Blog | Page 7 of 9 | Ptrace Security GmbH

Blog

IT Security News Bulletin #9

IT Security News Bulletin #9

Latest Infosec News and Articles CVE-2020-8840 FasterXML/jackson-databind https://github.com/jas502n/CVE-2020-8840/ Building a bypass with MSBuild https://blog.talosintelligence.com/2020/02/building-bypass-with-msbuild.htmlCVE-2020-0618: RCE in SQL Server Reporting Services (SSRS) https://www.mdsec.co.uk/2020/02/cve-2020-0618-rce-in-sql-server-reporting-services-ssrs/ SSRF (Server Side Request Forgery) testing resources  https://github.com/cujanovic/SSRF-Testing Bash post exploitation

IT Security News Bulletin #8

IT Security News Bulletin #8

Latest Infosec News and Articles How to Bypass Anti-Virus to Run Mimikatz  https://www.blackhillsinfosec.com/bypass-anti-virus-run-mimikatz/Dejablue Vulnerabilities in Windows 7 to Windows 10 [CVE-2019-1181 and CVE-2019-1182] https://www.coresecurity.com/blog/dejablue-vulnerabilities-windows-7-windows-10-cve-2019-1181-and-cve-2019-1182Part 1: Heap Exploit Development  https://azeria-labs.com/heap-exploit-development-part-1/ CVE-2020-0683 Windows

IT Security News Bulletin #7

IT Security News Bulletin #7

Latest Infosec News and Articles Analysis of Apache ActiveMQ Remote Code Execution Vulnerability (CVE-2016–3088)  https://medium.com/@knownsec404team/analysis-of-apache-activemq-remote-code-execution-vulnerability-cve-2016-3088-575f80924f30 Windows 10 UAC bypass for all executable files which are autoelevate true  https://github.com/sailay1996/UAC_Bypass_In_The_Wild  Post-Exploitation-Cheat-Sheet  https://github.com/kmkz/Pentesting/blob/master/Post-Exploitation-Cheat-Sheet  Java JDBC(Deserialization) Anti-sequence

IT Security News Bulletin #6

IT Security News Bulletin #6

Latest Infosec News and Articles How a double-free bug in WhatsApp turns to RCE https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/ Waterbear is Back, Uses API Hooking to Evade Security Product Detection  https://blog.trendmicro.com/trendlabs-security-intelligence/waterbear-is-back-uses-api-hooking-to-evade-security-product-detection/Windows Event Log to the

>