PoC Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/poc/ GBhackers Offering Exclusive Cyber Security News Coverage, New Research papers & Technology Updates. Fri, 06 Sep 2024 04:11:06 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://gbhackers.com/wp-content/uploads/2024/09/cropped-gbh-32x32.png PoC Archives - GBHackers Security | #1 Globally Trusted Cyber Security News Platform https://gbhackers.com/category/poc/ 32 32 PoC Exploit Released for QNAP QTS zero-day RCE Flaw https://gbhackers.com/poc-exploit-released-2/ https://gbhackers.com/poc-exploit-released-2/#respond Tue, 21 May 2024 06:43:14 +0000 https://gbhackers.com/?p=90428 Researchers have shown a proof-of-concept (PoC) attack for a zero-day remote code execution (RCE) flaw in the QTS operating system from QNAP. Users of QNAP’s Network-Attached Storage (NAS) devices, which are common in both small and big business settings, are in grave danger because of this flaw, which has been named CVE-2024-27130. Network-attached storage (NAS) […]

The post PoC Exploit Released for QNAP QTS zero-day RCE Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post PoC Exploit Released for QNAP QTS zero-day RCE Flaw appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/poc-exploit-released-2/feed/ 0
PoC Exploit Published for 0-day Vulnerability in Google Chrome https://gbhackers.com/poc-exploit-published-0-day/ https://gbhackers.com/poc-exploit-published-0-day/#respond Mon, 20 May 2024 10:21:31 +0000 https://gbhackers.com/?p=90336 A proof-of-concept (PoC) exploit for a critical zero-day vulnerability (CVE-2024-4947) in Google Chrome has been made public. The potential for exploitation of this vulnerability, which impacts the V8 JavaScript engine, has generated considerable apprehension among members of the cybersecurity community. Details of CVE-2024-4947 The CVE-2024-4947 vulnerability arises from erroneous AccessInfo values assigned to module namespace […]

The post PoC Exploit Published for 0-day Vulnerability in Google Chrome appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post PoC Exploit Published for 0-day Vulnerability in Google Chrome appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/poc-exploit-published-0-day/feed/ 0
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation https://gbhackers.com/soc-indicator/ https://gbhackers.com/soc-indicator/#comments Sun, 04 Jun 2023 07:41:00 +0000 https://gbhackers.com/?p=2685 What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. The use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers are disrupted and blocked before they achieve their goal such as data thief, ransomware, […]

The post Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/soc-indicator/feed/ 2
Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers https://gbhackers.com/android-ecosystem/ https://gbhackers.com/android-ecosystem/#respond Mon, 16 Apr 2018 06:03:34 +0000 https://gbhackers.com/?p=17958 The Android operating system is one of the most widely used platforms with 2 billion active users at the same time it facing a lot of security issues that need frequent fixes and release the patch for the users is one of the main processes in Android Ecosystem. Android Phones are receiving monthly security patches […]

The post Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Android Ecosystem Contains Several Hidden Patch Gaps that Can be Exploited by Hackers appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/android-ecosystem/feed/ 0
Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and OLE https://gbhackers.com/hackers-can-steal-password-hash/ https://gbhackers.com/hackers-can-steal-password-hash/#respond Sat, 14 Apr 2018 10:27:56 +0000 https://gbhackers.com/?p=17885 The researcher discovered a flaw that combined with Microsoft Outlook and OLE which leads to steal the Password hash and eventually crash the windows system. OLE (Object Linking and Embedding) is a component document technology created by Microsoft that helps to dynamically link files and applications together. Microsoft Outlook is an email client that comes […]

The post Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and OLE appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers Can Steal Password Hashes & Crash Windows systems Automatically with Microsoft Outlook and OLE appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/hackers-can-steal-password-hash/feed/ 0
Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC https://gbhackers.com/bittorrent-transmission-client-flaw/ https://gbhackers.com/bittorrent-transmission-client-flaw/#respond Tue, 16 Jan 2018 13:13:01 +0000 https://gbhackers.com/?p=15198 A critical flaw discovered in BitTorrent Transmission client app that allows an attacker can remotely control the victims PC by using a method called DNS Rebinding which leads to Transmission control can remotely access by an attacker via a malicious website. This bug was discovered by Google Researcher Tavis Ormandy and it serving under google […]

The post Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Critical Flaw in Popular BitTorrent Transmission Client Leads to an Attacker Perform Remote Hack into Your PC appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/bittorrent-transmission-client-flaw/feed/ 0
Risk with Steganography and Importance of running Steganalysis with Network Systems https://gbhackers.com/risk-with-steganography-and-importance-of-running-steganalysis-with-network-systems/ https://gbhackers.com/risk-with-steganography-and-importance-of-running-steganalysis-with-network-systems/#respond Sat, 30 Dec 2017 16:20:08 +0000 https://gbhackers.com/?p=3776 Steganography is an art of hiding messages covert way so that exclusive the sender and recipient know the original message. This technique permits sender and receiver to communicate secretly and the third party won’t mindful of the correspondence happen. It replaces bits of unused information into the standard files—graphic, sound, text,video—with some different bits that […]

The post Risk with Steganography and Importance of running Steganalysis with Network Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Risk with Steganography and Importance of running Steganalysis with Network Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/risk-with-steganography-and-importance-of-running-steganalysis-with-network-systems/feed/ 0
Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept https://gbhackers.com/using-n1n3-to-simulate-an-evasive-fileless-malware-proof-of-concept/ https://gbhackers.com/using-n1n3-to-simulate-an-evasive-fileless-malware-proof-of-concept/#comments Thu, 14 Dec 2017 08:08:18 +0000 https://gbhackers.com/?p=2969 Fileless malware are types of malicious code used in cyber attacks that don’t use files to launch the attack and carry on the infection on the affected device or network. The infection is run in the RAM memory of the device, so traditional antivirus and antimalware solutions can’t detect it at all. Malicious hackers use […]

The post Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Using n1n3 to Simulate an Evasive Fileless Malware – Proof Of Concept appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/using-n1n3-to-simulate-an-evasive-fileless-malware-proof-of-concept/feed/ 2
Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware https://gbhackers.com/surveillance-cameras-infrared-light/ https://gbhackers.com/surveillance-cameras-infrared-light/#respond Wed, 20 Sep 2017 18:56:47 +0000 https://gbhackers.com/?p=11223 Organizations use to protect their internal networks from Internet attacks by using firewalls, intrusion detection systems(IDSs) and intrusion prevention systems (IPSs). For a higher degree of protection, so-called ‘air-gap‘ isolation is used. Once the malware deployed attackers try to establish communication over the covert channel to bypass IPS, IDS, and Firewalls. Over the years various […]

The post Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Hackers can use Surveillance Cameras and Infrared Light to Transfer Signals to Malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/surveillance-cameras-infrared-light/feed/ 0
Critical Vulnerability with OnePlus devices allows Remote Exploitation https://gbhackers.com/critical-vulnerability-with-oneplus-devices-allows-remote-exploitation/ https://gbhackers.com/critical-vulnerability-with-oneplus-devices-allows-remote-exploitation/#respond Fri, 12 May 2017 05:12:56 +0000 https://gbhackers.com/?p=8494 [jpshare]Security specialists from Alephsecurity found new insignificant vulnerabilities (CVE-2017-5948, CVE-2017-8850, CVE-2017-8851, CVE-2016-10370) on OnePlus One/X/2/3/3T OxygenOS and HydrogenOS. They vulnerabilities influence with the most recent versions (4.1.3/3.0) and beneath. This vulnerability reported to OnePlus Security on January 26/2017, by Roee Hay from Aleph Research. OnePlus group neglected to meet the standard 90-day divulgence due date […]

The post Critical Vulnerability with OnePlus devices allows Remote Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

The post Critical Vulnerability with OnePlus devices allows Remote Exploitation appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.

]]>
https://gbhackers.com/critical-vulnerability-with-oneplus-devices-allows-remote-exploitation/feed/ 0