❌

Reading view

Indecent Exposure: Your Secrets are ShowingΒ 

by moth Hard-coded cryptographic secrets? In my commercially purchased, closed-source software? It’s more likely than you think. Like, a lot more likely.Β  This blog post details a true story of […]

The post Indecent Exposure: Your Secrets are ShowingΒ  appeared first on Black Hills Information Security, Inc..

  •  

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

  •  

Exploit Development – A Sincere Form of Flattery

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results.Β  I […]

The post Exploit Development – A Sincere Form of Flattery appeared first on Black Hills Information Security, Inc..

  •  
❌