петък, 25 октомври 2019 г.

An Illustrated Guide to OAuth and OpenID Connect ↳...

An Illustrated Guide to OAuth and OpenID Connect

https://developer.okta.com/blog/2019/10/21/illustrated-guide-to-oauth-and-oidc

In the “stone age” days of the Internet, sharing information between services was easy. You simply gave your username and password for one service to another so they could login to your account and grab whatever information they wanted!…



from Hack+ https://ift.tt/2JmGuvj
via IFTTT

четвъртък, 24 октомври 2019 г.

Technical analysis of the checkm8 exploit ↳ https://ift.tt/2pLSKOY Most...

Technical analysis of the checkm8 exploit

https://habr.com/en/company/dsec/blog/472762/

Most likely you’ve already heard about the famous exploit checkm8, which uses an unfixable vulnerability in the BootROM of most iDevices, including iPhone X. In this article, we’ll provide a technical analysis of this exploit and figure out what causes the vulnerability….



from Hack+ https://ift.tt/31LfgER
via IFTTT

↳...

https://i.blackhat.com/us-18/Wed-August-8/us-18-Orange-Tsai-Breaking-Parser-Logic-Take-Your-Path-Normalization-Off-And-Pop-0days-Out-2.pdf



from Hack+ https://ift.tt/32NJWXe
via IFTTT

Cache Poisoned Denial of Service ↳ https://cpdos.org/ Prof. Dr. Luigi Lo Iacono Accountability for...

Cache Poisoned Denial of Service

https://cpdos.org/

Prof. Dr. Luigi Lo Iacono Accountability for content The contents of our pages have been created with the utmost care. However, we cannot guarantee the contents’ accuracy, completeness or topicality….



from Hack+ https://ift.tt/2MImDsg
via IFTTT

RhinoSecurityLabs/AWS-IAM-Privilege-Escalation ↳...

RhinoSecurityLabs/AWS-IAM-Privilege-Escalation

https://github.com/RhinoSecurityLabs/AWS-IAM-Privilege-Escalation

An attacker with the iam:CreatePolicyVersion permission can create a new version of an IAM policy that they have access to. This allows them to define their own custom permissions….



from Hack+ https://ift.tt/2Jh1Yti
via IFTTT

сряда, 23 октомври 2019 г.

Login at Jailbreak Central ↳...

Login at Jailbreak Central

https://jailbreak.fce365.info/Thread-How-to-Decrypt-iOS-iBoot-iBEC-iBSS-Ramdisk-etc-on-iOS-13-iOS-12-With-CheckM8

In this post, I am going to show you how to decrypt the iOS Boot Chain components such as iBEC, iBSS, iBoot, the Restore Ramdisk and so on by derivating their keys using the CheckM8 SecureROM (BootROM) exploit. We’re going to do this for iOS 13….



from Hack+ https://ift.tt/2oY6beG
via IFTTT

събота, 12 октомври 2019 г.

Please, Don’t Hack Me ↳ https://ift.tt/315nV4J Please, Don’t Hack Me...

Please, Don’t Hack Me

https://please.dont-hack.me/books/hacking/

Please, Don’t Hack Me .. Invent With Python Violent Python 100 Internet Security Tips That John Would Never Follow.pdf 10gen Top 5 NoSQL Considerations.pdf 128 Technology Rethinking The Network 06.14.16.pdf 2 Digital Marketing Glossary.pdf 20 Python Libraries You Aren’T Using But Should….



from Hack+ https://ift.tt/2B85DoI
via IFTTT

RPISEC/MBE ↳ https://ift.tt/1LfKJDp This repository contains the materials as developed and...

RPISEC/MBE

https://github.com/RPISEC/MBE

This repository contains the materials as developed and used by RPISEC to teach Modern Binary Exploitation at Rensselaer Polytechnic Institute in Spring 2015….



from Hack+ https://ift.tt/2IJnFSA
via IFTTT

вторник, 1 октомври 2019 г.

Tethered jailbreaks are back ↳...

Tethered jailbreaks are back

https://blog.trailofbits.com/2019/09/27/tethered-jailbreaks-are-back/

Earlier today, a new iPhone Boot ROM exploit, checkm8 (or Apollo or Moonshine), was published on GitHub by axi0mX, affecting the iPhone 4S through the iPhone X. The vulnerability was patched in devices with A12 and A13 CPUs….



from Hack+ https://ift.tt/2oQOJYV
via IFTTT