Skip to content

pengusec/awesome-netsec-articles

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

1 Commit
 
 

Repository files navigation

Awesome Netsec Articles Awesome

This repository is a curated list of cool netsec articles from the last couple of years. PRs are welcome.

Contents

Categories

Analysis

Smominru Botnet

Undert the Hoddie 2019

China Chopper Still Active 9 Years Later

State of Industrial Control Systems in Switzerland and Poland

CNAME Cloaking 3rd Party Trackers

Android

Analyzing the Bird App

Causing a Crash with Instagram Ghost Users

Command Injection with USB Peripherals

Modern Android Password Managers and FLAG_SECURE Misuse

AWS

Abusing VPC Traffic Mirroring in AWS

Gaining Persistency on Vulnerable Lambdas

The Technical Side of the Capital One AWS Security Breach

Escalating AWS IAM Privileges with an Undocumented CodeStar API

EC2 Security Strategy

Privilege Escalation in AWS

Azure

Subdomain Takeover: Azure Services

Azure Privilege Escalation via Cloud Shell

Blue Team

Getting 2FA Right in 2019

If You're Not Using SSH Certificates

Kubernetes Pod Escape Using Log Mounts

Container Platform Security at Cruise

Kubernetes Pod Security Best Practices

DNS Spoofing on Kubernetes Clusters

How to SSH Properly

Code Review

MiniUPnP Security Issues

Reverse RDP Attack: Code Execution on Clients

Wordpress 5 RCE

Unauthenticated RCE in YouPHPTube

XML: XXE to RCE in XML Plugins

RCE in Sophos Cyberoam

Bitbucket Path Traversal to RCE

Exploting SMBGhost

Cracking

hookers.nl Breach

Ashley Madison Breach

Crypto

Seriously, Stop Using RSA

Cryptographic Attacks: A Guide for the Perplexed

IBM Selectric Bug

Crypto in Zoom Meetings

Breaking PHP's mt_rand() With Two Values

Embedded

Firmware Dumping ARM Cortex-M0 SoC

Spanish Smart Meters

Writing Shellcode for Windows x64

Network-Based Cache Attacks

Vulnerabilities in Contactless Payments

Exploiting the WiFi Stack on the Tesla Model S

CacheOut Attack

Exploitation

Whatsapp GIF RCE

House of Corrosion

Trinity: PSP Emulator Escape

Exploiting A Palo Alto Firewall Device

Fully Undetectable PE File Backdoor

Basic ROP Techniques and Tricks

Technical analysis of the checkm8 exploit

Bluekeep Exploit in the Wild

Analyzing Android's CVE-2019-2215

Google Cloud

4 Google Cloud Shell Bugs

Privilege Escalation and Post Exploitation in GCP

IoT

RCE on Alecto Camera

The Not-so-ultra Lock

An Analysis of Arlo

Journey Over Unsecured IoT Devices with Kamerka

Say Cheese: Ransomwaring a DSLR Camera

Reverse Engineering of a Not-so-secure IoT Device

Light Based Audio Commands

Blink Camera Command Injection Flaws

Linux

dirty_sock Privilege Escalation

Netpen

RDP Honeypotting

Operation Soft Cell

Pillaging the Jenkins Treasure Chest

Abusing Slack's TURN Servers to Gain Access to Internal Services

Trickbot to Ryuk in 2 Hours

Red Team

Phishing Techniques

Bypassing Authentication on SSH Bastions

Revisiting Email Spoofing

Trick for Executing Unsigned Binaries

Internal Domain Name Collision

Phishing and Bypassing 2FA

I was 7 Words Away from Being Phished

Phishing Users wiht MFA on AWS

Nuget/Squirrel Uncontrolled Endpoints

Evading Sysmon DNS Monitoring

Red Teamer's Guide to Pulse Secure SSL VPN

Stealthier Persistence Using Services Vulnerable to Path Interception

Building a Basic Physical Red Team Skill Set

Public SSH Keys can Leak Private Infrastructure

DNS for Red Team Purposes

Reverse

19 Year Old Code Execution in Winrar

MikroTik RouterOS Bug Hunting

RouterOS: Chain to Root

Bypassing McAfee with McAfee

Reversing HackEx*

COModo: From Sandbox to SYSTEM

Reversing an Oppo ozip Encryption key from Encrypted Firmware

Select code_execution FROM * USING SQLite

Rooting RouterOS with a USB Drive

Using LIEF and Katai Against an Encrypted Protocol

Analyzing Whatsapp Calls

Web

Facebook CSRF Bypass

Deanonymization via Clickjacking

Stealing Private Keys from a Secure File Sharing Service

Compromising Lastpass Users Using Reverse Proxies

SQLi to LFI to RCE

GOTCHA: Why X-FRAME-OPTIONS Matter on API Endpoints

H2 SQLi to RCE

Hacking Voi Scooters

Abusing PHP Query String for Bypassing Purposes

Zoom Zero Day

How I Could Have Hacked Any Instagram Account

MITM on Slack

Wordpress Privilege Escalation

Creative Attack Chain to Compromise a Web Application

A Cryptocurrency Heist

Webmin 0day RCE Using Command Injection

NVIDIA GeForce Experience OS Command Injection

1 Click RCE with Skype Web Plugin and Qt Apps

A Questionable Journey from XSS to RCE

JWT (in)Security

Github OAuth Bypass

Pi-Hole RCE

Abusing Webapp Filesystem Function to Steal NTLMv2

Facebook OAuth Vulnerability

OK Google, Bypass the Authentication

The Bug that Exposed Your Paypal Password

Account Takeover Via HTTP Request Smuggling

Wireless

PMKID Clientless Attack

PWNAGOTCHI

How to Break into a Jeep

WIBAttack

How to Create an Evil LTE Twin

The SIM Swapping Bible

HTTP Request Smuggling + IDOR

Reusing Cookies

Windows

Windows Error Reporting Manager Privilege Escalation

OEM Software Puts Multiple Laptops at Risk

More Than a Penetration Test

Local Privilege Escalation on Dell Machines

Kernel Write-What-Where in Qualcomm Driver

Steam Windows Client Local Privilege Escalation 0day

Reverse RDP Attack: The Hyper-V Connection

One More Steam Windows Client Local Privilege Escalation 0day

Trend Micro Local Privilege Escalation

Another Trend Micro Privilege Escalation

Elevation to SYSTEM via the UPnP Host Service

From iPhone to System

From Dropbox Updater to System

Avast Hardlinks to System

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published