baakeydow
baakeydow.bsky.social
baakeydow
@baakeydow.bsky.social
Reposted by baakeydow
Hackers Abusing Teams Chat For Remote Session & To Drop Black Basta Malware
Hackers Abusing Teams Chat For Remote Session & To Drop Black Basta Malware
cybersecuritynews.com
January 16, 2025 at 10:35 AM
Reposted by baakeydow
New DDoS Malware “cShell” Exploit Linux Tools to Attack SSH Servers
New DDoS Malware "cShell" Exploit Linux Tools to Attack SSH Servers
Researchers have uncovered a new strain of DDoS malware, named cShell, targeting poorly managed Linux servers.
cybersecuritynews.com
December 17, 2024 at 8:23 PM
Reposted by baakeydow
HOT 🔥 fastest, most precise, and most capable hand control setup ever...

Less than $450 and fully open-source 🤯
by @huggingface, @therobotstudio, @NepYope

This tendon-driven technology will disrupt robotics! Retweet to accelerate its democratization 🚀

A thread 🧵
December 15, 2024 at 8:22 AM
Reposted by baakeydow
HTB Challenge Write-Up: Gunship
HTB Challenge Write-Up: Gunship
Code Review Gunship is a Node.js application with a single API endpoint. A quick inspection of the package.json file revealed that it uses the Pug template engine leading me to believe it’s a Server-Side Template Injection (SSTI) challenge. However, there’s no parameter that we can pass to the template to test for an SSTI vulnerability. Let’s investigate further. router.post('/api/submit', (req, res) => { const { artist } = unflatten(req.body); if (artist.name.includes('Haigh') || artist.name.includes('Westaway') || artist.name.includes('Gingell')) { return res.json({ 'response': pug.compile('span Hello #{user}, thank you for letting us know!')({ user: 'guest' }) }); } // Code omitted for brevity }); Running npm install and npm audit not only revealed that the Pug version (3.0.0) used by the application is vulnerable to Remote Code Execution (RCE) , but also showed that the application uses a version of the flat package (5.0.0) that is vulnerable to Prototype Pollution . Now that we have identified vulnerabilities that we can chain together, let’s test the application and trace the code execution. Local Testing Let’s install nodemon and use the VS Code Debugger to run the application in debug mode. Going back to the code, the artist names Haigh, Westaway, and Gingell must be used to reach the Pug code. While stepping into the pug.compile function, I noticed that Pug defaults its options variable to an empty object if not provided—a potential point for prototype pollution. Now, let’s test the payload mentioned in this GitHub issue . Using Burp Suite Repeater, I resent the request to /api/submit with this payload: https://medium.com/media/7bb241eb54061575525a0ec22944ee72/href Well, that didn’t work. While trying to trace the code execution within the packages, I came across the variable ast. It must be referring to the Abstract Syntax Tree , right? I just learned about this concept recently while searching for open-source forks of a specific archived library on GitHub. After searching for "pug AST RCE" , I discovered a Medium article discussing AST injection . It details how Pug is vulnerable to RCE through AST injection. Now let’s test this payload: https://medium.com/media/e5f42732ea2e3eadb7b557afada3364e/href That worked! Now that we have a functioning payload, it’s time to exploit the vulnerability. Exploitation First, let's launch the Hack The Box Challenge instance. While that is in progress, let’s check the potential file path for the flag by examining the Dockerfile and entrypoint.sh. It should be formatted like this: /app/flagCCCCC, where each 'C' represents a random alphanumeric character. Since the file path of the flag contains random characters, let’s use the cp command with a wildcard to copy the flag to a location we can access — the static folder. https://medium.com/media/0fb0a5f6ead07e90858fbd2dbfb464b5/href Now let’s view the flag using the curl command. We have successfully captured the flag! References https://security.snyk.io/package/npm/flat/5.0.0 https://www.npmjs.com/package/nodemon https://code.visualstudio.com/Docs/editor/debugging https://github.com/pugjs/pug/issues/3312 https://rayepeng.medium.com/how-ast-injection-and-prototype-pollution-ignite-threats-abb165164a68 HTB Challenge Write-Up: Gunship was originally published in InfoSec Write-ups on Medium, where people are continuing the conversation by highlighting and responding to this story.
infosecwriteups.com
December 14, 2024 at 7:17 PM
Reposted by baakeydow
Le maire a été reconnu coupable de détournement de fonds publics et est condamné à trois ans d'emprisonnement dont un an ferme. Sa femme complice a également été condamnée. Ils ont fait appel de la décision

@coryleguen.bsky.social
December 12, 2024 at 9:00 AM
Reposted by baakeydow
Firefox ditches Do Not Track because nobody was listening anyway
Mozilla removing Do Not Track option from Firefox 135
Few websites actually respect the option, says Mozilla
www.theregister.com
December 12, 2024 at 9:09 AM
Reposted by baakeydow
youtube.com
December 11, 2024 at 11:36 PM
Reposted by baakeydow
#letsconnect #buildinpublic

I'm looking to #connect with people who are interested in

- Software Engineering
- Frontend
- Backend
- Full-stack
- JavaScript/Typescript
- ReactJS/NextJS
- NodeJS
- UI/UX
- DevOps
December 9, 2024 at 5:00 PM
Reposted by baakeydow
🚀 I’ve launched the BlueSky Build in Public Pack! 🌟 If you’re building in public and want to be featured:

1️⃣ Share a link to one of your build-in-public posts in the comments.
2️⃣ Repost this to help others join in!

📦 Let’s inspire and connect builders together!

#buildinpublic

go.bsky.app/UqUvrjw
December 9, 2024 at 7:41 PM
Reposted by baakeydow
If you celebrate a tiny win and I see it, I'll celebrate with you! 🎉🎉🎉

Every bugfix, every waitlist subscriber, every round of polish to your landing page, and definitely every $1 is a cause for celebration.

Keep building!

#buildinpublic
December 9, 2024 at 11:34 PM
Reposted by baakeydow
Researchers Crack Microsoft Azure MFA in an Hour
Researchers Crack Microsoft Azure MFA in an Hour
www.darkreading.com
December 11, 2024 at 8:59 PM
Reposted by baakeydow
8Base ransomware group hacked Croatia’s Port of Rijeka
8Base ransomware group hacked Croatia's Port of Rijeka
The 8Base ransomware group attacked Croatia's Port of Rijeka, stealing sensitive data, including contracts and accounting info.
securityaffairs.com
December 7, 2024 at 8:17 PM
Reposted by baakeydow
Nebraska Man pleads guilty to $3.5 million cryptojacking scheme
Nebraska Man pleads guilty to $3.5 million cryptojacking scheme
​A Nebraska man pleaded guilty on Thursday to operating a large-scale cryptojacking operation after being arrested and charged in April.
www.bleepingcomputer.com
December 6, 2024 at 4:06 AM
Reposted by baakeydow
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
New QR Code-Based C2 Attack Lets Hackers Bypass All Type of Browser Isolation Security
Mandiant, a cybersecurity firm, has discovered a new way to get around browser isolation security technologies.
cybersecuritynews.com
December 6, 2024 at 6:36 AM
Reposted by baakeydow
Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges
Trojan-as-a-Service Hits Euro Banks, Crypto Exchanges
www.darkreading.com
December 5, 2024 at 9:11 PM
Reposted by baakeydow
Pegasus Spyware Infections Proliferate Across iOS, Android Devices
Pegasus Spyware Proliferates Across iOS, Android Devices
www.darkreading.com
December 4, 2024 at 8:10 PM
Reposted by baakeydow
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library
Researchers Uncover Backdoor in Solana's Popular Web3.js npm Library
thehackernews.com
December 4, 2024 at 10:15 AM
Reposted by baakeydow
Docker/Kubernetes (K8s)Penetration Testing Checklist
Docker/Kubernetes (K8s)Penetration Testing Checklist
Docker/Kubernetes (K8s) Penetration Testing involves identifying and assessing security vulnerabilities within containerized environments…
infosecwriteups.com
December 4, 2024 at 8:15 AM
Reposted by baakeydow
Japanese crypto service shuts down after theft of bitcoin worth $308 million
Japanese crypto service shuts down after theft of bitcoin worth $308 million
DMM Bitcoin said that it planned to transfer all customer accounts and company assets to the crypto firm SBI VC Trade after a hacking incident in May.
therecord.media
December 2, 2024 at 9:59 PM