SecureBug allows you to evaluate your offensive and defensive skills, in addition, to let you exchange your ideas and methodologies with thousands of people in the security field.
Join Nordic's No.1 Crowdsourced Security Platform For Offensive & Defensive Security Strategies.

TikTok app

TikTok vulnerabilities Allowed Hackers access to Videos User data

TikTok is one of the most popular apps globally. Beijing-based ByteDance owns the app that is available in over 150 countries and boasts over 1 billion users. Israeli cybersecurity research firm Check Point Research says it found “multiple vulnerabilities” within TikTok’s infrastructure. The vulnerabilities made it possible for potential attackers to hijack accounts to manipulate…

Hunting Octopus threat hunting

Hunting Octopus The pre-operation C2 for blue-teamers: (Part 1)

Octopus is an open-source, pre-operation C2 server written in python3. Octopus can control its agents with PowerShell and communicate on HTTP or HTTPS protocols.   Based on the article published here, Octopus has the following features: Control agents through HTTP/S. Execute system commands. Download files. Load external PowerShell modules. Use encrypted channels (AES-256) between C2 and…