Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
معماران امنیت بخوانند

@Engineer_Computer
Threat Modeling is critical to achieving design goals for system security and data privacy.

This document provides a catalog of capabilities to help you cultivate value from your Threat Modeling practice.

https://www.threatmodelingmanifesto.org/capabilities/
Audio
شاد بمانید
با هانت قوی شاد بمانید 🥇
@Engineer_Computer
Secure Coding Guidelines for Application Development.pdf
394 KB
راهنمایی های کلی برای کد نویسی امن
@Engineer_Computer
🔥2
CVE-2024-20674
Windows Kerberos Security Feature Bypass Vulnerability

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-20674

https://nvd.nist.gov/vuln/detail/CVE-2024-20674

سیستم عامل های آسیب پذیر:
Windows Server 2012 R2 (Server Core installation)
Windows Server 2012 R2
Windows Server 2012 (Server Core installation)
Windows Server 2012
Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation)
Windows Server 2008 R2 for x64-based Systems Service Pack 1
Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for x64-based Systems Service Pack 2
Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation)
Windows Server 2008 for 32-bit Systems Service Pack 2
Windows Server 2016 (Server Core installation)
Windows Server 2016
Windows 10 Version 1607 for x64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows 10 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2022, 23H2 Edition (Server Core installation)
Windows 11 Version 23H2 for x64-based Systems
Windows 11 Version 23H2 for ARM64-based Systems
Windows 10 Version 22H2 for 32-bit Systems
Windows 10 Version 22H2 for ARM64-based Systems
Windows 10 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for x64-based Systems
Windows 11 Version 22H2 for ARM64-based Systems
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 21H2 for 32-bit Systems
Windows 11 version 21H2 for ARM64-based Systems
Windows 11 version 21H2 for x64-based Systems
Windows Server 2022 (Server Core installation)
Windows Server 2022
Windows Server 2019 (Server Core installation)
Windows Server 2019
Windows 10 Version 1809 for ARM64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems

@Engineer_Computer
شرکتهای پیشرو در حوزه نرم افزاری IoT در دنیا
@Engineer_Computer
👍4
IT Engineer with UAE experience.

The ideal candidate will possess the following skills and knowledge:

Key Requirements:
Helpdesk experience
Network expertise (switching, Firewall)
Active Directory proficiency
MS Azure knowledge
Clouding knowledge

Candidates with a valid driving license will be given more preference.

if you meet the above criteria please send your updated resume with your notice period, expected salary, and subject as IT Engineer to HR@dxcontracting.ae

@Engineer_Computer
I have published 'tRPC Security Research: Hunting for Vulnerabilities in Modern APIs'. In this write-up, I examine tRPC and discuss methods for conducting reconnaissance to identify and uncover vulnerabilities within this API style.

https://medium.com/@LogicalHunter/trpc-security-research-hunting-for-vulnerabilities-in-modern-apis-b0d38e06fa71

@Engineer_Computer
🔥1
هشدار شرکت Juniper درخصوص کشف آسیب پذیری بحرانی محصولات این شرکت
🔴شرکت Juniper اقدام به ارائه به‌روزرسانی‌های امنیتی فوری و مهمی کرده است تا یک آسیب‌پذیری مهم اجرای کد از راه دور (RCE) را در فایروالهای سری SRX و سوئیچ‌های سری EX خود رفع کند.
🔴این آسیب‌پذیری که در رابط‌های پیکربندی J-Web دستگاه‌ها یافت شده و با شناسه CVE-2024-21591 شناخته می‌شود، درصورتیکه Exploit شود میتواند دسترسی Root را در اختیار هکرها قرار دهد.
🔴نسخه های آسیب پذیر عبارتند از:
🟡Junos OS versions earlier than 20.4R3-S9
🟡Junos OS 21.2 versions earlier than 21.2R3-S7
🟡Junos OS 21.3 versions earlier than 21.3R3-S5
🟡Junos OS 21.4 versions earlier than 21.4R3-S5
🟡Junos OS 22.1 versions earlier than 22.1R3-S4
🟡Junos OS 22.2 versions earlier than 22.2R3-S3
🟡Junos OS 22.3 versions earlier than 22.3R3-S2
🟡Junos OS 22.4 versions earlier than 22.4R2-S2, 22.4R3
🟡The bug has been addressed in Junos OS 20.4R3-S9, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S3, 22.3R3-S2, 22.4R2-S2, 22.4R3, 23.2R1-S1, 23.2R2, 23.4R1, and all subsequent releases.
🔴به Adminها توصیه شده که فورا نسبت به ارتقا به آخرین نسخه اقدام کرده و یا J-Web interface را غیرفعال کنند.

@Engineer_Computer
Black Hat USA 2023 | Briefings Schedule
Link : https://www.blackhat.com/us-23/briefings/schedule/

@Engineer_Computer