Toss a Fault to Your Witcher: Applying Grey-box Coverage-Guided Mutational Fuzzing to Detect
SQL and Command Injection Vulnerabilities
https://pagabuc.me/docs/oakland23_witcher.pdf
SQL and Command Injection Vulnerabilities
https://pagabuc.me/docs/oakland23_witcher.pdf
Microsoft fixes driver blocklist placing users at risk from BYOVD attacks
https://www.malwarebytes.com/blog/news/2022/10/microsoft-fixes-driver-blocklist-placing-users-at-risk-from-byovd-attacks
https://www.malwarebytes.com/blog/news/2022/10/microsoft-fixes-driver-blocklist-placing-users-at-risk-from-byovd-attacks
Malwarebytes
Microsoft fixes driver blocklist placing users at risk from BYOVD attacks
There may be an all-new acronym for you to try and remember, as a result of Microsoft fixing a lingering issue. This...
FixReverter: A Realistic Bug Injection Methodology for Benchmarking Fuzz Testing
https://www.usenix.org/system/files/sec22-zhang-zenong.pdf
https://www.usenix.org/system/files/sec22-zhang-zenong.pdf
Concurrence: library for fuzzing multi-threaded targets
https://github.com/googleprojectzero/SockFuzzer/tree/main/third_party/concurrence
https://github.com/googleprojectzero/SockFuzzer/tree/main/third_party/concurrence
GitHub
SockFuzzer/third_party/concurrence at main · googleprojectzero/SockFuzzer
Contribute to googleprojectzero/SockFuzzer development by creating an account on GitHub.
TCP/IP Vulnerability CVE-2022–34718 PoC Restoration and Analysis
https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf
https://medium.com/@numencyberlabs/analysis-and-summary-of-tcp-ip-protocol-remote-code-execution-vulnerability-cve-2022-34718-8fcc28538acf
Medium
Analysis and Summary of TCP/IP Protocol Remote Code Execution Vulnerability CVE-2022–34718
An Analysis of Remote Code Execution Vulnerability CVE-2022–34718
RC4 Is Still Considered Harmful
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html?m=1
https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html?m=1
Blogspot
RC4 Is Still Considered Harmful
By James Forshaw, Project Zero I've been spending a lot of time researching Windows authentication implementations, specifically Kerberos...
Hyperpom: An Apple Silicon Fuzzer for 64-bit ARM Binaries
https://blog.impalabs.com/2211_hyperpom.html
https://blog.impalabs.com/2211_hyperpom.html
Impalabs
Hyperpom: An Apple Silicon Fuzzer for 64-bit ARM Binaries
Impalabs is releasing Hyperpom, a 64-bit ARM binary fuzzer written in Rust and based on the Apple Silicon's hypervisor. It is mutation-based and coverage-guided. This article gives an overview of its internals, presents the different components it consists…
Making Cobalt Strike harder for threat actors to abuse
https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
https://cloud.google.com/blog/products/identity-security/making-cobalt-strike-harder-for-threat-actors-to-abuse
Google Cloud Blog
Making Cobalt Strike harder for threat actors to abuse | Google Cloud Blog
A new initiative from Google Cloud and Cobalt Strike’s vendor has made it easier to find and block cracked versions of the popular red team software.
A Journey into Fuzzing WebAssembly Virtual Machine
https://youtu.be/fnprmz2IBm0
https://youtu.be/fnprmz2IBm0
YouTube
A Journey into Fuzzing WebAssembly Virtual Machine [BHUSA 2022]
📥 Slides: https://fuzzinglabs.com/wp-content/uploads/2022/08/BHUSA22_fuzzing_webassembly_vm_patrick_ventuzelo.pdf
Since the MVP release in 2017, WebAssembly evolve gradually, bringing new adepts and new VM implementations over time. It’s now possible to…
Since the MVP release in 2017, WebAssembly evolve gradually, bringing new adepts and new VM implementations over time. It’s now possible to…
[OpenAI ChatGPT] ChatGPT for programming, infosec, fuzzing and day to day use - Part1
https://youtu.be/PKOtDJIwCjM
https://youtu.be/PKOtDJIwCjM
YouTube
[OpenAI ChatGPT] Mind blowing ChatGPT examples for programming, infosec, fuzzing and day to day use
00:00 Introduction
00:42 Chat GPT overview
02:20 Writing a song for hackers
04:00 Getting a rental agreement and name change application from ChatGPT
05:55 Programming
08:00 Security related things fuzzing, identifying vulnerabilities, writing a fuzzer etc.…
00:42 Chat GPT overview
02:20 Writing a song for hackers
04:00 Getting a rental agreement and name change application from ChatGPT
05:55 Programming
08:00 Security related things fuzzing, identifying vulnerabilities, writing a fuzzer etc.…
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable
https://www.legitsecurity.com/blog/artifact-poisoning-vulnerability-discovered-in-rust
https://www.legitsecurity.com/blog/artifact-poisoning-vulnerability-discovered-in-rust
Legitsecurity
Novel Pipeline Vulnerability Discovered; Rust Found Vulnerable
New software supply chain vulnerabilities use artifact poisoning and attack the software development pipelines on projects using GitHub Actions.
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass
https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
https://the-deniss.github.io/posts/2022/12/08/hooking-system-calls-in-windows-11-22h2-like-avast-antivirus.html
the-deniss.github.io
Hooking System Calls in Windows 11 22H2 like Avast Antivirus. Research, analysis and bypass
In this post I’ll show Avast self-defense bypass: how I discovered a new undocumented way to intercept all system calls without a hypervisor and PatchGuard triggered BSOD, and, finally, based on the knowledge gained, implemented a bypass