mx
@n0pchain
the ghost in your shell
ID: 1355182316218417157
29-01-2021 15:53:42
43 Tweet
40 Followers
48 Following
.CrowdStrike Intelligence discovered vulnerabilities affecting libvncclient; in some environments these can be triggered in a 1-click fashion. Learn more in the CrowdStrike blog “Scheming with URLs: One-Click Attack Surface in Linux Desktop Environments”: bit.ly/3D1YTY2
In the CrowdStrike blog -> Find out how CrowdStrike Intelligence uses fuzzing to hunt for bugs: bit.ly/3CoNK2n
CrowdStrike has identified a malicious Java class file hosted on infra associated with a nation state adversary. The Java code is used to download known instances of adversary specific tooling and is likely to be used in conjunction with the recently disclosed #log4j issue.
ICYMI: My team at CrowdStrike will be hosting another #AdversaryQuest #ctf this year. The game will feature three adversary-themed tracks of four challenges each and will start on 11 July 2022. Registration is now open at adversary.quest.
People were busy playing #adversaryquest #ctf over the weekend! Yun and jemoeder completed all 12 challenges and joined Sin__ at the top. Calle Svensson and evandrix picked up steam again and joined Patrick Walker in the next position with 10 solves, followed by Markus Dauberschmidt with 9.