Best super technical sources and inputs [very advanced level]?

I read a lot of times on this sub that sources like medium or other blogs like dev are not very good source in the sense that they are for beginners or middle level software engineer (at most).

What are best source for very advanced level? My field is System Programming and I’m curious to know what are your sources, I’m interested in generic sources and not single article or vertical on one field (for example not kernel.org)

submitted by /u/allmudi
[link] [comments]

Any Key Croc (Hak5) alternatives?

Im searching for some USBA to USBA keylogger just like the Key Croc, but the Key Croc is very expensive and has a lot of features that Ill never need. Like the O2 support, pentesting or any kind of scripting functionality. TLDR: Searching for a simple …

US CISA adds MS Exchange bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog

US CISA added Microsoft Exchange elevation of privileges bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog. The first issue, tracked as CVE-2022-41080, is a Microsoft Exchange server privilege escalation vulnerability. The issue can be chained with CVE-2022-41082 (ProxyNotShell) to […]

The post US CISA adds MS Exchange bug CVE-2022-41080 to its Known Exploited Vulnerabilities Catalog appeared first on Security Affairs.

Sniffing network traffic of IoT device.

First want to say very new to this kind of thing so please explain like I have no idea what anything means. I’m trying to sniff the network traffic of an IoT device. I don’t know if it uses HTTP or HTTPS. I know if it uses HTTPS I’m pretty much out of luck. Would this tutorial work? https://www.youtube.com/watch?v=Hl0IpoS503A The device connects straight to the the wifi and doesn’t pass traffic through a phone. I ask if this tutorial is good as right now my built in network adapter doesn’t support monitor mode and I need to get one so can’t test in the mean time. The device in question is https://www.thehandy.com/ [NSFW ish link]

submitted by /u/JoeBozo3651
[link] [comments]

Microsoft Patch Tuesday for January 2023 fixed actively exploited zero-day

Microsoft Patch Tuesday security updates for January 2023 fixed 97 flaws and an actively exploited zero-day. Microsoft Patch Tuesday security updates for January 2023 addressed a total of 98 vulnerabilities in Microsoft Windows and Windows Components; Office and Office Components; .NET Core and Visual Studio Code, 3D Builder, Azure Service Fabric Container, Windows BitLocker, Windows […]

The post Microsoft Patch Tuesday for January 2023 fixed actively exploited zero-day appeared first on Security Affairs.

I am new to this but this involves a cell phone

I have an IP address for the user. I traced the IP address to another state, but I guess it pinged the phone in Chicago. I know Chicago is the location that I am looking for, can I get a more direct address, and how would I do this? submitted by…

How to know if a .pdf contains malware?

I read somewhere that .pdf files can contain javascript file that run when opened. There is a very good computer science book I wanted to read about computer architecture, but of course it’s $40 and I don’t have that money at the moment. So logically I search for a free PDF version, but remember that fact, I am now scared to open it. Is there anyway to detect if the file contains malware, and then remove it if so.

submitted by /u/Apprehensive-Oil713
[link] [comments]