Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
کشف وب شل

برای کشف وب شل لازم است از خود IIS کمک بگیرید و تنظیماتی را برای لاگ گیری انجام دهید

در مقاله زیر مایکروسافت نگاهی تقریبا جامع به حوزه وب شل و IIS انداخته است


@Engineer_Computer

** اگراز بهترین SIEM ها هم استفاده کنید و برترین تجهیزات امنیتی را داشته باشید اما سرویس خودتان را نشناخته باشید و نسبت به فعالیت آن کور باشید فضا را به هکر باخته اید .

https://www.microsoft.com/en-us/security/blog/2022/12/12/iis-modules-the-evolution-of-web-shells-and-how-to-detect-them/
Identifying and Mitigating Living Off the Land Technique.pdf
2.4 MB
مقاله ۴۶ صفحه ای CISA و NSA و هفت سازمان دیگر در مورد تکنیک‌های هکری مبتنی بر ابزارهای سیستم عامل

منتشر شده در فوریه ۲۰۲۴

مقاله ای که هر متخصص سطح ۲ در مرکز عملیات باید آنرا بخواند .

در این مقاله به اهمیت موارد زیر پی میبریم:

لاگ گیری با جزئیات
کشف و ضبط یک بیس لاین از سامانه ها و شبکه
انجام هاردنینگ
اتوماتیک کردن مانیتورینگ
@Engineer_Computer
⭕️ پروژه ای توسعه داده شده که سمپل یک Rootkit برای استفاده توی پروژه های ردتیم کاربرد داره.
این پروژه با ++C توسعه داده شده و قابلیت ارتباط آسان با C2 مورد نظر ما را دارد.
از ویژگی های این پروژه میتوان به موارد زیر پرداخت:

Current Features
Process hiding and unhiding
Process elevation
Process protection (anti-kill and dumping)
Bypass pe-sieve
Thread hiding and unhiding
Thread protection (anti-kill)
File protection (anti-deletion and overwriting)
Registry keys and values protection (anti-deletion and overwriting)
Registry keys and values hiding
Querying currently protected processes, threads, files, hidden ports, registry keys and values
Function patching
Built-in AMSI bypass
Built-in ETW patch
Process signature (PP/PPL) modification
Can be reflectively loaded
Shellcode Injection
APC
NtCreateThreadEx
DLL Injection
APC
NtCreateThreadEx
Querying kernel callbacks
ObCallbacks
Process and thread creation routines
Image loading routines
Registry callbacks
Removing and restoring kernel callbacks
ETWTI tampering
Module hiding
Driver hiding and unhiding
Credential Dumping
Port hiding/unhiding
Script execution
Initial operations


#RedTeam #Rootkit #Maldev
@Engineer_Computer
Indirect Dynamic Syscall, SSN + Syscall address sorting via Modified TartarusGate approach + Remote Process Injection via APC Early Bird + Spawns a sacrificial Process as target process + (ACG+BlockDll) mitigation policy on spawned process + PPID spoofing + Api resolving from TIB + API hashing
https://github.com/reveng007/DarkWidow

@Engineer_Computer
9 Best SOC Tools to Strengthen Your Security Posture

This article will explore the most effective SOC solutions to help you make well-informed cybersecurity decisions and strengthen business defenses.

@Engineer_Computer
Cybersecurity Skills Gap Rises. Impacted Businesses Urged to Attract Talent With Education and Embrace AI

This could also mean that more cybersecurity professionals are available for hire.

But do they have the skills companies need?

Among respondents to the survey, 92% reported skills gaps at their organization, a gap that includes cloud computing security.

An inability to find people with the right skills, the struggle to keep employees who have those skills, and a shrinking hiring budget are the biggest causes cited for these skills gaps.

Indeed, 54% of respondents said that the cybersecurity skills shortage situation has been getting worse in recent years.

@Engineer_Computer
Reports of Data Breach on Class Charts Platform

Class Charts is used by more than 180,000 teachers, its website states.

The company says it can “save teachers time and reduce workload with our data rich seating plans” and “improve pupil behaviour with our fast and effective behaviour management”.

@Engineer_Computer
JetBrains Warns of New TeamCity Auth Bypass Vulnerability

JetBrains strongly advises all TeamCity On-Premises users to update their servers to 2023.11.3 to eliminate the vulnerability.

Tracked as CVE-2024-23917, this critical severity flaw impacts all versions of TeamCity On-Premises from 2017.1 through 2023.11.2 and can be exploited in remote code execution (RCE) attacks that don't require user interaction.
@Engineer_Computer
OpenAI's ChatGPT Breaches Privacy Rules, Says Italian Watchdog

Italy was the first West European country to curb ChatGPT, whose rapid development has attracted attention from lawmakers and regulators.

Under the EU's General Data Protection Regulation (GDPR) introduced in 2018, any company found to have broken rules faces fines of up to 4% of its global turnover.
@Engineer_Computer
🔖Google Dorks for recon

site:*.domain.*

site:domain.*

site:*.domain.com

site:*.domain.-*.*


🔎 Top Google dorks for bugbounty : Link

#bugbounty #bugbountytips
@Engineer_Computer
New bug bounty tools are coming.
Follow me on GitHub: https://github.com/0xspidey

@Engineer_Computer
🔖Who, What, Where, When, Wordlist

A detailed guide on how to create wordlists for different #cybersecurity tasks in 30 slides from twitter.com/TomNomNom.

📚PDF : https://tomnomnom.com/talks/wwwww.pdf

Do you want to create target specific wordlist for fuzzing backup files? you can use fback

#BugBounty #BugBountyTools
@Engineer_Computer
With PPLDescribe, you can retrieve information about processes that are protected by PPL. The tool parses PS_PROTECTION, PS_PROTECTED_TYPE and PS_PROTECTED_SIGNER structures to retrieve the information
#Credential_access
https://github.com/MzHmO/PPLDescribe

@Engineer_Computer