8kSec

614 posts

8kSec banner
8kSec

8kSec

@8kSec

Offensive Security Trainings and Services. OnDemand Mobile Security & AI Security Courses - https://t.co/B8Q31o3VXY. Linkedin: @8ksec

United States Katılım Ağustos 2022
539 Takip Edilen3.3K Takipçiler
Sabitlenmiş Tweet
8kSec
8kSec@8kSec·
MCP servers can expose file read/write tools to AI assistants. When they do, unsafe path handling can let requests escape the intended workspace. Here are two path traversal bugs showing up in many MCP file servers. Who needs to act: → Developers: check read_file + write_file for path validation and the fix is ~3 lines of Python → Security engineers: the example paths with traversal pattern mentioned in the image are your audit checklist → Security leads: no filesystem sandbox, and MCP tools run with full host process permissions Bookmark this! Find detailed lesson: academy.8ksec.io/course/practic…
8kSec tweet media
English
2
5
45
3K
8kSec
8kSec@8kSec·
Yet another ipsw walkthrough worth bookmarking: 8ksec.io/ipsw-walkthrou… In this one we talk about how the `idev` subcommand alone covers: traffic capture with process filtering, syslog monitoring, crash log pulls, AFC filesystem ops, and USB proxy forwarding. We also cover kernelcache analysis, im4p decryption, OTA patching for cryptex volumes (iOS 16+/macOS 13+), and debugserver setup over SSH.
8kSec tweet media
English
0
3
13
690
8kSec
8kSec@8kSec·
@vr2wpa @credly Congratulations Captain!! We look forward to having you crack some more of our certs!
English
0
0
1
55
8kSec
8kSec@8kSec·
Mobile Malware Analysis Part 7 breaks down BlackRock, Android spyware disguised as Flash Player that abuses AccessibilityService to inject phishing WebViews over 30+ banking apps (Coinbase, Kraken, Santander, WhatsApp). 16 C2 commands. AES-encrypted comms. Dynamic DEX loading via DexClassLoader. Full writeup: 8ksec.io/mobile-malware…
8kSec tweet media
English
0
8
30
2.1K
8kSec
8kSec@8kSec·
Want a walkthrough of ipsw, the Swiss Army knife for iOS/macOS research? Check out this blog where we break down every major command: dyld_shared_cache, DeviceTree, entitlements, IPSW diffs, and more. 8ksec.io/ipsw-walkthrou…
8kSec tweet media
English
0
5
34
2.1K
8kSec
8kSec@8kSec·
The part most teams skip: Audit findings and incidents must feed BACK into GOVERN policies and MAP risk registers. Without that loop → compliance theater, not governance. Learn AI Security → academy.8ksec.io/course/practic…
English
1
0
0
147
8kSec
8kSec@8kSec·
Only 12–14% of orgs have mature AI governance in place. NIST AI RMF gives you the blueprint. This is a continuous cycle, not a one-time effort: GOVERN → MAP → MEASURE → MANAGE → (repeat) Here's what each function actually requires, mapped to ISO/IEC 42001 + EU AI Act 🧵
8kSec tweet media
English
1
2
8
723
8kSec
8kSec@8kSec·
In this blog from our Mobile Malware series breaks down Xenomorph, an Android banking trojan that loads its DEX payload via JNI, bypassing standard DexClassLoader to evade hooks. Tools: JADX, Simplify, Medusa (Frida), Ghidra 8ksec.io/mobile-malware…
8kSec tweet media
English
0
19
62
3.7K
8kSec
8kSec@8kSec·
This blog walks through Android deep link and WebView exploitation, bypassing host validation to exfiltrate credentials from shared_prefs via JavaScript: 8ksec.io/android-deepli… Tested on InsecureShop using ADB + Frida.
8kSec tweet media
English
0
39
145
8.6K
8kSec
8kSec@8kSec·
Thinking about a Threat Modeling Checklist for AI Systems? This graphic maps 6 key stages of an AI attack kill chain to MITRE ATLAS, with an honest defense verdict at each stage. Two stages are undefendable by design: · Reconnaissance looks identical to normal usage · Resource Development happens entirely offline Always remember that your strongest interception points are stages 4 and 5 🎯 📌 Bookmark this for your next AI architecture review or threat modeling session. 🔗 Learn AI Security in depth: academy.8ksec.io/course/practic…
8kSec tweet media
English
0
4
33
1.6K
8kSec
8kSec@8kSec·
8kSec is bringing Offensive Mobile Reversing and Exploitation to RomHack 2026. 4 days of hands-on training in Rome. Sep 28 – Oct 1. ARM64, Frida, Ghidra, and Corellium access included. You will explore Mobile Application security as well as iOS and Android mitigations like PAC, SPTM, TXM RKP, SELinux, plus AI-driven reversing. 🎟 Enroll at the early bird rate: romhack.io/training/2026/…
8kSec tweet media
English
0
2
22
1.5K
8kSec
8kSec@8kSec·
@0xor0ne Really appreciate the mention, @0xor0ne. Hope the series helps others along their learning journey.💪
English
0
0
0
308