KRIe :To Detect Linux Kernel Runtime Integrity Exploits With eBPF

KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a bulletproof strategy: from eBPF related limitations to post exploitation detections that might rely on a compromised kernel to emit security events, it is clear that a motivated attacker will eventually be able to bypass it. […]

February 19, 2023
Read More >>

Hack The Box: RainyDay Machine Walkthrough – Hard Difficulty

7 minutes In this post, I would like to share a walkthrough of the RainyDay Machine from Hack the Box This room will be considered a Hard machine on Hack the Box What will you gain from the RainyDay machine? For the user flag, you will need to enumerate with the IDOR vulnerability which will leak hashes. After […]

The post Hack The Box: RainyDay Machine Walkthrough – Hard Difficulty appeared first on Threatninja.net.

February 19, 2023
Read More >>

Tai-e : A New Efficient Static Analysis Framework For Java

Tai-e (Chinese: 太阿; pronunciation: [ˈtaɪə:]) is a new static analysis framework for Java (please see our technical report for details), which features arguably the “best” designs from both the novel ones we proposed and those of classic frameworks such as Soot, WALA, Doop, and SpotBugs. Tai-e is easy-to-learn, easy-to-use, efficient, and highly extensible, allowing you […]

February 17, 2023
Read More >>

Readline crime: exploiting a SUID logic bug

By roddux // Rory M I discovered a logic bug in the readline dependency partially reveals file information when parsing the file specified in the INPUTRC environment variable. This could allow attackers to move laterally on a box where sshd is running, a given user is able to login, and the user’s private key is […]

February 16, 2023
Read More >>

APTRS : Automated Penetration Testing Reporting System

APTRS (Automated Penetration Testing Reporting System) is an automated reporting tool in Python and Django. The tool allows Penetration testers to create a report directly without using the Traditional Docx file. It also provides an approach to keeping track of the projects and vulnerabilities. Read Documentation here. Prerequisites Installation The tool has been tested using […]

February 16, 2023
Read More >>

Hack The Box: Photobomb Machine Walkthrough – Easy Difficulty

In this post, I would like to share a walkthrough of the Photobomb Machine from Hack the Box This room will be considered an Easy machine on Hack the Box What will you gain from the PhotoBomb machine? For the user flag, you will need to find credentials which saved inside a JavaScript file. It will […]

The post Hack The Box: Photobomb Machine Walkthrough – Easy Difficulty appeared first on Threatninja.net.

February 12, 2023
Read More >>