گروه های هکتویست درگیر جنگ اسراییل و غزه
گویا گروه هکتویست CyberAv3ngers ادعا کرده DORAD (نیروگاه دوراد یک نیروگاه در اشکلون اسرائیل ) و همچنین سیستم توزیع سوخت ORPAK Systems هک کرده است.
@Engineer_Computer
گویا گروه هکتویست CyberAv3ngers ادعا کرده DORAD (نیروگاه دوراد یک نیروگاه در اشکلون اسرائیل ) و همچنین سیستم توزیع سوخت ORPAK Systems هک کرده است.
@Engineer_Computer
100 گروه هکری فعال در جنگ سایبری بین اسرائیل و فلسطین شناسایی شده اند. از این میان، 20 گروه طرفدار اسرائیل بوده و 77 گروه طرفدار فلسطین هستند. 3 گروه هم بی طرف بوده اند.
@Engineer_Computer
@Engineer_Computer
Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes
Redmond also acknowledged a failure of its internal systems to detect sensitive secrets leaking from crash dumps.
“The key material’s presence in the crash dump was not detected by our systems (this issue has been corrected),” the company said.
The company said the 2021 crash dump with signing key was subsequently moved from the isolated production network into its debugging environment on the internet connected corporate network.
@Engineer_Computer
Redmond also acknowledged a failure of its internal systems to detect sensitive secrets leaking from crash dumps.
“The key material’s presence in the crash dump was not detected by our systems (this issue has been corrected),” the company said.
The company said the 2021 crash dump with signing key was subsequently moved from the isolated production network into its debugging environment on the internet connected corporate network.
@Engineer_Computer
SecurityWeek
Crash Dump Error: How a Chinese Espionage Group Exploited Microsoft’s Mistakes
Microsoft reveals how a crash dump from 2021 inadvertently exposed a key that Chinese cyberspies later leveraged to hack US government emails.
Intro To Honeypots
There are also honeypots that exist as public services to collect and analyze various payloads.
While some of these services are simply built as a means for professionals (and cyber criminals) to test the detection rate of their payloads, they are equally leveraged as a means to distribute payloads to anti-virus companies and law enforcement looking to get an edge on new techniques used in the field.
@Engineer_Computer
There are also honeypots that exist as public services to collect and analyze various payloads.
While some of these services are simply built as a means for professionals (and cyber criminals) to test the detection rate of their payloads, they are equally leveraged as a means to distribute payloads to anti-virus companies and law enforcement looking to get an edge on new techniques used in the field.
@Engineer_Computer
OffSec
Intro To Honeypots
Honeypots remain a relatively unexplored concept beyond the realms of security research organizations. This is largely due to the stigma where these types
Researchers Discover Critical Vulnerability in PHPFusion CMS
"Exploitation of this vulnerability has effectively two requirements," says Matthew Hogg, software engineer at Synopsys' Software Integrity Group, who discovered the vulnerability.
One of them is that the attacker needs to be able to authenticate to at least a low-privileged account, and the other is that they need to know the vulnerable endpoint.
"By fulfilling both criteria, a malicious actor would be able to craft a payload to exploit this vulnerability," Hogg says.
@Engineer_Computer
"Exploitation of this vulnerability has effectively two requirements," says Matthew Hogg, software engineer at Synopsys' Software Integrity Group, who discovered the vulnerability.
One of them is that the attacker needs to be able to authenticate to at least a low-privileged account, and the other is that they need to know the vulnerable endpoint.
"By fulfilling both criteria, a malicious actor would be able to craft a payload to exploit this vulnerability," Hogg says.
@Engineer_Computer
Dark Reading
Researchers Discover Critical Vulnerability in PHPFusion CMS
No patch is available yet for the bug, which can enable remote code execution under the correct circumstances.
Why MSPs Should Focus Their Attention on Data Protection Services, Not Backup
Each additional backup solution means more cost and not reaping the benefits of scale that comes from serving many customers with the same solution.
Each solution means more complexity and more opportunity for something to go wrong.
When almost any other system goes wrong, the problem will be flagged immediately, usually by the customer complaining.
@Engineer_Computer
Each additional backup solution means more cost and not reaping the benefits of scale that comes from serving many customers with the same solution.
Each solution means more complexity and more opportunity for something to go wrong.
When almost any other system goes wrong, the problem will be flagged immediately, usually by the customer complaining.
@Engineer_Computer
ITPro
Why MSPs should focus their attention on data protection services, not backup
Accommodating for unique customer needs should be a key focus for channel partners
IBM Notifies Janssen CarePath Customers of Data Breach
IBM said that it was notified of the issue by Janssen on August 2, 2023 and that it promptly worked with the database provider to disable the technical method that was used to gain unauthorized access.
IBM also augmented security controls to reduce the chance of a similar event occurring in the future.
@Engineer_Computer
IBM said that it was notified of the issue by Janssen on August 2, 2023 and that it promptly worked with the database provider to disable the technical method that was used to gain unauthorized access.
IBM also augmented security controls to reduce the chance of a similar event occurring in the future.
@Engineer_Computer
Hackread
IBM Notifies Janssen CarePath Customers of Data Breach
Twitter @Hackread - Facebook @ /Hackread
List of Data Breaches and Cyber Attacks in August 2023 – 79,729,271 Records Breached
For more details about the year’s incidents, check out our new page, which provides a complete list of known data breaches and cyber attacks in 2023.
It also breaks down each month’s cyber security incidents and provides more information about the biggest and most notable breaches of the month.
@Engineer_Computer
For more details about the year’s incidents, check out our new page, which provides a complete list of known data breaches and cyber attacks in 2023.
It also breaks down each month’s cyber security incidents and provides more information about the biggest and most notable breaches of the month.
@Engineer_Computer
IT Governance Blog
List of Data Breaches and Cyber Attacks in August 2023 – 79,729,271 Records Breached - IT Governance Blog
IT Governance found 73 publicly disclosed security incidents in August 2023, accounting for 79,729,271 breached records.
Minneapolis School District Says Data Breach Affected More Than 100,000 People
The breach began February 6 and continued until at least February 18, when MPS said it became aware of the “suspicious activity” and notified law enforcement.
The district said a “preliminary review” had been completed on March 22, and on April 7 it “sent notice to a limited number of known impacted individuals.”
@Engineer_Computer
The breach began February 6 and continued until at least February 18, when MPS said it became aware of the “suspicious activity” and notified law enforcement.
The district said a “preliminary review” had been completed on March 22, and on April 7 it “sent notice to a limited number of known impacted individuals.”
@Engineer_Computer
therecord.media
Minneapolis school district says data breach affected more than 100,000 people
Minneapolis Public Schools has begun notifying more than 100,000 people that their personal information may have been leaked after a cyberattack early this year.
آموزش نحوه ایجاد فلوی حملات
https://center-for-threat-informed-defense.github.io/attack-flow/
@Engineer_Computer
https://center-for-threat-informed-defense.github.io/attack-flow/
@Engineer_Computer
LIST OF SPL QUERIES – SOC MONITORING.pdf
312.1 KB
لیستی از کوئری های SPL
@Engineer_Computer
@Engineer_Computer
⭕️ پیدا کردن رمز عبور Wi-Fi با استفاده از حمله Evil twin
در این مقاله، هکر روشی برای شکستن رمز عبور Wi-Fi به وسیله حمله evil twin رو معرفی میکنه.
با ایجاد نقطه دسترسی جعلی با همان آدرس MAC و ESSID شبکه وای فای قربانی، میتونیم با استفاده از ابزار Airgeddon رمز عبور رو پیدا کنیم.
توجه: این اطلاعات تنها برای اهداف آموزشی و اخلاقی هستش.
لینک مقاله:
🔗 https://bit.ly/Evil-twin-oct-14-23
#Wpa #WiFi
@Engineer_Computer
در این مقاله، هکر روشی برای شکستن رمز عبور Wi-Fi به وسیله حمله evil twin رو معرفی میکنه.
با ایجاد نقطه دسترسی جعلی با همان آدرس MAC و ESSID شبکه وای فای قربانی، میتونیم با استفاده از ابزار Airgeddon رمز عبور رو پیدا کنیم.
توجه: این اطلاعات تنها برای اهداف آموزشی و اخلاقی هستش.
لینک مقاله:
🔗 https://bit.ly/Evil-twin-oct-14-23
#Wpa #WiFi
@Engineer_Computer
⭕️اگر درگیر RedTeam یا BlueTeam شده باشید حتما با c2 معروف covenant برخورد داشتید.
ابزاری برای رمزگشایی ترافیک رمز شده این c2 طراحی شده که به صورت زیر فعالیت میکند:
در دو بخش طراحی شده است، اسکریپت Extract_privatekey اعداد اول P و Q را از یک فایل Minidump برای ساختن یک کلید خصوصی RSA با استفاده از ماژول عمومی بازیابی می کند. اسکریپت Decrypt_covenant_traffic از 3 دستور ماژول کلید و رمزگشایی تشکیل شده است.
دستور اول ماژول را از ارتباطات Covenant استخراج می کند، در حالی که فرمان دوم کلید AES مورد استفاده برای رمزگذاری ترافیک داده را بازیابی می کند. در نهایت، فرمان سوم ترافیک را رمزگشایی می کند.
https://github.com/naacbin/CovenantDecryptor
#Blueteam
@Engineer_Computer
ابزاری برای رمزگشایی ترافیک رمز شده این c2 طراحی شده که به صورت زیر فعالیت میکند:
در دو بخش طراحی شده است، اسکریپت Extract_privatekey اعداد اول P و Q را از یک فایل Minidump برای ساختن یک کلید خصوصی RSA با استفاده از ماژول عمومی بازیابی می کند. اسکریپت Decrypt_covenant_traffic از 3 دستور ماژول کلید و رمزگشایی تشکیل شده است.
دستور اول ماژول را از ارتباطات Covenant استخراج می کند، در حالی که فرمان دوم کلید AES مورد استفاده برای رمزگذاری ترافیک داده را بازیابی می کند. در نهایت، فرمان سوم ترافیک را رمزگشایی می کند.
https://github.com/naacbin/CovenantDecryptor
#Blueteam
@Engineer_Computer
GitHub
GitHub - naacbin/CovenantDecryptor
Contribute to naacbin/CovenantDecryptor development by creating an account on GitHub.
⭕️ گروه هکتویست CyberAv3ngers ادعا کرده DORAD (نیروگاه دوراد یک نیروگاه در اشکلون اسرائیل ) و همچنین سیستم توزیع سوخت ORPAK Systems را هک کرده است.
#war #israel #gaza
@Engineer_Computer
#war #israel #gaza
@Engineer_Computer
⭕️اگر علاقه مند به نوشتن ابزار های آفنسیو هستید ابزاری برای Documents Exfiltration به زبان C و ++C نوشته شده که FUD بوده و با c2 کاستوم ارتباط میگیرد و فایل هارا منتقل میکند که
برای تمرین ابزار مناسبی هست.
https://github.com/TheD1rkMtr/DocPlz
#RedTeam #Tools
@Engineer_Computer
برای تمرین ابزار مناسبی هست.
https://github.com/TheD1rkMtr/DocPlz
#RedTeam #Tools
@Engineer_Computer
GitHub
GitHub - d1rkmtrr/DocPlz: Documents Exfiltration project for fun and educational purposes
Documents Exfiltration project for fun and educational purposes - d1rkmtrr/DocPlz
⭕️یک Stealer جالب برای Exfitrate Office Documents به زبان ++C و Python نوشته شده که با استفاده از API مربوط به Virustotal داده را استخراج کرده و به Server c2 مورد نظر منتقل میکند.
https://github.com/TheD1rkMtr/VT-stealer
#RedTeam #Tools
@Engineer_Computer
https://github.com/TheD1rkMtr/VT-stealer
#RedTeam #Tools
@Engineer_Computer
درباب ریسکهای استفاده از کدهای متن باز
به روزرسانی این کدها رو به کاهش است و از هر ۸ منبع متن باز یکی دارای ریسک است و فقط ۱۱ درصد از پروژه های متن باز بصورت فعال پشتیبانی میشود
زنجیره امنیت نرم افزار را جدی بگیرید
https://www-infoworld-com.cdn.ampproject.org/c/s/www.infoworld.com/article/3708630/report-finds-few-open-source-projects-actively-maintained.amp.html
@Engineer_Computer
به روزرسانی این کدها رو به کاهش است و از هر ۸ منبع متن باز یکی دارای ریسک است و فقط ۱۱ درصد از پروژه های متن باز بصورت فعال پشتیبانی میشود
زنجیره امنیت نرم افزار را جدی بگیرید
https://www-infoworld-com.cdn.ampproject.org/c/s/www.infoworld.com/article/3708630/report-finds-few-open-source-projects-actively-maintained.amp.html
@Engineer_Computer