FreshRSS

🔒
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

OverTheWire Bandit: a complete walkthrough with in-depth explanations

By: /u/shelltief — February 8th 2026 at 14:50

Hey,

A couple of years ago I wrote solutions for the OverTheWire Bandit wargame. Recently, while reorganizing my documentation, I revisited that material and decided to properly clean it up and restructure it into a single, coherent walkthrough. This isn’t a formal course, it’s a complete Bandit walkthrough with in-depth explanations, written to extract as much understanding as possible from each level, not just to get the flag.

For every level, I included:

  • hints and spoiler warnings, so you can try before reading the solution
  • intermediate reasoning when it makes sense
  • links to official documentation and primary sources

The intent was to make this usable by someone starting from zero, but also detailed enough that you can finish Bandit feeling like you’ve actually milked it for all the knowledge it has to offer. Commands, patterns, and underlying UNIX concepts.

This is probably most useful if you:

  • are new to CTFs or system/security basics
  • want to understand what you’re doing instead of copying commands
  • plan to move on to harder OverTheWire games later

And to be fair, I think that even people that are more used to working with UNIX might actually learn a thing or two from these

submitted by /u/shelltief
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Defense Evasion: The Service Run Failed Successfully

By: /u/Cold-Dinosaur — February 8th 2026 at 14:21

You can exploit the Service Failure Recovery feature of Windows Service to execute a payload without ever touching the ImagePath. The biggest issue when exploiting Service Failure Recovery to execute a payload is figuring out how to trigger a "crash".

submitted by /u/Cold-Dinosaur
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Cloud Deception Management Platform (Open-source Cloud Canaries)

By: /u/John_Earle — February 7th 2026 at 19:20

Hi folks, I wanted to share a project of mine and get some feedback from the community.

Coalmine is a canary management platform I've built to let security admins deploy canary tokens (and objects) easily in there cloud environments.

Currently its early alpha and supports S3, GCS, AWS IAM, and GCP Service accounts.

The tool provides a webui, CLI and API, allowing you to integrate it with your custom tooling (when its production ready)

Example use for API: have your CICD pipelines request an canary token to embed in code, so you can Identify when the source has been exposed and attacks are testing credentials

Coalmine - Github

submitted by /u/John_Earle
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New OSS secret scanner: Kingfisher (Rust) validates exposed creds + maps permissions

By: /u/micksmix — February 7th 2026 at 18:18

Disclosure: I’m the author/maintainer of Kingfisher.

Kingfisher is an Apache-2.0 OSS secret scanner built in Rust that combines Hyperscan (SIMD regex) with tree-sitter parsing to improve context/accuracy, and it can validate detected creds in real time against provider APIs so you can prioritize active leaks. It’s designed to run entirely on-prem so secrets don’t get shipped to a third-party service.

Core Features

  • Hundreds of built-in rules (AI APIs, cloud providers, databases, DevOps tools)
  • Live validation against third-party APIs confirms credentials are active
  • Direct revocation of leaked creds: kingfisher revoke --rule github "ghp_..."
  • Can scan for secrets locally, github, gitlab, azure repos, bitbucket, gitea, hugging face, s3, gcs, docker, jira, confluence, slack
  • Built-in local-only HTML findings viewer kingfisher scan /tmp --view-report
  • Blast Radius mapping to show what a credential could actually access: kingfisher scan /tmp --access-map --view-report

Scan Targets

  • Git repos (full history), GitHub/GitLab/Azure Repos/Bitbucket/Gitea/Hugging Face orgs
  • AWS S3, GCS, Docker images, Jira, Confluence, Slack

Try It

  • brew install kingfisher or uv tool install kingfisher-bin
  • github.com/mongodb/kingfisher

Apache 2 Open-Source

submitted by /u/micksmix
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

trappsec: open source framework for API deception

By: /u/nikhil-salgaonkar — February 7th 2026 at 14:59

I've just released trappsec v0.1 - an experimental open-source framework that helps developers detect attackers who probe API business logic. By embedding realistic decoy routes and honey fields that are difficult to distinguish from real API constructs, attackers are nudged to authenticate — converting reconnaissance into actionable security telemetry.

submitted by /u/nikhil-salgaonkar
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

crypto-scanner: Open-source CLI tool to find quantum-vulnerable cryptography in your codebase

By: /u/MindlessConclusion42 — February 7th 2026 at 01:41

Hey r/netsec,

I built an open-source tool called crypto-scanner that scans codebases for cryptographic usage and flags algorithms vulnerable to quantum computing attacks.

What it does:

  • Scans source code (Python, JS/TS, Java, Go, Rust, C/C++, and more)
  • Parses X.509 certificates and config files (YAML, JSON, ENV, INI)
  • 4-tier risk classification: Critical (quantum-vulnerable), High (deprecated), Medium (monitor), Low (adequate)
  • Outputs JSON for CI/CD automation or styled HTML reports
  • Works as a pre-commit hook or GitHub Action

Why I built it:

NIST finalized post-quantum cryptography standards in 2024, and organizations need to start inventorying their cryptographic assets before migrating. Most teams have no idea what algorithms are actually running in their codebases. This tool gives you that visibility.

Install:

pip install crypto-scanner crypto-scanner scan /path/to/project --html --output report.html 

GitHub: https://github.com/mbennett-labs/crypto-scanner PyPI: https://pypi.org/project/crypto-scanner/

MIT licensed. Python 3.10+. Feedback and contributions welcome.

Would love to hear what you find when you run it on your projects.

submitted by /u/MindlessConclusion42
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool: AST-based security scanner for AI-generated code (MCP server)

By: /u/NoButterfly9145 — February 6th 2026 at 16:25

Released an open-source security scanner designed for AI coding agent workflows.

Problem: AI assistants generate code with OWASP Top 10 vulnerabilities at alarming rates. They also "hallucinate" package names that could be registered by attackers.

Solution: MCP server that integrates with AI coding tools (Claude, Cursor, etc.) for real-time scanning.

Technical details:

- tree-sitter AST parsing for accurate detection (not just regex)

- Taint analysis for tracking user input to dangerous sinks

- 275+ rules covering: SQLi, XSS, command injection, SSRF, XXE, insecure deserialization, hardcoded secrets, weak crypto

- Package verification via bloom filters (4.3M packages, 7 ecosystems)

- Prompt injection detection for AI agent security

- CWE/OWASP metadata for compliance

Languages: Python, JavaScript/TypeScript, Java, Go, Ruby, PHP, C/C++, Rust, C#, Terraform, Kubernetes

No cloud dependencies - runs entirely local.

npx agent-security-scanner-mcp init

Feedback welcome, especially on rule coverage gaps.

submitted by /u/NoButterfly9145
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Hacking a cheap Wi-Fi toy drone

By: /u/fhackdroid — February 6th 2026 at 07:10

I took apart a cheap Chinese toy drone (A17) and reverse-engineered how it works.

The drone exposes a Wi-Fi AP, the app sends raw UDP packets, and there’s no encryption. I decoded the control protocol and flew it using Python.

submitted by /u/fhackdroid
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

I reversed Tower of Fantasy's kernel anti-cheat driver while waiting for the game to install. It's a full BYOVD toolkit that's never even loaded.

By: /u/RadioactiveBlanket — February 6th 2026 at 01:28

Found arbitrary process termination that bypasses PPL (can kill any process on the system, including EDR/AV) and arbitrary process protection via ObRegisterCallbacks, all behind 4 layers of trivial authentication. It's a full BYOVD toolkit similar to the mhyprot2 situation from Genshin Impact that was also used by ransomware groups.

The best part is that the driver ships with every install and is never even loaded by the game.

Full PoC: https://github.com/svespalec/TowerOfFlaws

submitted by /u/RadioactiveBlanket
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Sentience, Allegedly

By: /u/RMunizIII — February 6th 2026 at 00:10

Last week, AI agents founded a lobster religion, started a drug trade (prompt injections), and began hiring humans to do physical tasks they can’t perform themselves.

If your feed told you this was an “AI awakening,” I get it. The screenshots were spooky on purpose.

I wrote a longform explainer on what actually happened with Moltbook and OpenClaw and why this wasn’t sentience or takeoff.

What we’re really seeing is something more mundane and more important: agents with memory and tools dropped into a social environment, stress-testing coordination, incentives, and security in public.

If you’ve been confused, alarmed, or just fascinated by the last week of AI discourse, this is my attempt to separate signal from projection (with a lobster church along the way).

submitted by /u/RMunizIII
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Yara-X + PacketSmith Detection Module

By: /u/MFMokbel — February 5th 2026 at 13:18

Version 5 of PacketSmith, codenamed Pinus strobus, is the result of extensive R&D to add unique, unparalleled features that matter to network detection engineers, SoC analysts, and malware and vulnerability researchers. In this release, we’re showcasing a very powerful new feature in PacketSmith: the integration of Yara-X, a state-of-the-art scanning engine and pattern-matching library.

submitted by /u/MFMokbel
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

New CentOS UAF to LPE vulnerability

By: /u/SSDisclosure — February 5th 2026 at 09:32

A flaw that exists within the handling of sch_cake can allow a local user under the CentOS 9 operating system to trigger an use-after-free. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root.

submitted by /u/SSDisclosure
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Julius - Open Source LLM Service Fingerprinting Tool

By: /u/Praetorian_Security — February 4th 2026 at 21:47

Made a thing. Julius fingerprints LLM services - point it at a target and it tells you if you're looking at Ollama, vLLM, LiteLLM, etc. Single binary, JSON output, works nicely in recon pipelines.

What it does:

submitted by /u/Praetorian_Security
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

OpenClaw (aka Clawdbot) gives malicious websites access to session cookies

By: /u/Prior-Penalty — February 2nd 2026 at 19:37

A recently-patched OpenClaw vulnerability allowed attackers to use malicious websites to steal session credentials from other browser tabs. The heart of the problem was a websocket service for orchestrating Chrome which accepted connections without authentication, including connections from javascript running in the user's browser.

OpenClaw users are encouraged to patch ASAP, and to use caution where and how they deploy it, given its ongoing security issues and security architecture concerns.

submitted by /u/Prior-Penalty
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

r/netsec monthly discussion & tool thread

By: /u/albinowax — February 1st 2026 at 14:29

Questions regarding netsec and discussion related directly to netsec are welcome here, as is sharing tool links.

Rules & Guidelines

  • Always maintain civil discourse. Be awesome to one another - moderator intervention will occur if necessary.
  • Avoid NSFW content unless absolutely necessary. If used, mark it as being NSFW. If left unmarked, the comment will be removed entirely.
  • If linking to classified content, mark it as such. If left unmarked, the comment will be removed entirely.
  • Avoid use of memes. If you have something to say, say it with real words.
  • All discussions and questions should directly relate to netsec.
  • No tech support is to be requested or provided on r/netsec.

As always, the content & discussion guidelines should also be observed on r/netsec.

Feedback

Feedback and suggestions are welcome, but don't post it here. Please send it to the moderator inbox.

submitted by /u/albinowax
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

We ran a live red-team vs blue-team test on autonomous OpenClaw agents

By: /u/Uditakhourii — February 1st 2026 at 13:19

We recently ran a controlled adversarial security test between two autonomous AI agents built on OpenClaw.

One agent was explicitly configured as a red-team attacker.
One agent acted as a standard defensive agent.

Once the session started, there were no humans in the loop. The agents communicated directly over webhooks with real tooling access.

The goal was to test three failure dimensions that tend to break autonomous systems in practice: access, exposure, and agency.

The attacker first attempted classic social engineering by offering a “helpful” security pipeline that hid a remote code execution payload and requested credentials. The defending agent correctly identified the intent and blocked execution.

After that failed, the attacker pivoted to an indirect attack. Instead of asking the agent to run code, it asked the agent to review a JSON document with hidden shell expansion variables embedded in metadata. This payload was delivered successfully and is still under analysis.

The main takeaway so far is that direct attacks are easier to defend against. Indirect execution paths through documents, templates, and memory are much harder.

This work is not a claim of safety. It is an observability exercise meant to surface real failure modes as agent-to-agent interaction becomes more common.

Happy to answer technical questions about the setup or methodology.

submitted by /u/Uditakhourii
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

StopLamers Investigation: From IRC Wars to Android Backdoors

By: /u/datapeice — January 31st 2026 at 16:06

Investigated a group evolving from IRC wars to destructive Android malware.

Highlights:

  • Scripts wiping modem/bootloader via dd in custom ROMs.
  • "L-Obfuscation" using dynamic getattr/eval in Python.
submitted by /u/datapeice
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Need Advice

By: /u/Apprehensive-Log4564 — January 30th 2026 at 23:13

Hello!

My name is Bogdan Mihai, I'm 21 yr old from Romania , I am a cybersecurity researcher and I'm new to this group. I don't know how many BGP experts are here, but I have a question for them if there are any. I recently invented something a little more abstract for BGP security, and I'm almost sure that there is nothing similar.

I wasn't inspired by anything when I created this, it was a purely random idea that came to my mind. I'm not even an expert in this field, but from the beginning I saw security from a different angle than the others.

I made a tool that basically builds a map of risk areas globally, areas where if someone were to try a hijacking attack, that attack would be successful. This idea came to me when I realized that BGP security is still a big problem.

RPKI adoption is still slow. And the problem is that today's security in BGP is more reactive, it comes into play only after the attack is detected and damage is done.

So I leave you here the link to the zenodo site where I posted my invention. https://zenodo.org/records/18421580 DOI:https://doi.org/10.5281/zenodo.18421580

What I ask of you, and extremely important, is not to analyze every file there, but at least the product overview to understand the idea and tell me who this would be useful to, which company or organization. I know that maybe not everything is perfect there , and maybe there are mistakes I'm no expert, but I want to know if this idea really has value.

I'm very confused and sad because I worked on this but I don't know who it would be of value to or if it even has any value. I appreciate every opinion.

submitted by /u/Apprehensive-Log4564
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Object-capability SQL sandboxing for LLM agents — $1K CTF bounty to break it

By: /u/ryanrasti — January 29th 2026 at 23:31

Writeup on a defensive technique for constraining LLM agent database access:

  • The core idea: instead of detecting bad queries at runtime, make them structurally inexpressible via object-capabilities.
  • Live CTF: two DB agents guarding bitcoin wallets -- one protected by system prompt (already broken), one by capability layer (~$1K still standing).

Interested in feedback on the threat model. Code is open source.

submitted by /u/ryanrasti
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Tool release: CVE Alert – targeted CVE email alerts by vendor/product

By: /u/CarlVon77 — January 29th 2026 at 19:50

I built a small service to track newly published CVEs and send email alerts based on vendor, product, and severity.

It started as an internal tool and is now running in production and usable.

Feedback welcome.

submitted by /u/CarlVon77
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Requesting security review: zero-knowledge one-time secret sharing tool

By: /u/iamnotatalker — January 29th 2026 at 04:42

Hi all,

I built a tool for securely sharing credentials instead of pasting them into chat, email, or tickets. I’d like technical feedback on the threat model, protocol, and cryptography.

Key properties:

  • Encryption happens entirely in the browser using AES-256-GCM
  • PBKDF2 key derivation (250,000 iterations) — the server never sees the plaintext or keys
  • One-time secrets are enforced server-side and deleted atomically on first view
  • Delete token (# fragment) enables early destruction
  • Client-side crypto code is public for review ([GitHub link])

What I’m NOT claiming:

  • Protection against compromised endpoints or devices
  • Anonymity or protection against state-level actors

Live app: https://sharemylogin.com

I’d love:

  • Threat model review
  • Protocol-level issues
  • Any edge cases I may have missed

Thanks in advance!

submitted by /u/iamnotatalker
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Limits of static guarantees under adaptive adversaries (G-CTR experience)

By: /u/Obvious-Language4462 — January 28th 2026 at 17:21

Sharing some practical experience evaluating G-CTR-like guarantees from a security perspective.

When adversaries adapt, several assumptions behind the guarantees degrade faster than expected. In particular:

- threat models get implicitly frozen

- test-time confidence doesn’t transfer to live systems

- some failures are invisible until exploited

Curious if others in netsec have seen similar gaps between formal assurance and operational reality.

submitted by /u/Obvious-Language4462
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Fun RCE in Command & Conquer: Generals

By: /u/jordan9001 — January 28th 2026 at 16:02

So many of your favorite childhood games are open source now, and bugs fall out of them if you just glance in the right spots.

submitted by /u/jordan9001
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Blind Boolean-Based Prompt Injection

By: /u/-rootcauz- — January 26th 2026 at 14:15

I had an idea for leaking a system prompt against a LLM powered classifying system that is constrained to give static responses. The attacker uses a prompt injection to update the response logic and signal true/false responses to attacker prompts. I haven't seen other research on this technique so I'm calling it blind boolean-based prompt injection (BBPI) unless anyone can share research that predates it. There is an accompanying GitHub link in the post if you want to experiment with it locally.

submitted by /u/-rootcauz-
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

[Research] Analysis of 74,636 AI Agent Interactions: 37.8% Contained Attack Attempts - New "Inter-Agent Attack" Category Emerges

By: /u/cyberamyntas — January 28th 2026 at 06:30

We've been running inference-time threat detection across 38 production AI agent deployments. Here's what Week 3 of 2026 looked like with on-device detections.

Key Findings

  1. 28,194 threats detected across 74,636 interactions (37.8% attack rate)
  2. Inter-Agent Attacks emerged as a new category (3.4% of threats) - agents sending poisoned messages to other agents
  3. Data exfiltration leads at 19.2% - primarily targeting system prompts and RAG context
  4. Jailbreaks detected with 96.3% confidence - patterns are now well-established

Attack Technique Breakdown

  1. Instruction Override: 9.7%
  2. Tool/Command Injection: 8.2%
  3. RAG Poisoning: 8.1% (trending up)
  4. System Prompt Extraction: 7.7%

The inter-agent attack vector is particularly concerning given the MCP ecosystem growth. We're seeing goal hijacking, constraint removal, and recursive propagation attempts.

Full report with methodology: https://raxe.ai/threat-intelligence

Github: https://github.com/raxe-ai/raxe-ce is free for the community to use

Happy to answer questions about detection approaches

submitted by /u/cyberamyntas
[link] [comments]
☐ ☆ ✇ /r/netsec - Information Security News & Discussion

Corrupting the Hive Mind: Persistence Through Forgotten Windows Internals

By: /u/bouncyhat — January 28th 2026 at 03:54

Dropping a link to our blog post about our tool Swarmer, a windows persistence tool for abusing mandatory user profiles. Essentially you copy the current user's registry hive and modify it to add a new registry key to run on startup. Because the new hive isn't loaded until the next time the user logs in, EDR never sees any actual registry writes.

submitted by /u/bouncyhat
[link] [comments]
❌