EN
creator cover Overkill Security

Overkill Security

Nothing Says 'Secure' Like a Dozen Firewalls
Overkill Security
113
subscribers

About the creator

A blog about all things techy! Not too much hype, just a lot of cool analysis and insight from different sources.
📌Not sure what level is suitable for you? Check this explanation https://boosty.to/overkill_security/posts/4615ab87-6554-426e-bc24-b0b0b163716d
All places to read, listen and watch content:
➡️Text and other media: TGBoosty, Teletype.in, VK, X.com
➡️Audio: Mave, you find here other podcast services, e.g. Youtube Podcasts, Spotify, Apple or Amazon
➡️Video: Youtube
The main categories of materials - use tags:
📌news
📌digest
📌all pdf
QA - directly or via email overkill_qa@outlook.com
All posts
All time
news

The Never-Ending Fuzzing Time Nightmare

Jazzer is a coverage-guided, in-process fuzzer for the JVM platform developed by Code Intelligence. It is based on libFuzzer and brings many of its instrumentation-powered mutation features to the JVM. 
Key Features
📌Coverage-Guided Fuzzing: Uses instrumentation-powered mutation features to guide fuzzing.
Creator has disabled comments for this post.
Creator has disabled comments for this post.

The Dark Side of LSASS: How Evil Twins Bypass Security Measures

The EvilLsassTwin project on GitHub, found in the Nimperiments repository, focuses on a specific technique for extracting credentials from the Local Security Authority Subsystem Service (LSASS) process on Windows systems. 
📌Objective: The project aims to demonstrate a method for credential dumping from the LSASS process, which is a common target for attackers seeking to obtain sensitive information such as passwords and tokens.
Creator has disabled comments for this post.

CVE-2024-27130 in QNAP: When 'Secure' is Just a Marketing Term

The article "QNAP QTS - QNAPping At The Wheel (CVE-2024-27130 and friends)" from WatchTowr Labs provides a detailed analysis of several vulnerabilities found in QNAP NAS devices.
CVE-2024-27130. Stack Buffer Overflow in share.cgi: The vulnerability arises from the unsafe use of the strcpy function in the No_Support_ACL function, which is accessible via the get_file_size function in share.cgi. This leads to a stack buffer overflow, which can be exploited to achieve Remote Code Execution (RCE).
Creator has disabled comments for this post.

AMSI Bypass: The Malware's Express Lane

The GitHub repository "V-i-x-x/AMSI-BYPASS" provides information about a vulnerability known as "AMSI WRITE RAID" that can be exploited to bypass the Antimalware Scan Interface (AMSI). 
📌Vulnerability Description: The "AMSI WRITE RAID" vulnerability allows attackers to overwrite specific writable entries in the AMSI call stack, effectively bypassing AMSI's protections.
Creator has disabled comments for this post.

Subscription levels

Regular Reader

$ 19,1$ 9,6 per month
50%
Ideal for casual regular who are interested in staying informed about the latest trends and updates in the cybersecurity world

Pro Reader

$ 39 per month
Designed for IT professionals, cybersecurity experts, and enthusiasts who seek deeper insights and more comprehensive resources. + Q&A
Go up