🔰Upcoming Events:
CTF InterIUT 2020 (1176)
Jeopardy
Fri, November 27, 2020 18:00 UTC+00:00
Weight: 0 points
Duration: 2 days
HITCON CTF 2020 (1136)
Jeopardy
Sat, November 28, 2020 02:00 UTC+00:00
Weight: 98 points
Duration: 1 day and 12 hours
SPbCTF's Student CTF 2020 Finals (1189)
Attack-Defense
Sun, November 29, 2020 09:00 UTC+00:00
Weight: 0 points
Duration: 9 hours
Shakti CTF (1141)
Jeopardy
Fri, December 04, 2020 12:30 UTC+00:00
Weight: 0 points
Duration: 1 day
2020 December Metasploit community CTF (1200)
Attack-Defense
Fri, December 04, 2020 15:00 UTC+00:00
Weight: 0 points
Duration: 3 days and 6 hours
Share and support us @hacklido
CTF InterIUT 2020 (1176)
Jeopardy
Fri, November 27, 2020 18:00 UTC+00:00
Weight: 0 points
Duration: 2 days
HITCON CTF 2020 (1136)
Jeopardy
Sat, November 28, 2020 02:00 UTC+00:00
Weight: 98 points
Duration: 1 day and 12 hours
SPbCTF's Student CTF 2020 Finals (1189)
Attack-Defense
Sun, November 29, 2020 09:00 UTC+00:00
Weight: 0 points
Duration: 9 hours
Shakti CTF (1141)
Jeopardy
Fri, December 04, 2020 12:30 UTC+00:00
Weight: 0 points
Duration: 1 day
2020 December Metasploit community CTF (1200)
Attack-Defense
Fri, December 04, 2020 15:00 UTC+00:00
Weight: 0 points
Duration: 3 days and 6 hours
Share and support us @hacklido
ctftime.org
CTF InterIUT 2020
A beginner/medium CTF made by students from Hack2g2. The fourth edition made online for this year because COVID.
W...
W...
Stephane Nappo@hacklido.png
93.1 KB
🔰1920*1080 #cybersecurity #wallpaper !
“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
― Stephane Nappo
Share and support us ❤️ @hacklido
“If you think you know-it-all about cybersecurity, this discipline was probably ill-explained to you.”
― Stephane Nappo
Share and support us ❤️ @hacklido
CTF Open Issue_FINAL @hacklido.pdf
20.6 MB
🔰 #pentestmag open issue #CTF
gathered 5 articles which present case studies from various CTF competitions, a report from Collegiate Penetration Testing Competition (CPTC) written by one of its organizers, an article on the growing meaning of these events in the cybersecurity landscape and how it differs from certification and traditional education learning methods, and last but not least - a piece on the prospect of using CTF concepts as the perfect training for children and teenagers, presented on the case of Bolivia.
Share and support us ❤️ @hacklido
gathered 5 articles which present case studies from various CTF competitions, a report from Collegiate Penetration Testing Competition (CPTC) written by one of its organizers, an article on the growing meaning of these events in the cybersecurity landscape and how it differs from certification and traditional education learning methods, and last but not least - a piece on the prospect of using CTF concepts as the perfect training for children and teenagers, presented on the case of Bolivia.
Share and support us ❤️ @hacklido
🔰A Short Story of Vertical #Privilege_Escalation (Admin #Account_Takeover) @hacklido
Check: https://t.co/kFTUrNCWP3
Check: https://t.co/kFTUrNCWP3
Medium
A Short Story of Vertical Privilege Escalation (Admin Account Takeover)
Hello Guys, Hope all of you are doing well. I am Amiya Behera, an Information Security Analyst in a private organization . also a…
Advanced persistent threat @hacklido.pdf
4.2 MB
🔰 #pentestmag open issue #APT
Advanced Persistent Threats. Professor John Walker starts with presenting the interdependence of APTs and Advanced Evasion Techniques (AET). In the article he tries to answer the question why Persistent Threats and Evasions will not see any decline any time soon. Mariana Peycheva, in turn, presents the analysis of Advanced Persistent Threats and its methodology, giving a great overview the topic. As one of our reviewers said: “I wish that most of business leaders and managers would read this”.
Share and support us ❤️ @hacklido
Advanced Persistent Threats. Professor John Walker starts with presenting the interdependence of APTs and Advanced Evasion Techniques (AET). In the article he tries to answer the question why Persistent Threats and Evasions will not see any decline any time soon. Mariana Peycheva, in turn, presents the analysis of Advanced Persistent Threats and its methodology, giving a great overview the topic. As one of our reviewers said: “I wish that most of business leaders and managers would read this”.
Share and support us ❤️ @hacklido
This media is not supported in your browser
VIEW IN TELEGRAM
⚡️The cyber security community to share knowledge, experiences, ideas, guidance and collaborate with other cyber security enthusiasts⚡️
🔰DISCORD Discord.gg/k8njp9ryE3
🔰TWITTER Twitter.com/hacklido
🔰INSTAGRAM Instagram.com/hacklido
🔰TELEGRAM T.me/hacklido
🔰REDDIT Reddit.com/u/hacklido
🔰DISCORD Discord.gg/k8njp9ryE3
🔰TWITTER Twitter.com/hacklido
🔰INSTAGRAM Instagram.com/hacklido
🔰TELEGRAM T.me/hacklido
🔰REDDIT Reddit.com/u/hacklido
🔰 #Exploit_Development : DVD X Player 5.5 Pro Local #Buffer_Overflow (SEH)
https://0xannlynn.medium.com/exploit-development-dvd-x-player-5-5-pro-local-buffer-overflow-seh-87049e6ce1
https://0xannlynn.medium.com/exploit-development-dvd-x-player-5-5-pro-local-buffer-overflow-seh-87049e6ce1
Medium
Exploit Development : DVD X Player 5.5 Pro Local Buffer Overflow (SEH)
A quick whoami : my name is Ajay i am a student in field of Electronices and communication engineering in Tamil nadu, India and i am not a…
mr.robot everyday @hacklido.png
671.3 KB
🔰1920*1080 #cybersecurity #wallpaper !
Every day, we change the world, but to change the world in a way that means anything, that takes more time than most people have. It never happens all at once. It’s slow. It’s methodical. It’s exhausting.
-Elliot Alderson
Share and support us ❤️ @hacklido
Every day, we change the world, but to change the world in a way that means anything, that takes more time than most people have. It never happens all at once. It’s slow. It’s methodical. It’s exhausting.
-Elliot Alderson
Share and support us ❤️ @hacklido
🔰 #Exploit #CVE-2020-13886:
#LFI Intelbras IP terminal TIP 200/200 LITE ( #PoC )
https://github.com/lucxssouza/CVE-2020-13886
#LFI Intelbras IP terminal TIP 200/200 LITE ( #PoC )
https://github.com/lucxssouza/CVE-2020-13886
GitHub
GitHub - Ls4ss/CVE-2020-13886: Exploit CVE-2020-13886 - LFI Intelbras TIP 200 / 200 LITE /
Exploit CVE-2020-13886 - LFI Intelbras TIP 200 / 200 LITE / - GitHub - Ls4ss/CVE-2020-13886: Exploit CVE-2020-13886 - LFI Intelbras TIP 200 / 200 LITE /
🔰 Automated Security Risk Identification Using AutomationML-based Engineering Data. #blueteam
This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results of the risk identification process can be used to generate cyber-physical attack graphs, which model multistage cyber attacks that potentially lead to physical damage.
https://github.com/sbaresearch/amlsec
This prototype identifies security risk sources (i.e., threats and vulnerabilities) and types of attack consequences based on AutomationML (AML) artifacts. The results of the risk identification process can be used to generate cyber-physical attack graphs, which model multistage cyber attacks that potentially lead to physical damage.
https://github.com/sbaresearch/amlsec
GitHub
GitHub - sbaresearch/amlsec: Automated Security Risk Identification Using AutomationML-based Engineering Data
Automated Security Risk Identification Using AutomationML-based Engineering Data - GitHub - sbaresearch/amlsec: Automated Security Risk Identification Using AutomationML-based Engineering Data
🔰 #Red_Team Tactics:
🔴Weaponizing #XSS
https://saadahmedx.medium.com/weaponizing-xss-for-fun-profit-a1414f3fcee9
🔴Smuggling an (Un)exploitable #XSS
https://www.rcesecurity.com/2020/11/Smuggling-an-un-exploitable-xss/
🔴Weaponizing #XSS
https://saadahmedx.medium.com/weaponizing-xss-for-fun-profit-a1414f3fcee9
🔴Smuggling an (Un)exploitable #XSS
https://www.rcesecurity.com/2020/11/Smuggling-an-un-exploitable-xss/
🔰 Free training on developing #Burp_Suite extensions @hacklido
https://github.com/doyensec/burpdeveltraining
https://github.com/doyensec/burpdeveltraining
GitHub
GitHub - doyensec/burpdeveltraining: Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security…
Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation" - doyensec/burpdeveltraining
🔰 #Google Patches Two More Chrome #Zero-Days Exploited in Attacks @hacklido
https://www.securityweek.com/google-patches-two-more-chrome-zero-days-exploited-attacks
https://www.securityweek.com/google-patches-two-more-chrome-zero-days-exploited-attacks
SecurityWeek
Google Patches Two More Chrome Zero-Days Exploited in Attacks
Google has released another update for Chrome 86 to patch two more zero-day vulnerabilities that have been exploited in the wild.