jerry, to random

I have had several people that received the ban hammer recently grousing about how it goes against my air of “kindness” and the quote I have in my profile. I firmly believe in the importance of being kind to other people. But there are limits.

Do not confuse kindness with weakness, please.

hdm,

@jerry these actions are certainly kind to everyone else on the server, ban early, ban often (the old IRC channel motto due to it being a troll magnet)

AstraKernel, to rust

🪲 Shellcode evasion using WebAssembly and Rust

👉 Delivering metasploit stager payload using the WebAssembly to evade AV detection

https://balwurk.com/shellcode-evasion-using-webassembly-and-rust/

alexandreborges, to random

RCE exploit module for CVE-2024-0204 in Fortra GoAnywhere MFT:

https://github.com/rapid7/metasploit-framework/pull/18762

metasploit, to random

This week's release includes a new OwnCloud gather module, a Docker cgroups container escape, and an early feature that allows users to search module actions, targets, and aliases https://www.rapid7.com/blog/post/2023/12/08/metasploit-wrap-up-12-8-2023/

kariboka, to linux Portuguese

O que há no computador de uma criança?

Pra todos os crianços, crianças e criances do fediverso 😅

@linux

LeeArchinal, to Cybersecurity

I hope everyone is having a good weekend!

The Palo Alto Networks Unit 42 research team discovered some activity that they attributed to a very stealthy and rarely seen APT, . They target a diverse group of industries but use tools like , , and but also used the Potato Suite that was seen as JuicyPotato.exe (who can't appreciate that?!). This was a great weekend read and I hope you all enjoy it as much as I did! Happy Hunting!

Rare Backdoors Suspected to be Tied to Gelsemium APT Found in Targeted Attack in Southeast Asian Government
https://unit42.paloaltonetworks.com/rare-possible-gelsemium-attack-targets-se-asia/

noiq, to android

running a msfconsole. Reverse shell created with msfvenom on my . Payload running on hak5 lan turtle aka device

LeeArchinal, to Powershell

Good day everyone! The Microsoft Threat Intelligence team has discovered activity from a group known as . They are a nation-state group from China that targeted organizations in Taiwan. While the group leverages tools that are commonly used, like , , and , they also rely on abusing , or Living-off-the-land binaries and scripts (tools that exist and come with the native operating system). Some of their TTPs include using registry key modification for persistence, using , , or to download tools, and accessing process memory and Security Account Manager registry hive for credential access. This is a great article that not only provides high-level details but it provides a starting point for any organization to start threat hunting by using the technical details provided! Enjoy your weekend and !

catc0n, to security

Ahoy ahoy, @zeroSteiner is hiring a for Rapid7's R+D team. Wanna write , hack some features, and work with the community to get great open-source contributions over the line? Check it here — the team is open to a variety of locations as long as we can hire there! https://careers.rapid7.com/jobs/security-researcher-austin-tx-united-states-ff21c929-e174-4f8d-a726-3d5e10708ae6

postmodern, to random

Grumble. Somehow https://rubygems.org/ got flagged by the Google Safe Browsing List. Yet https://nmpjs.com is somehow perfectly fine, despite constantly hosting typo-squated malware packages.
https://transparencyreport.google.com/safe-browsing/search?url=https:%2F%2Frubygems.org%2F&hl=en-US

postmodern,

Oh wow, I wasn't too far off! Some clown flagged the metasploit-payloads gem (which has been available on rubygems.org for ages without issue) and got all of https://rubygems.org flagged by the Google Safe Browsing List!
https://ruby.social/@indirect@fiasco.social/110351998871595312

Granted the metasploit-payloads gem has far more exotic payloads which might trigger code scanners, but payloads are useless without an exploit. Absolutely no reason why payloads should be flagged as malicious.

  • All
  • Subscribed
  • Moderated
  • Favorites
  • JUstTest
  • Leos
  • InstantRegret
  • osvaldo12
  • magazineikmin
  • tacticalgear
  • rosin
  • everett
  • Youngstown
  • khanakhh
  • slotface
  • ngwrru68w68
  • kavyap
  • DreamBathrooms
  • normalnudes
  • thenastyranch
  • mdbf
  • GTA5RPClips
  • cubers
  • cisconetworking
  • Durango
  • tester
  • provamag3
  • ethstaker
  • modclub
  • anitta
  • megavids
  • lostlight
  • All magazines