Bing, Chrome, and Docker API – Hack Naked News #195

A one-liner exploit for X, the danger of searching for Chrome in Bing, exposing your Docker API, you can find sensitive data in the cloud, exploit users by embedded videos in Word documents, dead web apps, hacking BGP routes, a new DHCP vulnerability a… Continue reading Bing, Chrome, and Docker API – Hack Naked News #195

VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

Automatic DNS registration and autodiscovery functionality provides an opportunity for the misconfiguration of networks,resulting in a loss of confidentiality and integrity of the network if an attacker on the network adds a specially configured proxy device. Continue reading VU#598349: Automatic DNS registration and proxy autodiscovery allow spoofing of network services

Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card

Reverse engineering the Toshiba FlashAir SD storage card allowed a researcher to execute remote code – and could’ve allowed him to add other malicious or practical features. Continue reading Hacking For Sport: A Journey in Reverse Engineering a Toshiba Wireless SD Card

Would it be possible for a malicious user to change the LAN IP address of an uncompromised device

Basically I have a local network and an IPCam (with its own storage) in it. Due to some practical limitations, I cannot use technologies such as AP isolation or VLAN to isolate low-integrity and high-integrity devices.

There… Continue reading Would it be possible for a malicious user to change the LAN IP address of an uncompromised device