Blog | Ptrace Security GmbH

Blog

Weekly IT Security News Bulletin #37

Weekly IT Security News Bulletin #37

Latest Infosec News and Articles CVE-2020-5902 BIG-IP RCE  https://github.com/jas502n/CVE-2020-5902/ From SSRF to Compromise: Case Study https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/from-ssrf-to-compromise-case-study/ A Hands-On Introduction to Mandiant's Approach to OT Red Teaming https://www.fireeye.com/blog/threat-research/2020/08/hands-on-introduction-to-mandiant-approach-to-ot-red-teaming.htmlFrom Android Static Analysis to RCE

Weekly IT Security News Bulletin #36

Weekly IT Security News Bulletin #36

Latest Infosec News and Articles The FLARE team's open-source tool to identify capabilities in executable files.  https://github.com/fireeye/capa/  Shadow Admins – The Stealthy Accounts That You Should Fear The Most https://www.cyberark.com/resources/threat-research-blog/shadow-admins-the-stealthy-accounts-that-you-should-fear-the-most PowerShell Remoting

IT Security News Bulletin #34

IT Security News Bulletin #34

Latest Infosec News and Articles PowerShell: In-Memory Injection Using CertUtil.exe  https://movaxbx.ru/2018/06/01/powershell-in-memory-injection-using-certutil-exe/  Defending Your Malware https://labs.jumpsec.com/2020/08/11/defending-your-malware/ CVE-2020-1571 Windows Setup Elevation of Privileges Bypass 0day https://github.com/klinix5/Windows-Setup-EoPApache Tomcat RCE by deserialization (CVE-2020-9484) – write-up and

IT Security News Bulletin #29

IT Security News Bulletin #29

Latest Infosec News and Articles Reverse engineering of the Anubis malware  https://orangecyberdefense.com/uk/blog/uncategorized/reverse-engineering-of-the-anubis-malware/How x86_64 addresses memory https://blog.yossarian.net/2020/06/13/How-x86_64-addresses-memoryLeonidas - Automated Attack Simulation in the Cloud, complete with detection use cases https://github.com/fsecurelabs/leonidasUnderstanding how

IT Security News Bulletin #28

IT Security News Bulletin #28

Latest Infosec News and Articles Adventures in ATM Hacking  https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/adventures-in-atm-hacking/Breaking HTTPS in the IoT: Practical Attacks For Reverse Engineers  https://labs.bishopfox.com/tech-blog/breaking-https-in-the-iotDomain Penetration Testing: Using BloodHound, Crackmapexec, & Mimikatz to get Domain

>