Or Safran
@orsafr
MultiDump : Dumping and extracting LSASS memory discreetly without alerting Defender : xre0us.io/posts/multidum…
This is going to be fun for bypassing MFA Microsoft Teams stores auth tokens as cleartext in Windows, Linux, Macs bleepingcomputer.com/news/security/…
We broke commercial root detection in Android apps 🔓📲 We targeted sensitive apps - finance, security, government - which use commercial protections. We got them running on rooted devices. That gave us full control to modify app behavior however we wanted. 👇
Interesting and New: A large-scale measurement study on LiDAR spoofing attack capabilities targeting object detectors, using 9 popular #LiDAR systems, resulted in a total of 15 novel findings. "LiDAR Spoofing Meets the New-Gen" (2024) [PDF] ndss-symposium.org/wp-content/upl…
We created a worm for GenAI-powered applications. Here is the video that explains it. By: Stav Cohen, Ron Bitton, @ben_nassi #infosec #genai #llm #worm #security #infosec
Use silent #SMS messages to track LTE users’ locations An attacker sends silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location. All you need is just: SDR + SIM cards + LTESniffer software mandomat.github.io/2023-09-21-loc…
🚨 The big reveal of Evilginx Pro is finally OUT! 🚨 📔From this blog post you will learn what makes the Pro version different from the community one. 🎟️I explain how Evilpuppet secret token extraction works and showcase the core features. Enjoy! 🪝🐟 breakdev.org/evilginx-pro-r…
Nighthawk 0.2.6 - Three Wise Monkeys, details of our upcoming new release for Nighthawk. See no evil, hear no evil, speak no evil. mdsec.co.uk/2023/09/nighth…
New attack MO for #Android #Malware #Banker abusing #WebView to attack any #Bank with no special permission need 🤯 Amazing research by @ShaharTavor FYI @malwrhunterteam @mobilesecurity_ @AndroidPolice A View Into Web(View) Attacks in Android securityintelligence.com/posts/view-int…
🚨 New Findings: 🧵 1/6 Apple’s analytics data include an ID called “dsId”. We were able to verify that “dsId” is the “Directory Services Identifier”, an ID that uniquely identifies an iCloud account. Meaning, Apple’s analytics can personally identify you 👇
My only cybersecurity career goal is to learn how to spell “reconnaissance”
Surprise! #PEbear is Open Source now! github.com/hasherezade/pe… - please check it out and let me know what do you think!
חשיפה דיי מטורפת ( לדעתי) של אבא שלי. אמ,לק - במידה ואתם מחוברים לאינטרנט בסיב אופטי, יש סיכוי דיי טוב שאתם חולקים מידע פרטי שלכם עם השכנים. קצת רקע- כיום, בישראל, ישנן 2 טכנולגיות עיקריות בהן נעשה שימוש בשביל להביא סיבים לבתים פרטים - PTP ו-GPON.>>
As promised, I wrote about my Windows 11 post exploitation technique to go from an arbitrary write/increment to a full read/write through I/O rings: windows-internals.com/one-i-o-ring-t…
🔥 1/ In the last 6 months working on Linux kernel bug hunting/exploitation there has been a number of key resources which have been super useful (coming from a macOS/Windows background) to understand the state of things in 2022 🚀. Here's a short🧵 to recognise this + thoughts:
Allright, allow me to demonstrate how to make this happen. That is, per data type specific logic - triggered as needed when automatic following nested data structures - serializing to text, independent of it being kernel or usermode memory
Major step for responsible disclosure! Kudos @EdOverflow & the team behind it.
After 5 years of work, security.txt is officially an RFC. I am pleased to announce RFC 9116: rfc-editor.org/rfc/rfc9116. I would like to use this opportunity to thank those who made this possible. Thank you. ❤️