[ Removed by Reddit on account of violating the content policy. ]
[link] [comments]
[ Removed by Reddit on account of violating the content policy. ]
Author here. DVRTC is our attempt to fill a gap that's been there for a while: web app security has DVWA and friends, but there's been nothing equivalent for VoIP and WebRTC attack techniques.
The first scenario (pbx1) deploys a full stack β Kamailio as the SIP proxy, Asterisk as the back-end PBX, rtpengine for media, coturn for TURN/STUN β with each component configured to exhibit specific vulnerable behaviors:
7 exercises with step-by-step instructions. There's also a live instance at pbx1.dvrtc.net if you want to try it without standing up your own.
Happy to answer questions.
Backdoor operates at the kernel level using BPF to passively inspect traffic and trigger on crafted packets, avoiding exposed ports or typical C2 indicators.
Tradecraft enables long-term persistence and covert access inside core network infrastructure, with very limited visibility from standard monitoring.
Interesting case of network-layer backdoor design rather than traditional userland implants.
In enterprise environments, identity effectively became the control plane once network perimeters broke down (e.g. zero trust, et cetera).
Iβm seeing a similar pattern emerging on the public internet via age verification and safety regulation, but with identity moving closer to the access layer itself.
Not just: βAre you over 18?β
But: identity assertions are becoming part of how access is granted at the OS/device/app store level.
From a security perspective, this seems to introduce some new attack surfaces:
Questions Iβm trying to think through:
Curious how people here would threat model this or where the obvious breakpoints are.
NTLM-Relaying has been proclaimed dead a number of times, signing requirements for SMB and LDAP make it nearly impossible to use captured NTLM authentications anymore. However, it is still possible to relay to many webservers that do not enforce Extended Protection for Authentication (not just ADCS / ESC8).
A missing authentication check in TP-Linkβs Archer NX series allows unprivileged attackers to upload firmware. The update lands as the company defends a Texas lawsuit alleging deceptive security claims.
Analysis of the LiteLLM incident: stolen CI tokens β malicious PyPI releases β credential exfiltration from runtime environments.
With focus on trust boundaries in CI/CD and secret exposure.
We pentested a web app built 100% with AI β no human-written code. Functional, clean, well-structured. But security-wise, we found critical issues on day one: LFI, IDOR, vulnerable dependencies, and more.
AI-generated code is not secure by default. And vibe coding moves fast enough that security gets skipped entirely.
Full writeup with technical details and recommendations: https://www.hackmosphere.fr/en/?p=3803
Anyone else seeing this pattern in AI-generated apps?