دارک وب ؛
چرایی و چیستی
انجام تحقیقات اخلاق گرایانه
https://cybersecurity.att.com/blogs/security-essentials/unveiling-the-dark-web-a-professionals-guide-to-ethical-exploration
@Engineer_Computer
چرایی و چیستی
انجام تحقیقات اخلاق گرایانه
https://cybersecurity.att.com/blogs/security-essentials/unveiling-the-dark-web-a-professionals-guide-to-ethical-exploration
@Engineer_Computer
LevelBlue
Unveiling the dark web: A professional's guide to ethical…
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information provided by the author in this article. The dark web, often shrouded in mystery and intrigue, is a realm…
This media is not supported in your browser
VIEW IN TELEGRAM
Tips & Tricks: Windows Event Log Threat Hunting with Chainsaw (No Audio)
@Engineer_Computer
@Engineer_Computer
اکتیو دایرکتوری برای مبتدیان در امنیت
https://en.hacks.gr/2023/12/21/basics-of-active-directory/
@Engineer_Computer
https://en.hacks.gr/2023/12/21/basics-of-active-directory/
@Engineer_Computer
اقداماتی جدید منتسب به گروه هکری ایرانی
Iranian Hackers Targeting US Defense Industrial Base Entities With New Backdoor
www.securityweek.com/iranian-hackers-targeting-us-defense-industrial-base-entities-with-new-backdoor/amp/
@Engineer_Computer
Iranian Hackers Targeting US Defense Industrial Base Entities With New Backdoor
www.securityweek.com/iranian-hackers-targeting-us-defense-industrial-base-entities-with-new-backdoor/amp/
@Engineer_Computer
SecurityWeek
Iranian Hackers Targeting US Defense Industrial Base Entities With New Backdoor
Microsoft has observed Iranian state-sponsored hackers targeting employees at US DIB entities with the FalseFont backdoor.
گوگل پسورد های ذخیره شده در مرور گر را میپاید و درخصوص مشکلات آنها اخطار میدهد!!
https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/google/google-chrome-adds-background-scans-for-compromised-passwords/amp/
@Engineer_Computer
https://www-bleepingcomputer-com.cdn.ampproject.org/c/s/www.bleepingcomputer.com/news/google/google-chrome-adds-background-scans-for-compromised-passwords/amp/
@Engineer_Computer
www-bleepingcomputer-com.cdn.ampproject.org
Google Chrome now scans for compromised passwords in the background
Google says the Chrome Safety Check feature will work in the background to check if passwords saved in the web browser have been compromised.
میز خدمت (help desk) را درسازمان دریابید .
یکی از نقاط ورود به سازمان این بخش میتواند باشد .
https://www.darkreading.com/cyberattacks-data-breaches/8-strategies-defending-against-help-desk-attacks
@Engineer_Computer
یکی از نقاط ورود به سازمان این بخش میتواند باشد .
https://www.darkreading.com/cyberattacks-data-breaches/8-strategies-defending-against-help-desk-attacks
@Engineer_Computer
Darkreading
8 Strategies for Defending Against Help Desk Attacks
The help desk is under siege from AI-based and other attacks. Next-gen tactics call for in-depth cyber-defense strategies.
⭕️ برای خودکار کردن فرایند DLL Sideloading ابزاری توسعه داده شده که از تکنیک های مختلفی استفاده میکند.
از جمله تکنیک ها و ویژگی های استفاده شده در این ابزار میتوان مثال زد:
#RedTeam #Evasion
@Engineer_Computer
از جمله تکنیک ها و ویژگی های استفاده شده در این ابزار میتوان مثال زد:
Reformatted Structure
Polymorphic Code Integration
SysWhispers 3 Integration
AES Encryption
Early Bird Injection
Module Stomping
#RedTeam #Evasion
@Engineer_Computer
GitHub
GitHub - georgesotiriadis/Chimera: Automated DLL Sideloading Tool With EDR Evasion Capabilities
Automated DLL Sideloading Tool With EDR Evasion Capabilities - georgesotiriadis/Chimera
⭕️شرکت امنیتی روسیه ای به نام #Positive_technologies هک شده و دیتای نرم افزارهای امنیت شرکت در فروم XSS به اشتراک گذاشته شد.
معروف ترین نرم افزار این شرکت همون سندباکس معروف بود که داشتن ، اینم توسط هکرها به اشتراک گذاشته شد.
#Positive_technologies
#Russia
@Engineer_Computer
معروف ترین نرم افزار این شرکت همون سندباکس معروف بود که داشتن ، اینم توسط هکرها به اشتراک گذاشته شد.
#Positive_technologies
#Russia
@Engineer_Computer
The CISO’s Guide to Your First 100 Days.pdf
303.4 KB
۱۰۰روز اول مدیر ارشد امنیت سایبری
@Engineer_Computer
@Engineer_Computer
این رایتاپ درباره روشهای تست Web Cache Vulnerabilities است.
نویسنده ابتدا روش کلی خود را در تست Web Cache Vulnerabilities شرح میدهد و سپس مثالهای واقعی از آسیبپذیریهایی که پیدا کرده را ذکر میکند.
نکته جالب اینکه او از ابزارهای خودکار برای پیدا کردن این آسیبپذیریها استفاده نمیکند.
🌐 https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
#WebCacheVulnerability
#WebCacheDeception
#Methodology
#Writeup
@Engineer_Computer
نویسنده ابتدا روش کلی خود را در تست Web Cache Vulnerabilities شرح میدهد و سپس مثالهای واقعی از آسیبپذیریهایی که پیدا کرده را ذکر میکند.
نکته جالب اینکه او از ابزارهای خودکار برای پیدا کردن این آسیبپذیریها استفاده نمیکند.
🌐 https://bxmbn.medium.com/how-i-test-for-web-cache-vulnerabilities-tips-and-tricks-9b138da08ff9
#WebCacheVulnerability
#WebCacheDeception
#Methodology
#Writeup
@Engineer_Computer
Medium
How I Test For Web Cache Vulnerabilities + Tips And Tricks
@bxmbn
#فرصت_همکاری کارشناس امنیت در آزمایشگاه آزمون و ارزیابی تجهیزات شبکه و امنیت
ارسال رزومه:
jobs@netel.org
@Engineer_Computer
ارسال رزومه:
jobs@netel.org
@Engineer_Computer
تحلیلی بر نحوه حمله سایبری به جایگاه سوخت ایران
https://medium.com/@aryanchehreghani/analysis-of-cyber-attack-on-iran-fuel-stations-part-i-afd01a1b4876
#CyberAttack
#IranFuelStations
@Engineer_Computer
https://medium.com/@aryanchehreghani/analysis-of-cyber-attack-on-iran-fuel-stations-part-i-afd01a1b4876
#CyberAttack
#IranFuelStations
@Engineer_Computer
Medium
Analysis of cyber attack on Iran fuel stations (Part I)
Hello dear friends and followers of the APT IRAN Research Center on Telegram. First of all, I would like to thank my friends for their…
R-ES_State of the CIO_2023_NEWCIO.pdf
1 MB
State of the CIO 2023 sample slides
This year’s global study highlights the CIO’s increasing involvement with cybersecurity, as well as their initiatives to increase operational efficiency
State of the CIO 2023 sample slides
This year’s global study highlights the CIO’s increasing involvement with cybersecurity, as well as their initiatives to increase operational efficiency.
Security Priorities Study 2022 white paper
This white paper provides insight into the various security projects that organizations are currently focused on and will be prioritizing in the coming year so you can best build out your marketing plans.
https://resources.foundryco.com
@Engineer_Computer
This year’s global study highlights the CIO’s increasing involvement with cybersecurity, as well as their initiatives to increase operational efficiency
State of the CIO 2023 sample slides
This year’s global study highlights the CIO’s increasing involvement with cybersecurity, as well as their initiatives to increase operational efficiency.
Security Priorities Study 2022 white paper
This white paper provides insight into the various security projects that organizations are currently focused on and will be prioritizing in the coming year so you can best build out your marketing plans.
https://resources.foundryco.com
@Engineer_Computer
گفتار هاب یک هکر کلاه سفید از ۸ آسیب پذیری که پیدا و ثبت کرده است
https://m.youtube.com/watch?si=NKInsVokCAZhKx84&v=2VB4Zd5C8N8&feature=youtu.be
@Engineer_Computer
https://m.youtube.com/watch?si=NKInsVokCAZhKx84&v=2VB4Zd5C8N8&feature=youtu.be
@Engineer_Computer
YouTube
I Found 8 CVEs in 2 Weeks (And You Can Too!)
📚 Resources:
Enroll in my Courses (search for Tyler Ramsbey)
🔗 https://academy.simplycyber.io
Support me on Ko-Fi
🔗 https://ko-fi.com/tylerramsbey
Join Hack Smarter
🔗 https://hacksmarter.org/ Join the Hack Smarter community: https://hacksmarter.org
---…
Enroll in my Courses (search for Tyler Ramsbey)
🔗 https://academy.simplycyber.io
Support me on Ko-Fi
🔗 https://ko-fi.com/tylerramsbey
Join Hack Smarter
🔗 https://hacksmarter.org/ Join the Hack Smarter community: https://hacksmarter.org
---…
زنجیره ای از آسیب پذیریها برای هک آیفون
https://thehackernews.com/2023/12/most-sophisticated-iphone-hack-ever.html
@Engineer_Computer
https://thehackernews.com/2023/12/most-sophisticated-iphone-hack-ever.html
@Engineer_Computer
کشف کی لاگر ؛ در لینوکس
https://wazuh.com/blog/detecting-keyloggers-on-linux-endpoints/
@Engineer_Computer
https://wazuh.com/blog/detecting-keyloggers-on-linux-endpoints/
@Engineer_Computer
Wazuh
Detecting keyloggers (T1056.001) on Linux endpoints | Wazuh
This blog post focuses on detecting Indicators of Compromise (IoC) for keyloggers that utilize living-off-the-land (LOTL) techniques.
بررسی یک سناریوی نفوذ
سطح : متوسط
https://medium.com/@thismanera/indicators-blue-team-labs-investigations-9b89876979ca
@Engineer_Computer
سطح : متوسط
https://medium.com/@thismanera/indicators-blue-team-labs-investigations-9b89876979ca
@Engineer_Computer
نهفقط ویدئو؛
هر فایلی را من بعد در یوتیوب ذخیره کنید !!
https://github.com/DvorakDwarf/Infinite-Storage-Glitch
@Engineer_Computer
هر فایلی را من بعد در یوتیوب ذخیره کنید !!
https://github.com/DvorakDwarf/Infinite-Storage-Glitch
@Engineer_Computer