پشتیبانی OpenSSL از فضای پسا کوانتوم
https://www.openssl.org/blog/blog/2023/11/23/OpenSSL32/
@Engineer_Computer
https://www.openssl.org/blog/blog/2023/11/23/OpenSSL32/
@Engineer_Computer
Practical Windows Forensics Cheat Sheet.pdf
2.8 MB
چیت شیت عملیاتی فارنزیک ویندوز
@Engineer_Computer
@Engineer_Computer
هک سیستم کنترل صنعتی آب
https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/hackers-hijack-industrial-control-system-at-us-water-utility/amp/
@Engineer_Computer
https://www-securityweek-com.cdn.ampproject.org/c/s/www.securityweek.com/hackers-hijack-industrial-control-system-at-us-water-utility/amp/
@Engineer_Computer
SecurityWeek
Hackers Hijack Industrial Control System at US Water Utility
Municipal Water Authority of Aliquippa in Pennsylvania confirms that hackers took control of a booster station, but says no risk to drinking water or water supply.
رایتاپ کشف آسیب پذیری از 3G/4G/5G Industrial Cellular Routers با استفاده از Google Dork
https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf
#writeup
#CVE
#Google_Dork
#discovering_vulnerabilities
@Engineer_Computer
https://medium.com/@win3zz/inside-the-router-how-i-accessed-industrial-routers-and-reported-the-flaws-29c34213dfdf
#writeup
#CVE
#Google_Dork
#discovering_vulnerabilities
@Engineer_Computer
Medium
Inside the Router: How I Accessed Industrial Routers and Reported the Flaws
Router Vulnerability Hunt, From Google Dorks to Firmware Emulation — The Full Story
چیستی AMSI نحوه دور زدن آن و چگونگی هانت
https://mostafayahiax.medium.com/hunting-for-amsi-bypassing-methods-9886dda0bf9d
@Engineer_Computer
https://mostafayahiax.medium.com/hunting-for-amsi-bypassing-methods-9886dda0bf9d
@Engineer_Computer
Medium
Hunting for AMSI Bypassing methods
Introduction to AMSI
آیس کیوب
مورد استفاده : یافتن راهکار حمله پیچیده در زیرساخت کلاستر کوبرنتیز
**مدلسازی تهدید
در رشته امنیت اطلاعات ؛ هرشب باید بخوانی
https://labs.withsecure.com/tools/icekube--finding-complex-attack-paths-in-kubernetes-clusters
@Engineer_Computer
مورد استفاده : یافتن راهکار حمله پیچیده در زیرساخت کلاستر کوبرنتیز
**مدلسازی تهدید
در رشته امنیت اطلاعات ؛ هرشب باید بخوانی
https://labs.withsecure.com/tools/icekube--finding-complex-attack-paths-in-kubernetes-clusters
@Engineer_Computer
Withsecure
IceKube: Finding complex attack paths in Kubernetes clusters
This blog post introduces IceKube, an open-source tool that enumerates a cluster and generates a graph database of resource configurations and the relationships between different resources. IceKube can then analyse these relationships and identify potential…