You are here |
3.70.187.24 | ||
| | | |
blog.nuculabs.de
|
|
| | | | Hello and welcome to Nucu Labs agent! We've been contracted by some external contractors to help them break..., I mean, assist them in making their life easier with their "competition". We obtained their competition's software from a poorly configured AWS server. Their competition, X, uses the software in order to setup a private communication channel to their servers, the software is simple, it fires up a server, listens on a port and waits for the right password, when the right password is entered, the server remembers the client and stops asking for passwords, simple. | |
| | | |
blog.flanker017.me
|
|
| | | | Recently as KASLR is slowly adopted into Android and because of the requirements of exploitation stability of previous bugs, kernel infoleak bugs are becoming more and more important. Here I want t... | |
| | | |
michaelneuper.com
|
|
| | | | A buffer overflow attack is a type of cyber attack in which an attacker attempts to write more data to a buffer (a temporary data storage area) in a computer's memory than the buffer is designed to hold. This can cause the buffer to overflow, or exceed its maximum capacity, which can corrupt other parts of the computer's memory and allow the attacker to gain unauthorized access to the system. | |
| | | |
www.nozominetworks.com
|
|
| | Nozomi Networks Labs uncovered 15 zero-day vulnerabilities affecting the Bosch Rexroth ctrlX CORE, which could have exposed industrial environments to risks. |