Wireless Pentesting Part 3 – Common Wireless Attacks

In the previous article of this series, “Wireless Pentesting Part 2 – Building a WiFi Hacking Rig”, we discussed building a WiFi hacking rig. We covered the hardware, operating systems, and software requirements for setting up your own wireless pentest… Continue reading Wireless Pentesting Part 3 – Common Wireless Attacks

Salt Bugs Allow Full RCE as Root on Cloud Servers

Researchers say the bugs are easy to exploit and will likely be weaponized within a day. Continue reading Salt Bugs Allow Full RCE as Root on Cloud Servers

Does sudo ever de-escalate privilege while the program/command/service is running?

For Example

Is it safer to do:

$ sudo [cmd] [args] [enter user password]

or

$ su – [enter root password]
# [cmd] [args]

I always assumed they are the exact same thing, because sudo utilizes setuid-root, so the process that is … Continue reading Does sudo ever de-escalate privilege while the program/command/service is running?

Zoom for macOS Has a Couple of Dangerous Zero-Day Vulnerabilities

A couple of zero-day vulnerabilities found in the MacOS version of the Zoom video conferencing application could let attackers elevate their rights to root or to gain access to the microphone and camera. Just a couple of days ago, Zoom removed the Face… Continue reading Zoom for macOS Has a Couple of Dangerous Zero-Day Vulnerabilities