Is AutoSploit for Script Kiddies? - ThreatWire




Threat Wire show

Summary: <p>Adobe Flash has got a 0-Day Remote Code Execution problem, that jackpotting thing? Yeah, it officially happened in the US. And is autosploit just for noobs? All that coming up now on ThreatWire.</p><br> <p><br>-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆<br>Shop → <a href="http://www.hakshop.com">http://www.hakshop.com</a> <br>Subscribe → <a href="http://www.youtube.com/hak5">http://www.youtube.com/hak5</a> <br>RSS Feeds → <a href="https://www.hak5.org/subscribe">https://www.hak5.org/subscribe</a> <br>Support → <a href="http://www.patreon.com/threatwire">http://www.patreon.com/threatwire</a> </p><br> <p>Our Site → <a href="http://www.hak5.org">http://www.hak5.org</a> <br>Contact Us → <a href="http://www.twitter.com/hak5">http://www.twitter.com/hak5</a> <br>Threat Wire RSS → <a href="https://shannonmorse.podbean.com/feed/">https://shannonmorse.podbean.com/feed/</a> <br>Threat Wire iTunes → <a href="https://itunes.apple.com/us/podcast/threat-wire/id1197048999">https://itunes.apple.com/us/podcast/threat-wire/id1197048999</a> </p><br> <p>Help us with Translations! → <a href="http://www.youtube.com/timedtext_cs_panel?tab=2&amp;c=UC3s0BtrBJpwNDaflRSoiieQ">http://www.youtube.com/timedtext_cs_panel?tab=2&amp;c=UC3s0BtrBJpwNDaflRSoiieQ</a> </p><br> <p>For Business Inquiries, please use our contact forms → <a href="https://www.hak5.org/contact">https://www.hak5.org/contact</a> </p><br> <p>Producer: Shannon Morse → <a href="https://www.youtube.com/shannonmorse">https://www.youtube.com/shannonmorse</a> <br>Editor: Colleen Cavolo<br>Host: Shannon Morse → <a href="https://www.twitter.com/snubs">https://www.twitter.com/snubs</a> <br>Host: Darren Kitchen → <a href="https://www.twitter.com/hak5darren">https://www.twitter.com/hak5darren</a> <br>Host: Mubix → <a href="http://www.twitter.com/mubix">http://www.twitter.com/mubix</a> <br>-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆</p><br> <p>Flash:<br>https://www.krcert.or.kr/data/secNoticeView.do?bulletin_writing_sequence=26998<br>https://helpx.adobe.com/security/products/flash-player/apsa18-01.html<br>http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html<br>https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html<br>http://www.zdnet.com/article/south-korea-identifies-flash-0-day-in-the-wild/</p><br> <p>AutoSploit<br>https://twitter.com/Real__Vector/status/958412549044801536<br>https://github.com/NullArray/AutoSploit<br>https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/<br>https://twitter.com/taosecurity/status/958670200357998592</p><br> <p>Jackpotting:<br>https://krebsonsecurity.com/2018/01/drug-charges-tripped-up-suspects-in-first-known-atm-jackpotting-attacks-in-the-us/<br>https://krebsonsecurity.com/wp-content/uploads/2018/01/romeroetal-jackpotting.pdf</p><br> <p>Youtube Thumbnail credit:<br>https://pixabay.com/p-731198/?no_redirect</p>