Bypassing pfSense firewall and hacking into application server and firewall itself

Recent cybersecurity research has unveiled a critical vulnerability impacting over 1,450 pfSense servers, exposing them to potential remote code execution (RCE) attacks. This vulnerability arises from a combination of command injection and cross-site scripting flaws, posing a significant threat to the security of these widely-used network appliances. Anyone can bypass the Google and AWS Web […]

How to create undetectable malware via ChatGPT in 7 easy steps bypassing its restrictions

There is evidence that ChatGPT has helped low-skill hackers generate malware, which raises worries about the technology being abused by cybercriminals. ChatGPT cannot yet replace expert threat actors, but security researchers claim there is evidence that it can assist low-skill hackers create malware. Since the introduction of ChatGPT in November, the OpenAI chatbot has assisted […]

NAPLISTENER: New Malware in REF2924 Group’s Arsenal for Bypassing Detection

The threat group tracked as REF2924 has been observed deploying previously unseen malware in its attacks aimed at entities in South and Southeast Asia. The malware, dubbed NAPLISTENER by Elastic Security Labs, is an HTTP listener programmed in C# and is designed to evade “network-based forms of detection.” REF2924 is the moniker assigned to an […]

New JSON-Based SQL Injection attacks allow bypassing Palo Alto, F5, AWS, Cloudflare, and Imperva WAF

Web application firewalls, also known as WAFs, are intended to protect web-based applications and application programming interfaces (APIs) from malicious HTTPS traffic coming from the outside, particularly cross-site scripting and SQL injection attacks, which never seem to fall off the security radar. SQL injection in particular is a constant among the output of automated code […]

3 Techniques that allow bypassing phishing emails through Cisco Secure Email Gateway and are being actively used by ransomware gangs

The following techniques have been made public by a researcher who wishes to remain anonymous. They can be used to bypass certain of Cisco’s Secure Email Gateway appliance’s filters and spread malware using carefully written emails. The researcher acknowledged communicating with the vendor, but said they were unable to get a suitable answer in a timely […]

Researchers discover technique that allows bypassing Let’s Encrypt domain validation and allows fake SSL certificates

Researcher Haya Shulman of the Fraunhofer Institute for Secure Information Technology in Germany reported the discovery of a critical vulnerability in Let’s Encrypt that would allow threat actors to evade security measures on this service and obtain digital certificates with ease.  The flaw lies in the mechanism used by Let’s Encrypt for web domain ownership […]

Bypassing WAF in Azure, Cloudflare Access via H2C smuggling attack

A group of specialists has detailed a method for abusing a well-known “H2C smuggling” technique in order to authenticate and bypass some WAF mechanisms on multiple cloud platforms. Early stages of the attack include WAF routing and omissions in Microsoft Azure, as well as an authentication bypass in Cloudflare Access. Bishop Fox developers mention that […]

8 methods for bypassing surveillance cameras and facial recognition software

Facial recognition systems are becoming more sophisticated. When we post a photo on Facebook accompanied by our closest friend, it is almost certain that the system will identify our faces and suggest us to add a tag.  According to ethical hacking specialists, governments around the world and private companies are driving the creation of a […]

Malicious Apps from Google PlayStore Bypassing SMS-Based Two-Factor Authentication and Steal OTPs in SMS

Researchers discovered new malicious Android apps from Google Play Store bypassing SMS-based two-factor authentication (2FA) mechanisms and steal the OTP without SMS’s permission. Google recently restrict other apps to use of high risk or sensitive permissions, including the SMS or Call Log in March 2019 that leads malware and credentials stealing apps lost its permissions. Newly uncovered malicious apps […]

Phishing attacks capable of bypassing multi-factor authentication increase

Gmail, from Google, is one of the main services that use this login method Network security and ethical hacking specialists from the International Institute of Cyber security ensure that malicious actors have been developing their methods to deploy phishing campaigns to the point where they are able to bypass multi factor authentication. “There has been a significant increase […]

Bypassing BIOS Passwords

There might be a time where you picked up an old laptop and had a bios password lock enabled but no clue to reset it. Here we have listed 3 methods on bypassing your BIOS password. Method 1: Reset via CMOS battery Open the backside of your laptop or side panel of your PC. Locate […]

Malicious hackers and their interest in bypassing CAPTCHA

Hackers are looking for ways to bypass this security measure The topic is being discussed in multiple hacking forums hosted on deep and dark web. Threat actors have shown special interest in developing projects to bypass the implementation of the Completely Automated Public Turing Test to tell Computers and Humans Apart, most commonly known as CAPTCHA, […]

CloudFlair: Bypassing Cloudflare using Internet-wide scan data

Cloudflare is a service that acts as a middleman between a website and its end users, protecting it from various attacks. Unfortunately, those websites are often poorly configured, allowing an attacker to entirely bypass Cloudflare and run DDoS attacks or exploit web-based vulnerabilities that would otherwise be blocked. This post demonstrates the weakness and introduces CloudFlair, […]

SpookFlare – Meterpreter Loader Generator With Multiple Features For Bypassing Client-Side And Network-Side Countermeasures

SpookFlare has a different perspective to bypass security measures and it gives you the opportunity to bypass the endpoint countermeasures at the client-side detection and network-side detection. SpookFlare is a loader generator for Meterpreter Reverse HTTP and HTTPS stages. SpookFlare has custom encrypter with string obfuscation and run-time code compilation features so you can bypass […]

RedSails – Bypassing host based security monitoring and logging

A post-exploitation tool capable of maintaining persistence on a compromised machine, subverting many common host event logs (both network and account logon) and generating false logs / network traffic. Based on [PyDivert] (https://github.com/ffalcinelli/pydivert), a Python binding for WinDivert, a Windows driver that allows user-mode applications to capture/modify/drop network packets sent to/from the Windows network stack. Built […]

Bypassing AMSI via COM Server Hijacking

Microsoft’s Antimalware Scan Interface (AMSI) was introduced in Windows 10 as a standard interface that provides the ability for AV engines to apply signatures to buffers both in memory and on disk. This gives AV products the ability to “hook” right before script interpretation, meaning that any obfuscation or encryption has gone through their respective […]

Bypassing Application Whitelisting with BGInfo

BGinfo.exe older than version 4.22 can be used to bypass application whitelisting using vbscript inside a bgi file. This can run directly from a webdav server.   My main inspiration for finding this bypass technique comes from Matt Graeber (@mattifestation) and Casey Smith (@subtee). A big thanks to Matt and Casey for their inspiration and […]

Bypassing Amsi using PowerShell 5 DLL Hijacking

While doing some research on the inner workings of Microsofts new Antimalware Scan Interface technology within Windows 10, i found a DLL loading vulnerabilty within PowerShell 5. The reason i did some research is because some offensive PowerShell scripts i use within my own Red Teaming tool called p0wnedShell are getting blocked by Windows Defender […]

Bypassing LastPass’s Security? A phishing Attack Would Serve Just Right

LastPass Password Manager – renowned for being a secure vault for user’s passwords, has recently demonstrated vulnerabilities that could expose many users’ accounts. A phishing technique can easily and literally do the trick: a little more than a combination between software flaws and social engineering. Security researcher Sean Cassidy, who developed the phishing attack, claims […]