Technical Information Security Content & Discussion

8 readers
1 users here now

/r/netsec is a community-curated aggregator of technical information security content. Our mission is to extract signal from the noise — to...

founded 1 year ago
MODERATORS
1
 
 
The original post: /r/netsec by /u/khangaroooooooo on 2024-11-24 17:37:51.
2
 
 
The original post: /r/netsec by /u/smaury on 2024-11-24 00:37:09.
3
 
 
The original post: /r/netsec by /u/cryptogram on 2024-11-22 21:55:52.
4
 
 
The original post: /r/netsec by /u/andy-codes on 2024-11-22 20:59:10.

I've recently transitioned to infosec, a journey I documented through blog posts over time. Now, I've had the opportunity to collaborate with OffSec to write a summary of this transition, which is finally up on their website. In the article, I share my experience moving from software engineering to offensive security, discussing the challenges, the effort required for upskilling and certifications like OSCP, and the importance of community engagement. Despite obstacles, I successfully landed an offensive security role, and the experience has been incredibly rewarding.

5
 
 
The original post: /r/netsec by /u/andy-codes on 2024-11-22 20:37:06.

In the article, I discuss a prototype pollution vulnerability (CVE-2023-45282) found in NASA's Open MCT. This flaw in JavaScript allows attackers to alter object prototypes, potentially leading to serious outcomes like privilege escalation or remote code execution (RCE). I explain how the vulnerability occurs in the "Import from JSON" feature, which can crash the application or lead to more dangerous exploits. Fortunately, NASA responded quickly to fix the issue, but it highlights the importance of securing deep merge operations in JavaScript.

This security research was originally published at VisionSpace Blog (https://visionspace.com/prototype-pollution-in-nasas-open-mct-cve-2023-45282/).

6
 
 
The original post: /r/netsec by /u/Mempodipper on 2024-11-22 04:36:30.
7
 
 
The original post: /r/netsec by /u/crustysecurity on 2024-11-21 18:01:43.
8
 
 
The original post: /r/netsec by /u/tracebit on 2024-11-21 17:22:38.
9
 
 
The original post: /r/netsec by /u/pentest4life on 2024-11-21 12:19:05.
10
 
 
The original post: /r/netsec by /u/907jessejones on 2024-11-20 19:04:51.
11
 
 
The original post: /r/netsec by /u/phoenixzeu on 2024-11-20 14:11:24.

A research attempting to find forgotten secrets by scanning inside 15K public Azure Images that can be used to deploy Virtual Machines.

12
 
 
The original post: /r/netsec by /u/AlarmingApartment236 on 2024-11-20 13:38:40.
13
 
 
The original post: /r/netsec by /u/Significant_Fix_1741 on 2024-11-20 13:29:22.
14
 
 
The original post: /r/netsec by /u/vah_13 on 2024-11-20 09:29:29.
15
 
 
The original post: /r/netsec by /u/SL7reach on 2024-11-19 23:39:01.
16
 
 
The original post: /r/netsec by /u/AlmondOffSec on 2024-11-19 16:25:26.
17
 
 
The original post: /r/netsec by /u/0xdea on 2024-11-19 09:56:46.
18
 
 
The original post: /r/netsec by /u/dx7r__ on 2024-11-19 09:37:21.
19
 
 
The original post: /r/netsec by /u/hardenedvault on 2024-11-19 05:13:14.
20
 
 
The original post: /r/netsec by /u/Ancient_Title_1860 on 2024-11-18 18:52:40.
21
 
 
The original post: /r/netsec by /u/lutrasecurity on 2024-11-18 12:06:56.
22
 
 
The original post: /r/netsec by /u/albinowax on 2024-11-18 09:25:35.
23
 
 
The original post: /r/netsec by /u/albinowax on 2024-11-17 16:06:45.
24
 
 
The original post: /r/netsec by /u/Straight-Zombie-646 on 2024-11-17 10:50:05.
25
 
 
The original post: /r/netsec by /u/fysac2 on 2024-11-15 20:45:16.
view more: next ›