Recon

RECON

Updated 4m ago
High-Signal Security Intelligence

2026-02-07

Think Love Share208IN STACK · 2026-02-07 00:00

Enketo 6.2.1 - Auth-Bypass, SSRF, and XXE Browser Abuse to File Read

Introduction This training session was focused on white-box code review, application, and system runtime introspection. We wanted to work on a JavaScript backend framework and Enketo Express seemed to be a good candidate. The source code is available on GitHub - enketo/enketo-express and the version we assessed was the version 6.2.1, built with the official Dockerfiles. Enketo is a cross platform software used to (quoting): Deploy and conduct surveys that work without a connection, on any dev...
Swing'Blog 有恨无人省142 · 2026-02-07 04:00

Pickling the Mailbox: A Deep Dive into CVE-2025-20393

<link rel="stylesheet" type="text/css" hr
Hacking Dream12 · 2026-02-07 21:52

Static Malware Analysis: Analyzing Malicious Files (Part 1)

Static Malware Analysis: Analyzing Malicious Files (Part 1) Static Malware Analysis: Analyzing Malicious Files (Part 1) Updated on February 8, 2026 Table of Contents Prerequisites Initial Information Gathering Basic Static Analysis Advanced Static Analysis IOC Extraction Detection Perspective Key Takeaways When you're handed a suspicious file during an incident response or threat hunting engagement, your first instinct shouldn't be to execute it. That's where static malware analysis comes in ...
Hacking Dream12 · 2026-02-07 21:31

Analyze Malicious Office Documents: The Complete Guide

Analyze Malicious Office Documents: The Complete Guide Analyze Malicious Office Documents: The Complete Guide Updated on 2026-02-08 Table of Contents Prerequisites Port Information Document Types Overview Initial Information Gathering Basic Static Analysis Advanced Static Analysis Dynamic Analysis IOC Extraction Exploitation Perspective Detection & Mitigation Microsoft Office documents have been a favorite delivery mechanism for attackers since the 90s. I've seen everything from macro dropper...
[DRAGNET]5 · 2026-02-07 08:00

Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information

Hackers Exploit Cybersquatting Tactics to Spread Malware and Steal Sensitive Information    gbhackers.com