firefox Brings Site Isolation Feature For Testing In Nightly Builds on Latest Hacking News. View original article on Latest Hacking News
CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration
KitPloit - PenTest Tools!-- Scan files or process memory for Cobalt Strike beacons and parse their configuration. CobaltStrikeScan scans Windows process memory for evidence of DLL injection (classic or reflective injection) and performs a YARA scan on the target process' memory for Cobalt Strike v3 and v4 beacon signatures. Alternatively, CobaltStrikeScan can perform the same … Continue reading CobaltStrikeScan – Scan Files Or Process Memory For CobaltStrike Beacons And Parse Their Configuration
Secure network monitoring with elastic — Packetbeat + Suricata
InfoSec Write-ups - Medium-- Secure monitoring of networks using ELK stack, Packetbeat and SuricataContinue reading on InfoSec Write-ups » View original article on InfoSec Write-ups - Medium
Accidental Observation to Critical IDOR
InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR
Latest Google Chrome Update Addressed Actively Exploited Zero-Day
Latest Hacking News-- With the latest Chrome release, Google has addressed a serious zero-day vulnerability alongside other bugs. Update your browser at the Latest Google Chrome Update Addressed Actively Exploited Zero-Day on Latest Hacking News. View original article on Latest Hacking News
Accidental Observation to Critical IDOR
InfoSec Write-ups - Medium-- Insecure Direct Object Reference falls under the category for Broken Access Controls as per OWASP TOP 10 (2017 Edition). This issue usually occurs due to weak implementation of the application’s access control logics which links an identifier or an object to a particular asset say user_id parameter defines which user’s data … Continue reading Accidental Observation to Critical IDOR
Bypassing WAF to do Error-Based SQL Injection
InfoSec Write-ups - Medium-- Bypassing WAF to do advanced Error-Based SQL InjectionDuring penetration testing, I faced with a website which on this article I will name it as http://domain.comWhile browsing the website, I didn’t see any single Parameter, even though the website was built with PHP. I quit browsing and started to Google Dorking.Google Dorking to … Continue reading Bypassing WAF to do Error-Based SQL Injection





