Hacking of the bankrupt FTX exchange
Hacking of the bankrupt FTX exchange FTX recently declared itself bankrupt, and yesterday there was a hacking of the exchange.
The Great Encyclopedia of Anonymity
The Great Encyclopedia of Anonymity You will need a Tor Browser! The Hitchhiker's Guide is a service on the TOR network that is a very serious encyclopedia on anonymity, literally in all aspects, not only on the web. Such moments as: network operation (DNS, IP addresses and others), hardware identifiers, telemetry and OS, cryptocurrency transactions and a bunch of other sections are described in
All about privacy and anonymity.
All about privacy and anonymity. Installing and using secure tools is one way to quickly and easily increase your privacy. Today, I will share with you a link to a useful repository where you can find hundreds of tools.:
#news Last Friday, Riot Games reported a hack: attackers stole the sources of League of Legends
##news Last Friday, Riot Games reported a hack: attackers stole the sources of League of Legends, Team fight Tactics and Packman anti-cheat software. The day before yesterday, the company announced that it refused to pay $10 million in ransom. Well, now the stolen 72 gigs of sources have been put up for auction with a starting price of a million dollars.
Google's product, which is widely in demand among hackers from the point of view of exploitation
Google's product, which is widely in demand among hackers from the point of view of exploitation - Chrome, has received regular updates. Six security holes were fixed in Chrome 109, including four that were reported to Google by external researchers, for which they received $ 25,000.
And a new study from specialists from SpecterOps
And a new study from specialists from SpecterOps about read-only domain controllers (RODC) and pentest.
CVE-2023-24055 KeePass 2.5x
In short, having access to the KeePass configuration file, you can filter the stored passwords to your server in plain text.The trick is that you don't need to monitor when the user opens the manager.
BOF, to run in-memory PE files, not just DotNet assemblies.
BOF, to run in-memory PE files, not just DotNet assemblies.
That's cool! The research discusses new methods for recovering NTLM
That's cool! The research discusses new methods for recovering NTLM hashes from encrypted credentials protected by CredGuard in Windows.
This tool was presented at Source Zero Com 2022
This tool was presented at Source Zero Com 2022. In short: you throw a compiled binary, tulza removes known Ios strings from the binary, signs with a certificate from another binary, well, and helps to bypass EDR (by increasing the file size)
Quite an interesting analysis on the example of Avast
Quite an interesting analysis on the example of Avast
Next week, BlackHat Europe, and now new tulzas have already gone
Next week, BlackHat Europe, and now new tulzas have already gone (or rather, a coolly redesigned old ones).
Many channels have already published ProxyNotShell PoC
Many channels have already published ProxyNotShell PoC
Interesting
New articles
Discussing
Admin
in post
Premium - Access to all resources
0
24 November 2024 19:02