Monday, April 10, 2017

Twitter Archive of April,10th ,2017

1) Tunnelled IPv6 Attacks Bypass Network Intrusion Detection Systems : https://ccdcoe.org/sites/default/files/multimedia/pdf/ip6eva_0.pdf (pdf)

2) Router Exploitation : https://www.blackhat.com/presentations/bh-usa-09/LINDNER/BHUSA09-Lindner-RouterExploit-SLIDES.pdf (Slides)

3) CAA checking becomes mandatory for SSL/TLS certificates : https://ma.ttias.be/caa-checking-becomes-mandatory-ssltls-certificates/ 




4) mambo : A Low-Overhead Dynamic Binary Modification Tool for ARM : https://github.com/beehive-lab/mambo , Slides : http://www.cs.man.ac.uk/~gorgovc9/slides_hipeac.pdf

5) CVE-2017-3881 Cisco Catalyst : https://artkond.com/2017/04/10/cisco-catalyst-remote-code-execution/ ,  RCE PoC : https://github.com/artkond/cisco-rce/



6) OWASP Mobile Security Testing Guide : https://b-mueller.gitbooks.io/owasp-mobile-security-testing-guide/content/

7)Malware Analysis Cheats And Tools list : https://gbhackers.com/malware-analysis-cheat-sheet-and-tools-list/

8)Tampering and Reverse Engineering on Android : https://github.com/OWASP/owasp-mstg/blob/master/Document/0x05c-Reverse-Engineering-and-Tampering.md

9) More Android Anti-Debugging Fun : http://www.vantagepoint.sg/blog/89-more-android-anti-debugging-fun

10) Using Ubuntu .DESKTOP as a Malware Vector : http://blog.mazinahmed.net/2017/04/using-ubuntu-desktop-as-malware-vector.html

11) A Tough call : Mitigating Advanced Code-Reuse Attacks At The Binary Level : http://syssec.rub.de/media/emma/veroeffentlichungen/2016/05/01/Tough-call-Oakland16.pdf (pdf) , Github : https://github.com/vusec/typearmor

12) whereami : Uses WiFi signals and machine learning to predict where you are. Even works for distances like 2-10 mt : https://github.com/kootenpv/whereami/blob/master/README.md

13) Automatically Inferring Malware Signatures for Anti-Virus Assisted Attacks : https://www.sec.cs.tu-bs.de/pubs/2017-asiaccs.pdf (pdf)

14) Wire messenger server code open-sourced : https://github.com/wireapp/wire-server

15) Unleashing use-before-initialization vulnerabilities in the Linux kernel : http://www.cc.gatech.edu/~klu38/publications/ubi-ndss17.pdf   (pdf)

16) Learn VIM while playing a game : https://vim-adventures.com/ 

No comments:

Post a Comment