❌

Normal view

Indecent Exposure: Your Secrets are ShowingΒ 

By: BHIS
9 January 2025 at 15:09

by moth Hard-coded cryptographic secrets? In my commercially purchased, closed-source software? It’s more likely than you think. Like, a lot more likely.Β  This blog post details a true story of […]

The post Indecent Exposure: Your Secrets are ShowingΒ  appeared first on Black Hills Information Security, Inc..

Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t

moth // IntroductionΒ  One fateful night in June of 2022, Ethan sent a message to the crew: β€œAnyone know ways to foolΒ AuditdΒ on Linux?Β I’mΒ trying to figure out how to change theΒ auidΒ (audit […]

The post Auditd Field Spoofing: Now You Auditd Me, Now You Auditdon’t appeared first on Black Hills Information Security, Inc..

Exploit Development – A Sincere Form of Flattery

moth // Recently, BHIS penetration tester Dale Hobbs was on an Internal Network Penetration Test and came across an RPC-based arbitrary command execution vulnerability in his vulnerability scan results.Β  I […]

The post Exploit Development – A Sincere Form of Flattery appeared first on Black Hills Information Security, Inc..

Now That’s What I Call ADHD! 4

moth & James Marrs // Introduction After a month of hard work, Python headaches, dependency hell, and a bit of tool necromancy, ADHD4 is here and we’re thrilled to share […]

The post Now That’s What I Call ADHD! 4 appeared first on Black Hills Information Security, Inc..

❌