並び順

ブックマーク数

期間指定

  • から
  • まで

1 - 17 件 / 17件

新着順 人気順

smugglingの検索結果1 - 17 件 / 17件

  • 複数のSMTPプロトコル実装になりすましメールを送信される脆弱性「SMTP Smuggling」/深刻度は「MEDIUM」で「Postfix」、「Sendmail」、「Exim」に影響

      複数のSMTPプロトコル実装になりすましメールを送信される脆弱性「SMTP Smuggling」/深刻度は「MEDIUM」で「Postfix」、「Sendmail」、「Exim」に影響
    • SMTP Smuggling - Spoofing E-Mails Worldwide

      In the course of a research project in collaboration with the SEC Consult Vulnerability Lab, Timo Longin (@timolongin) - known for his DNS protocol attacks - discovered a novel exploitation technique for yet another Internet protocol - SMTP (Simple Mail Transfer Protocol). Threat actors could abuse vulnerable SMTP servers worldwide to send malicious e-mails from arbitrary e-mail addresses, allowin

        SMTP Smuggling - Spoofing E-Mails Worldwide
      • HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks | Microsoft Security Blog

        HTML smuggling, a highly evasive malware delivery technique that leverages legitimate HTML5 and JavaScript features, is increasingly used in email campaigns that deploy banking malware, remote access Trojans (RATs), and other payloads related to targeted attacks. Notably, this technique was observed in a spear-phishing campaign from the threat actor NOBELIUM in May. More recently, we have also see

          HTML smuggling surges: Highly evasive loader technique increasingly used in banking malware, targeted attacks | Microsoft Security Blog
        • Smuggling into BALCOLONY, the graphic studio behind "Your Name.", "Puella Magi Madoka Magica" and "Nisekoi"!

          Smuggling into BALCOLONY, the graphic studio behind "Your Name.", "Puella Magi Madoka Magica" and "Nisekoi"! #DESKWATCH is a project that shines the spotlight on creators of illustrations, manga, anime, videos, music… and their work environment. Discover how these gems of creativity are born, and what kind of tools professional creators use through photos and interviews! Today we had the chance to

            Smuggling into BALCOLONY, the graphic studio behind "Your Name.", "Puella Magi Madoka Magica" and "Nisekoi"!
          • HTTP Desync Attacks: Request Smuggling Reborn

            Published: 07 August 2019 at 21:00 UTC Updated: 07 September 2022 at 09:06 UTC AbstractHTTP requests are traditionally viewed as isolated, standalone entities. In this paper, I'll explore forgotten techniques for remote, unauthenticated attackers to smash through this isolation and splice their requests into others, through which I was able to play puppeteer with the web infrastructure of numerous

              HTTP Desync Attacks: Request Smuggling Reborn
            • HTTP Request Smuggling を理解する - Qiita

              Transfer-Encoding: chunked 送信するデータを、chunk(塊)毎に16進数でバイト数を記す。 最後に0のみからなる行と空行を示してレスポンスを返す。(改行はバイト数に含まれない) POSTパラメータの改行 以下のように改行してもパラメータxの値と見なされる。 これからは、下図のネットワーク構成をもとに話を進めていきます HTTP Request Smuggling(HRS)とは フロントエンドサーバとバックエンドサーバでリクエストの終端の解釈が異なる場合に発生する脆弱性 CL.TE vulnerabilities 例えば、フロントエンドがContent-Length(以下CL)のみに対応していて、バックエンドがTransfer-Encoding(以下TE)にのみ対応していた場合のリクエストの処理の流れを見ていく。 まず、CLに対応しているフロントエンドがConte

                HTTP Request Smuggling を理解する - Qiita
              • 武田圭史のセキュアーで行こう! > 【攻撃手法】HTTP REQUEST SMUGGLING : ITmedia オルタナティブ・ブログ

                このブログはアイティメディア株式会社のブログサイト「オルタナティブ・ブログ」で運営しています。 アイティメディア株式会社運営サイト ITmedia @IT Pickup オルタナブログ通信:補聴器から国産テルミン系まで――ブロガーが提案するiPhoneアプリの使い方NEW!(10/10) 170組を超えるオルタナティブ・ブロガーが参加する、ITmediaのビジネス・ブログメディア「オルタナティブ・ブログ」では、ITにまつわる時事ネタなどが日々、発信されている。今週はその中から、AndroidとiPhone、オラクル、Webサービス、著作権、金融危機などを紹介しよう。 オルタナブログ通信:iPhone、Eee PC、Windows Vista――【.99】はアメリカ的なメッセージ(10/3) ITmediaのビジネス・ブログメディア「オルタナティブ・ブログ」では、170組を超え

                • What is HTTP request smuggling? Tutorial & Examples | Web Security Academy

                  HTTP request smuggling In this section, we'll explain HTTP request smuggling attacks and describe how common request smuggling vulnerabilities can arise. Labs If you're already familiar with HTTP request smuggling and just want to practice on a series of deliberately vulnerable sites, check out the link below for an overview of all labs in this topic. View all HTTP request smuggling labs What is H

                    What is HTTP request smuggling? Tutorial & Examples | Web Security Academy
                  • SMTP Smuggling

                    [An updated version of this text may be found at https://www.postfix.org/smtp-smuggling.html] Author: Wietse Venema Last update: January 22, 2024 Summary Days before a 10+ day holiday break and associated production change freeze, SEC Consult has published an email spoofing attack that involves a composition of email services with specific differences in the way they handle line endings other than

                    • HTTP Request Smuggling

                      IBM Software systems and applications are designed to solve the most challenging needs of organizations large and small, across all industries, worldwide.

                        HTTP Request Smuggling
                      • Migrant Smuggling in Europe Is Now Worth ‘Billions’ (Published 2015)

                        BUDAPEST — With thousands of migrants pouring out of Afghanistan and the Middle East, the business of smuggling them across the Balkans into the European Union has grown even larger than the illicit trade in drugs and weapons, law enforcement officials said. In Greece alone, there are 200 such smuggling rings, said Col. Gerald Tatzgern, head of the Austrian police service fighting human traffickin

                          Migrant Smuggling in Europe Is Now Worth ‘Billions’ (Published 2015)
                        • HTTP Request Smuggling

                          Delivering software and services at the speed the market demands requires teams to iterate and experiment rapidly. They must deploy new versions frequently, driven by feedback and data. The most successful cloud development teams adopt modern DevSecOps culture and practices, embrace cloud-native architectures, and assemble toolchains from best-in-class tools to unleash their productivity.

                            HTTP Request Smuggling
                          • HTTP Request Smuggling を理解する - Qiita

                            Transfer-Encoding: chunked 送信するデータを、chunk(塊)毎に16進数でバイト数を記す。 最後に0のみからなる行と空行を示してレスポンスを返す。(改行はバイト数に含まれない) POSTパラメータの改行 以下のように改行してもパラメータxの値と見なされる。 これからは、下図のネットワーク構成をもとに話を進めていきます HTTP Request Smuggling(HRS)とは フロントエンドサーバとバックエンドサーバでリクエストの終端の解釈が異なる場合に発生する脆弱性 CL.TE vulnerabilities 例えば、フロントエンドがContent-Length(以下CL)のみに対応していて、バックエンドがTransfer-Encoding(以下TE)にのみ対応していた場合のリクエストの処理の流れを見ていく。 まず、CLに対応しているフロントエンドがConte

                              HTTP Request Smuggling を理解する - Qiita
                            • Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling

                              This request triggered an extremely suspicious intermittent 400 Bad Request response from various websites that were running AWS Application Load Balancer (ALB) as their front-end. Investigation revealed that ALB was mysteriously adding a 'Transfer-Encoding: chunked' header while downgrading the request to HTTP/1.1 for forwarding to the back-end, without making any alterations to the message body:

                                Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
                              • CVE-2018-17082に学ぶHTTP Request Smuggling(HRS)入門

                                PHPの脆弱性CVE-2018-17082は「XSS」として報告されていますが、実際にはHTTP Request Smuggling(HRS)として解釈するべきです。脆弱性の原因はContent-LengthとTransfer-Encodingの両方を含む場合、RFCの定義ではContent-Lengthを無視すべきところ、PHP側がRFC通りの実装になっていなかったことにあります。この動画では、Chunked EncodingとHRSの基礎的な説明を行います。 ------------ ■EG セキュアソリューションズ株式会社  https://www.eg-secure.co.jp/ ■お仕事の依頼はこちらから  https://www.eg-secure.co.jp/contact/ ------------

                                  CVE-2018-17082に学ぶHTTP Request Smuggling(HRS)入門
                                • Five Japanese nationals charged with smuggling nearly 1,000 shark fins in and out of Hawaii

                                  Island News: If It Matters To You, It Matters To Us

                                    Five Japanese nationals charged with smuggling nearly 1,000 shark fins in and out of Hawaii
                                  • Hamas orders closure of Gaza smuggling tunnels

                                    With Gaza under a tight economic blockade from Israel, hundreds of tunnels have been dug under the southern border with Egypt to smuggle in food, fuel, construction materials, cars and even live animals. Hamas has made money on the smuggling business, imposing taxes and importing goods itself. It is understood the closure is temporary and follows a security alert issued to all Israeli tourists in

                                      Hamas orders closure of Gaza smuggling tunnels
                                    1