Aggregator
Beware of the Shadowbunny! at BSides Singapore
Excited to announce that I will be presenting at BSides Singapore this year.
The topic is adversarial usage of virtual machines during lateral movement. And we will also cover threat hunting and detection ideas.
I have been referring to this technique as the Shadowbunny over the years. :)
The conferences is on September 24th-25th, it will be all virtual and free to attend. Check out the BSidesSG 2020 website and schedule for other talks and details.
Jackson反序列化漏洞
Jackson反序列化漏洞
Jackson反序列化漏洞
Jackson反序列化漏洞
Jackson反序列化漏洞
How Credential Stuffing Bots Bypass Defenses
How Credential Stuffing Bots Bypass Defenses
MySQL蜜罐获取攻击者微信ID
MySQL蜜罐获取攻击者微信ID
MySQL蜜罐获取攻击者微信ID
深信服 EDR RCE 简析
Becoming a Comms and Analyst Relations Leader, Rita Aspen - Head, Communications & Analyst Relations, APJ
手把手带你搭建钓鱼Wi-Fi热点[1]
手把手带你搭建钓鱼Wi-Fi热点[1]
手把手带你搭建钓鱼Wi-Fi热点[1]
Race conditions when applying ACLs
Today I’m gonna talk about a class of application security issues I ran across a few times over the years. In particular, let’s discuss race conditions when it comes to files with sensitive content and permissions.
Race conditions can allow an adversary to gain access to sensitive information on machines. Assume a system creates a file that contains sensitive information and afterwards applies permissions to lockdown that file.
Understanding the race conditionLet’s look at a practical example seen in the wild a few times. Imagine code like this: