مثل اینکه آسیب پذیری جدید که روی vpn fortios هست rce میخوره اگر ورژنتون آسیب پذیر هست باید vpn غیرفعال کنید.
@Engineer_Computer
@Engineer_Computer
با ده دلار و دیدن یک ویدئو در یوتیوب، رمزنگاری بیت لاکر ویندوز شکسته میشود !!!
وضعیتی شرم آور در دنیای امنیت
@Engineer_Computer
https://www-theregister-com.cdn.ampproject.org/c/s/www.theregister.com/AMP/2024/02/07/breaking_bitlocker_pi_pico/
وضعیتی شرم آور در دنیای امنیت
@Engineer_Computer
https://www-theregister-com.cdn.ampproject.org/c/s/www.theregister.com/AMP/2024/02/07/breaking_bitlocker_pi_pico/
www-theregister-com.cdn.ampproject.org
Raspberry Pi Pico cracks BitLocker in under a minute
: Windows encryption feature defeated by $10 and a YouTube tutorial
اطلاعات مشتریان جونیپر افشا شد !
@Engineer_Computer
https://krebsonsecurity.com/2024/02/juniper-support-portal-exposed-customer-device-info/
@Engineer_Computer
https://krebsonsecurity.com/2024/02/juniper-support-portal-exposed-customer-device-info/
Krebs on Security
Juniper Support Portal Exposed Customer Device Info
Until earlier this week, the support website for networking equipment vendor Juniper Networks was exposing potentially sensitive information tied to customer products, including the exact devices each customer bought, as well as each device's warranty status…
شروع ثبت نام کاندیداهای هیات مدیره سازمان امنیت اطلاعات غیر انتفاعی ISC2
@Engineer_Computer
https://www.abstractscorecard.com/cfp/submit/login.asp?eventkey=isaxlkcm
@Engineer_Computer
https://www.abstractscorecard.com/cfp/submit/login.asp?eventkey=isaxlkcm
وقتی c2 server های Empire دچار آسیب پذیری RCE میشوند!
اینجاست که هکر هک میشود.
**آسیب پذیری و PoC آن در ۱۵ فوریه منتشر میگردد. منتظر باشید
***نسخه ۵.۹.۳ ماقبل
@Engineer_Computer
https://github.com/BC-SECURITY/Empire/tree/main
اینجاست که هکر هک میشود.
**آسیب پذیری و PoC آن در ۱۵ فوریه منتشر میگردد. منتظر باشید
***نسخه ۵.۹.۳ ماقبل
@Engineer_Computer
https://github.com/BC-SECURITY/Empire/tree/main
GitHub
GitHub - BC-SECURITY/Empire: Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and…
Empire is a post-exploitation and adversary emulation framework that is used to aid Red Teams and Penetration Testers. - BC-SECURITY/Empire
مهندسي کشف با ابزارهای متن باز
@Engineer_Computer
https://medium.com/@chandrak.trivedi/detection-engineering-using-open-source-tools-threathound-and-zircolite-8b2b82651d73
@Engineer_Computer
https://medium.com/@chandrak.trivedi/detection-engineering-using-open-source-tools-threathound-and-zircolite-8b2b82651d73
Medium
Detection Engineering using Open-Source Tools — ThreatHound and Zircolite
Detection Engineering is the important part in cybersecurity since this trigger an alert that something suspicious is going on the network…
AD Offensive Attributes.pdf
1018.5 KB
خصوصیاتی در اکتیو دایرکتوری که دستکاری در آنها خطرناک است همراه با ابزارهایی نمونه برای دستکاری آن خصوصیات
@Engineer_Computer
@Engineer_Computer
Malware Playbook.pdf
642.1 KB
پلی بوک مدیریت حادثه بدافزار
@Engineer_Computer
@Engineer_Computer
#رایتاپ جامع و عالی در مورد نحوه ایجاد یک منبع #recon برای باگ بانتی با استفاده از Flask،MongoDB، REST Api و ChatGPT
#PartOne
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-one-77ec3fd3b914
#PartTwo
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-two-468405eb3520
#PartThree
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-three-cee1633de873
#WriteUp
#Recon
#BugBountyTips
@Engineer_Computer
#PartOne
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-one-77ec3fd3b914
#PartTwo
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-two-468405eb3520
#PartThree
https://medium.com/@aliraah/creating-a-recon-database-with-flask-mongodb-rest-api-and-chatgpt-part-three-cee1633de873
#WriteUp
#Recon
#BugBountyTips
@Engineer_Computer
Medium
Creating a recon database with Flask, MongoDB, REST Api and ChatGPT — Part One
Hellow world!
👍1
در کانادا فلیپر زیرو به دلیل اینکه ممکنه در سرقت ماشین استفاده بشه ممنوع میشه
https://www.canada.ca/en/public-safety-canada/news/2024/02/government-of-canada-hosts-national-summit-on-combatting-auto-theft.html
@Engineer_Computer
https://www.canada.ca/en/public-safety-canada/news/2024/02/government-of-canada-hosts-national-summit-on-combatting-auto-theft.html
@Engineer_Computer
www.canada.ca
Government of Canada hosts National Summit on Combatting Auto Theft - Canada.ca
Auto theft is impacting thousands of Canadian households every year, particularly in our urban centres.
Commercial spyware companies are behind most zero-day exploits - discovered by Google
Blog: https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/
PDF: https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Buying_Spying_-_Insights_into_Commercial_Surveillance_Vendors_-_TAG_report.pdf
@Engineer_Computer
Blog: https://blog.google/threat-analysis-group/commercial-surveillance-vendors-google-tag-report/
PDF: https://storage.googleapis.com/gweb-uniblog-publish-prod/documents/Buying_Spying_-_Insights_into_Commercial_Surveillance_Vendors_-_TAG_report.pdf
@Engineer_Computer
Google
Buying Spying: How the commercial surveillance industry works and what can be done about it
The latest report from Threat Analysis Group documents the rise of commercial surveillance vendors and the industry that threatens free speech, the free press and the op…
GitHub - xnl-h4ck3r/waymore: Find way more from the Wayback Machine!
https://github.com/xnl-h4ck3r/waymore
@Engineer_Computer
https://github.com/xnl-h4ck3r/waymore
@Engineer_Computer
GitHub
GitHub - xnl-h4ck3r/waymore: Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence…
Find way more from the Wayback Machine, Common Crawl, Alien Vault OTX, URLScan, VirusTotal & Intelligence X! - xnl-h4ck3r/waymore
239 - Public Private Android Keys and Docker Escapes
https://dayzerosec.com/podcast/239.html
@Engineer_Computer
https://dayzerosec.com/podcast/239.html
@Engineer_Computer
dayzerosec
Public Private Android Keys and Docker Escapes
This week we have a crazy crypto fail where some Android devices had updates signed by publicly available private keys, as well as some Docker container escapes.
Reverse engineering of Android Phoenix RAT
Analysis: https://cryptax.medium.com/reverse-engineering-of-android-phoenix-b59693c03bd3
Phoenix overview: https://cryptax.medium.com/android-phoenix-authors-claims-sample-identification-and-trends-f199cbc9901d
@Engineer_Computer
Analysis: https://cryptax.medium.com/reverse-engineering-of-android-phoenix-b59693c03bd3
Phoenix overview: https://cryptax.medium.com/android-phoenix-authors-claims-sample-identification-and-trends-f199cbc9901d
@Engineer_Computer
Medium
Reverse engineering of Android/Phoenix
Android/Phoenix is a malicious Remote Access Tool. Its main goal is to extensively spy on the victim’s phone (grab all screenshots, steal…
JSON Smuggling: A far-fetched intrusion detection evasion technique
https://grimminck.medium.com/json-smuggling-a-far-fetched-intrusion-detection-evasion-technique-51ed8f5ee05f
@Engineer_Computer
https://grimminck.medium.com/json-smuggling-a-far-fetched-intrusion-detection-evasion-technique-51ed8f5ee05f
@Engineer_Computer
Medium
JSON Smuggling: A far-fetched intrusion detection evasion technique
TL:DR Insignificant whitespaces in the JSON standard can be used to encode data without breaking the format. This could aid malicious…
Zero-Day (via CVE-2023-45866): Exploiting Zero-click Android Bluetooth vulnerability to inject keystrokes without pairing.
https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/
@Engineer_Computer
https://www.mobile-hacker.com/2024/01/23/exploiting-0-click-android-bluetooth-vulnerability-to-inject-keystrokes-without-pairing/
@Engineer_Computer
Mobile Hacker
Exploiting 0-click Android Bluetooth vulnerability to inject keystrokes without pairing Mobile Hacker
[update 2024-02-19] This vulnerability can be even used to remotely wipe data of targeted Android smartphone. Using this vulnerability it is possible to guess user lock screen PIN. After five incorrect PINs device is locked out for 30 seconds. This operation…
Bypassing Wi-Fi Encryption by Manipulating Transmit Queues.
https://www.usenix.org/system/files/usenixsecurity23-schepers.pdf
@Engineer_Computer
https://www.usenix.org/system/files/usenixsecurity23-schepers.pdf
@Engineer_Computer
آخرین قربانی حملات SQL Injection و XSS
https://www.bleepingcomputer.com/news/security/hackers-steal-data-of-2-million-in-sql-injection-xss-attacks/
@Engineer_Computer
https://www.bleepingcomputer.com/news/security/hackers-steal-data-of-2-million-in-sql-injection-xss-attacks/
@Engineer_Computer
BleepingComputer
Hackers steal data of 2 million in SQL injection, XSS attacks
A threat group named 'ResumeLooters' has stolen the personal data of over two million job seekers after compromising 65 legitimate job listing and retail sites using SQL injection and cross-site noscripting (XSS) attacks.