Every week, our twitter account @PentesterLab publishes a list of articles worth-reading. This is the list of all the articles for 2019. Enjoy!!
ποΈ https://medium.com/@terjanq/clobbering-the-clobbered-vol-2-fb199ad7ec41
ποΈ https://unit42.paloaltonetworks.com/what-i-learned-from-reverse-engineering-windows-containers/
ποΈ https://eng.getwisdom.io/hacking-github-with-unicode-dotless-i/
ποΈ https://offensi.com/2019/12/16/4-google-cloud-shell-bugs-explained-introduction/
ποΈ https://hipotermia.pw/bb/http-desync-idor
ποΈ https://www.reddit.com/r/crypto/comments/e8t17w/comment/faerj2m
ποΈ https://know.bishopfox.com/research/cve-2019-18935-remote-code-execution-in-telerik-ui
ποΈ https://diverto.github.io/2019/11/18/Cracking-LUKS-passphrases
ποΈ https://github.com/bkimminich/juice-shop/issues/1173#
ποΈ https://css.csail.mit.edu/6.858/2013/readings/plan9auth.pdf
ποΈ https://github.com/netanel01/ctf-writeups/blob/master/googlectf/2019/pwn_gomium/README.md
ποΈ https://www.noob.ninja/2019/12/spilling-local-files-via-xxe-when-http.html?m=1
ποΈ http://blog.infosectcbr.com.au/2019/11/uclibc-unlink-heap-exploitation.html
ποΈ https://blog.teddykatz.com/2019/11/23/json-padding-oracles.html
ποΈ https://know.bishopfox.com/research/reasonably-secure-electron
ποΈ https://tpm.fail/tpmfail.pdf
ποΈ https://serializethoughts.com/2019/10/28/solving-mstg-crackme-angr
ποΈ https://blog.infosectcbr.com.au/2019/11/avr-libc-house-of-spirit.html
ποΈ https://blog.teddykatz.com/2019/11/05/github-oauth-bypass.html
ποΈ https://nathandavison.com/blog/abusing-http-hop-by-hop-request-headers
ποΈ http://re.alisa.sh/notes/iBoot-address-space.html
ποΈ https://research.securitum.com/prototype-pollution-rce-kibana-cve-2019-7609/
ποΈ https://lab.wallarm.com/race-condition-in-web-applications/
ποΈ https://buer.haus/2019/10/18/a-tale-of-exploitation-in-spreadsheet-file-conversions/
ποΈ https://tagazok.virtualabs.fr/Workshop-How_to_use_btlejack.pdf
ποΈ https://cpdos.org
ποΈ https://www.shielder.it/blog/dont-open-that-xml-xxe-to-rce-in-xml-plugins-for-vs-code-eclipse-theia/
ποΈ https://srcincite.io/assets/postscript-pat-and-his-black-and-white-hat.pdf
ποΈ https://hacks.mozilla.org/2019/10/firefoxs-new-websocket-inspector/
ποΈ https://blog.paloaltonetworks.com/2019/10/cloud-kubernetes-vulnerabilities/
ποΈ https://medium.com/sensorfu/how-my-application-ran-away-and-called-home-from-redmond-de7af081100d
ποΈ https://blog.redteam.pl/2019/10/internal-domain-name-collision-dns.html?m=1
ποΈ https://awakened1712.github.io/hacking/hacking-whatsapp-gif-rce/
ποΈ https://5alt.me/2019/10/HackMD%20Stored%20XSS%20and%20HackMD%20Desktop%20RCE/
ποΈ https://googleprojectzero.blogspot.com/2019/09/windows-exploitation-tricks-spoofing.html?m=1
ποΈ https://portswigger.net/research/one-xss-cheatsheet-to-rule-them-all
ποΈ https://vavkamil.cz/2019/09/15/how-to-bypass-android-certificate-pinning-and-intercept-ssl-traffic/
ποΈ https://research.securitum.com/server-side-template-injection-on-the-example-of-pebble/
ποΈ https://shhnjk.blogspot.com/2019/09/nonce-based-csp-service-worker-csp.html
ποΈ https://blog.evilpacket.net/2019/leveraging-javascript-debuggers/
ποΈ https://medium.com/@cc1h2e1/write-up-of-two-http-requests-smuggling-ff211656fe7d
ποΈ https://medium.com/@prsecurity_/how-to-build-an-internal-red-team-7957ec644695
ποΈ https://alephsecurity.com/2019/09/02/Z3-for-webapp-security/
ποΈ https://speakerdeck.com/filedescriptor/the-cookie-monster-in-your-browsers
ποΈ https://googleprojectzero.blogspot.com/2019/08/a-very-deep-dive-into-ios-exploit.html
ποΈ https://research.aurainfosec.io/same-origin-policy/
ποΈ https://about.gitlab.com/2019/08/14/american-fuzzy-lop-on-gitlab/
ποΈ https://dttw.tech/posts/SJ40_7MNS
ποΈ https://soroush.secproject.com/blog/2019/08/uploading-web-config-for-fun-and-profit-2/
ποΈ http://addxorrol.blogspot.com/2019/08/rashomon-of-disclosure.html?m=1
ποΈ https://devco.re/blog/2019/08/09/attacking-ssl-vpn-part-2-breaking-the-Fortigate-ssl-vpn/
ποΈ https://github.com/trailofbits/audit-kubernetes/blob/master/reports/Kubernetes%20White%20Paper.pdf
ποΈ https://www.msreverseengineering.com/blog/2019/8/5/automation-techniques-in-c-reverse-engineering
ποΈ https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn
ποΈ https://i.blackhat.com/USA-19/Wednesday/us-19-Munoz-SSO-Wars-The-Token-Menace-wp.pdf
ποΈ https://www.imperialviolet.org/2019/08/10/ctap2features.html
ποΈ https://blog.cloudflare.com/a-gentle-introduction-to-linux-kernel-fuzzing/
ποΈ http://blog.infosectcbr.com.au/2019/07/linux-heap-tcache-poisoning.html
ποΈ https://www.synacktiv.com/posts/exploit/exploiting-a-no-name-freebsd-kernel-vulnerability.html
ποΈ https://blog.ropnop.com/docker-for-pentesters/
ποΈ https://medium.com/@iSecMax/Ρookie-based-xss-exploitation-2300-bug-bounty-story-9bc532ffa564
ποΈ https://blog.trailofbits.com/2019/07/19/understanding-docker-container-escapes/
ποΈ https://thezerohack.com/hack-any-instagram
ποΈ https://blog.assetnote.io/bug-bounty/2019/07/17/rce-on-zoom/
ποΈ https://hackerone.com/reports/587854
ποΈ https://medium.com/@ruvlol/rce-in-jira-cve-2019-11581-901b845f0f
ποΈ http://blog.ret2.io/2019/06/26/attacking-intel-tsx/
ποΈ https://blog.ripstech.com/2019/dotcms515-sqli-to-rce/
ποΈ https://medium.com/intigriti/how-spending-our-saturday-hacking-earned-us-20k-60990c4678d4
ποΈ https://alephsecurity.com/2019/06/17/xnu-qemu-arm64-1/
ποΈ https://cryptosense.com/blog/how-ledger-hacked-an-hsm/
ποΈ https://citizenlab.ca/docs/stalkerware-holistic.pdf
ποΈ https://speakerdeck.com/andresriancho/internet-scale-analysis-of-aws-cognito-security
ποΈ https://blog.npmjs.org/post/185397814280/plot-to-steal-cryptocurrency-foiled-by-the-npm
ποΈ https://www.ee.oulu.fi/research/ouspg/Disclosure_tracking
ποΈ https://code.fb.com/security/service-encryption/
ποΈ https://www.chromestatus.com/feature/5088147346030592
ποΈ https://arxiv.org/abs/1905.13055
ποΈ https://github.com/veorq/cryptocoding/
ποΈ https://guidovranken.com/2019/05/14/differential-fuzzing-of-cryptographic-libraries/
ποΈ https://eprint.iacr.org/2019/459.pdf
ποΈ https://leakfree.wordpress.com/2015/03/12/php-object-instantiation-cve-2015-1033/
ποΈ https://corb3nik.github.io/blog/ins-hack-2019/bypasses-everywhere
ποΈ https://anvilventures.com/blog/looking-inside-the-box.html
ποΈ https://www.synacktiv.com/ressources/GLPI_9.4.0_Type_juggling_auth_bypass.pdf
ποΈ https://securityriskadvisors.com/blog/aws-iam-exploitation/
<ποΈ https://www.synacktiv.com/ressources/advisories/Sitecore_CSRF_deserialize_RCE.pdf
ποΈ https://gitlab.com/cybears/fall-of-cybeartron/
ποΈ https://rhinosecuritylabs.com/application-security/cve-2019-0227-expired-domain-rce-apache-axis/
ποΈ https://mahmoudsec.blogspot.com/2019/04/handlebars-template-injection-and-rce.html
ποΈ https://medium.com/starting-up-security/starting-up-security-policy-104261d5438a
ποΈ https://blog.filippo.io/a-literate-go-implementation-of-poly1305/
ποΈ https://medium.com/@terjanq/how-i-am-able-to-hijack-you-1cab793a01d1
ποΈ https://blog.doyensec.com/2019/04/03/subverting-electron-apps-via-insecure-preload.html
ποΈ https://mogwailabs.de/blog/2019/03/attacking-java-rmi-services-after-jep-290/
ποΈ https://blog.assetnote.io/bug-bounty/2019/03/19/rce-on-mozilla-zero-day-webpagetest/
ποΈ https://tosc.iacr.org/index.php/ToSC/article/view/892/843
ποΈ https://blog.tint0.com/2019/03/a-saga-of-code-executions-on-zimbra.html?m=1
ποΈ https://www.vulnano.com/2019/03/facebook-messenger-server-random-memory.html
ποΈ https://mobile.twitter.com/rootxharsh/status/1104068814810087424