Jailbreaking iOS without a Mac (1/4): The Plan

InfoSec Write-ups - Medium-- Installing an unsigned iOS app (what is the prerequisite of jailbreaking) using Linux with (semi-)legitimate tools.Consider the following situation: we have a factory-installed iOS device (iPhone 5S here) with a recent iOS version (12.4.8) and we want to jailbreak it. We have a Linux desktop (Arch Linux in the following guide), … Continue reading Jailbreaking iOS without a Mac (1/4): The Plan

LIVE Webinar on Zerologon Vulnerability: Technical Analysis and Detection

The Hacker News-- I am sure that many of you have by now heard of a recently disclosed critical Windows server vulnerability—called Zerologon—that could let hackers completely take over enterprise networks. For those unaware, in brief, all supported versions of the Windows Server operating systems are vulnerable to a critical privilege escalation bug that resides in … Continue reading LIVE Webinar on Zerologon Vulnerability: Technical Analysis and Detection

Caught in the payment fraud net: when, not if?

Malwarebytes Labs-- Sometimes, I think there are three certainties in life: death, taxes, and some form of payment fraud. Security reporter Danny Palmer experienced this a little while ago, and has spent a significant amount of time tracking the journey of his card details from the UK to Suriname. His deep-dive confirmed that it is … Continue reading Caught in the payment fraud net: when, not if?

Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries

KitPloit - PenTest Tools!-- Polypyus learns to locate functions in raw binaries by extracting known functions from similar binaries. Thus, it is a firmware historian. Polypyus works without disassembling these binaries, which is an advantage for binaries that are complex to disassemble and where common tools miss functions. In addition, the binary-only approach makes it … Continue reading Polypyus – Learns To Locate Functions In Raw Binaries By Extracting Known Functions From Similar Binaries

75: Compromised Comms

Darknet Diaries-- From 2009 to 2013 the communication channels the CIA uses to contact assets in foreign countries was compromised. This had terrifying consequences.Guests this episodes are Jenna McLaughlin and Zach Dorfman.SponsorsThis episode was sponsored by IT Pro TV. Get 65 hours of free training by visiting ITPro.tv/darknet. And use promo code DARKNET25.This episode was sponsored by Thinkst Canary. Their … Continue reading 75: Compromised Comms