⭕️ اسم سینا خیرخواه هکر ایرانی توی مسابقات #Pwn2Own میدرخشه
https://x.com/thezdi/status/1750780912533672394?t=qcm6L12Gr9EECRjA7Gh3ew&s=35
#pwn2Own #ZDI
@Engineer_Computer
https://x.com/thezdi/status/1750780912533672394?t=qcm6L12Gr9EECRjA7Gh3ew&s=35
#pwn2Own #ZDI
@Engineer_Computer
🔥2
anyrun_reports_slides (1).pdf
18.7 MB
یکی از سندباکسهای آنلاین مورد استفاده #anyrun هست که قابلیت های خوبی داره. نمیگم به پای ویروس توتال میرسه (شخصا توتال رو ترجیح میدم و hybrid-analysis) ولی در فضای در بیابان کفش پاره نعمت است هستیم (تازه این کفشه هم سالمه!)
@Engineer_Computer
@Engineer_Computer
❤1
آشنایی با فریم ورک های امنیت سایبری
https://www.helpnetsecurity.com/2024/01/16/cybersecurity-frameworks/
@Engineer_Computer
https://www.helpnetsecurity.com/2024/01/16/cybersecurity-frameworks/
@Engineer_Computer
Help Net Security
10 cybersecurity frameworks you need to know about
This article lists the most essential cybersecurity frameworks developed to guide businesses and governments in safeguarding digital assets.
🔥1
لیست ابزارهای امنیت تهاجمی و تدافعی لینوکسی
پ.ن : تو مصاحبه ها از این ابزارها خیلی سوال میشه
@Engineer_Computer
پ.ن : تو مصاحبه ها از این ابزارها خیلی سوال میشه
@Engineer_Computer
👍3❤1
نمونه تحلیل روز
برای هانت ایده بگیرید
@Engineer_Computer
https://medium.com/maverislabs/building-a-threat-hunt-for-solarmarker-ttps-365114c0907c
@Engineer_Computer
برای هانت ایده بگیرید
@Engineer_Computer
https://medium.com/maverislabs/building-a-threat-hunt-for-solarmarker-ttps-365114c0907c
@Engineer_Computer
Medium
Building a Threat Hunt for SolarMarker TTPs
This post will cover methodology for hunting SolarMarker malware (also known as Juypter/YellowCockatoo/Polazert) given its resurgence in…
انجام تحقیقات در دارک وب
برای مبتدیان
@Engineer_Computer
https://medium.com/@TheInvestigatorBlog/a-beginners-guide-to-the-dark-web-for-investigators-be33af238c01
@Engineer_Computer
برای مبتدیان
@Engineer_Computer
https://medium.com/@TheInvestigatorBlog/a-beginners-guide-to-the-dark-web-for-investigators-be33af238c01
@Engineer_Computer
Medium
A Beginner’s Guide to the Dark Web for Investigators
A short instruction on how to find information on the Dark Web for OSINT purposes
هنگامی که گوگل حریم شخصی را به فنا میدهد
@Engineer_Computer
https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/zakdoffman/2024/01/27/new-details-free-ai-upgrade-for-google-and-samsung-android-users-leaks/amp/
@Engineer_Computer
@Engineer_Computer
https://www-forbes-com.cdn.ampproject.org/c/s/www.forbes.com/sites/zakdoffman/2024/01/27/new-details-free-ai-upgrade-for-google-and-samsung-android-users-leaks/amp/
@Engineer_Computer
Forbes
Google Update Shows How Bard AI May Work With Your Messages App
New warning as AI suddenly targets billions of private messages on smartphones…
❤1
منابعی خوب برای توسعه شخصی در حوزه امنیت
@Engineer_Computer
https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3?v=f04ea483a23b4119ad85592c6e8e961b
@Engineer_Computer
@Engineer_Computer
https://gold-marten-204.notion.site/2d292e0b941146ef858a125bf1cb0eb3?v=f04ea483a23b4119ad85592c6e8e961b
@Engineer_Computer
gold-marten-204 on Notion
Daniel Kelley: Top Cybersecurity Posts Swipe File | Notion
Contains cybersecurity-related posts that have gathered over 10,000,000 impressions in the last year.
❤1🔥1
خرید غیر قانونی اطلاعات مرور شهروندان آمریکایی اینترنت از سوی دولت آمریکا از فروشندگان داده
@Engineer_Computer
https://thehackernews.com/2024/01/nsa-admits-secretly-buying-your.html?m=1
@Engineer_Computer
https://thehackernews.com/2024/01/nsa-admits-secretly-buying-your.html?m=1
👎2❤1
دسته ای از دستورات و اسکریپت های پاورشل ؛ مورد نیاز تیم های قرمز
@Engineer_Computer
https://github.com/cyberguideme/RedTeamPowershellScripts
@Engineer_Computer
https://github.com/cyberguideme/RedTeamPowershellScripts
GitHub
GitHub - cyberguideme/RedTeamPowershellScripts: Various PowerShell noscripts that may be useful during red team exercise
Various PowerShell noscripts that may be useful during red team exercise - cyberguideme/RedTeamPowershellScripts
👍2👏1
CEHv12 Exam Preparation Sample Questions .pdf
1.5 MB
سوالاتی برای آمادگی آزمون CEH
@Engineer_Computer
@Engineer_Computer
اگر در عملیات تیم قرمز اجازه استفاده از شارپ هاوند رو نداشته باشید؛ برای جمع آوری داده ها از ابزار زیر استفاده کنید
https://posts.specterops.io/bofhound-session-integration-7b88b6f18423
@Engineer_Computer
https://posts.specterops.io/bofhound-session-integration-7b88b6f18423
@Engineer_Computer
SpecterOps
BOFHound: Session Integration - SpecterOps
In this post, we examine BOFHound-compatible BOFs and usage examples that allow an operator to take a manual and targeted approach to attack path mapping.
گزارش تحلیلی نفوذ
رمزکردن دارایی ها سه ساعت پس از نفوذ اولیه
https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
@Engineer_Computer
رمزکردن دارایی ها سه ساعت پس از نفوذ اولیه
https://thedfirreport.com/2024/01/29/buzzing-on-christmas-eve-trigona-ransomware-in-3-hours/
@Engineer_Computer
The DFIR Report
Buzzing on Christmas Eve: Trigona Ransomware in 3 Hours
Key Takeaways In late December 2022, we observed threat actors exploiting a publicly exposed Remote Desktop Protocol (RDP) host, leading to data exfiltration and the deployment of Trigona ransomwar…
⭕️ ابزاری توسعه داده شده که Microsoft Graph API را اصطلاحا c2 کرده و با استفاده از ارتباط سامانه sharepoint با Microsoft Graph API ارتباطات HTTPS beaconing که با استفاده از C2 معروف Coblat Strike ایجاد شده برقرار میکند.
از ویژگی های این ابزار میتوان موارد زیر را مثال زد:
#RedTeam #C2
@Engineer_Computer
از ویژگی های این ابزار میتوان موارد زیر را مثال زد:
GraphStrike supports almost all normal Cobalt Strike activities to include:
Use of Proxychains through a Cobalt Strike SOCKS proxy (though it is very slow...)
Upload/Download of large files
BOFs, execute-assembly, etc.
This also includes GraphStrike integration of the sleep, exit, and remove commands to match GraphStrike Server sleep times with Beacon as well as delete files in SharePoint when a Beacon is exited or removed.
GraphStrike additionally incorporates all of the features and functionality of the original AceLdr, with some additional API's made to utilize call stack spoofing as well.
#RedTeam #C2
@Engineer_Computer
GitHub
GitHub - RedSiege/GraphStrike: Cobalt Strike HTTPS beaconing over Microsoft Graph API
Cobalt Strike HTTPS beaconing over Microsoft Graph API - GitHub - RedSiege/GraphStrike: Cobalt Strike HTTPS beaconing over Microsoft Graph API