Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
CrowdStrike (BSOD) Case study _Technically, What Happened_.pdf
125.5 KB
اگه سرت درد میکنه اصل قضیه مشکلات سایبری این روزهای دنیا رو بدونی این فایل رو بخون

#crowdstrike
@Engineer_Computer
#استخدام
#هلپ_دسک
بندر جاسک هرمزگان
به همراه مکان استقرار و ...
حقوق ۲۵ تا حدود ۴۰
رزومه بفرستید به ایدی زیر

@Developer_network

@Engineer_Computer
1
اسپلانک نسخه 9.3 اومد.

برای رهایی از برخی باگ ها خیلی خوبه که استفاده اش کنین .
@Engineer_Computer
DHCP Starvation.pdf
2.4 MB
سناریوی عملی برای حمله علیه DHCP
@Engineer_Computer
https://www.remoto.ch/

دوستانی که علاقه به کار ریموت در #سوئیس دارند
میتونن ازین سایت اقدام کنن
مخصوصا افرادی که وب کار می‌کنند ‌....
@Engineer_Computer
2👍1
SOC Analyst Basics - Linux Log Files.pdf
14.7 MB
مروری کوتاه بر لاگهای لینوکس

@Engineer_Computer
👏1
SOC Concepts & Questions .pdf
1.1 MB
خلاصه ای از دست نوشته ها از مفاهیم SOC
@Engineer_Computer
BCP & DRP Template .pdf
306.4 KB
good template for BCP & DRP
پیشنهاد برای آموزش دوره های ISMS و BCP
@Engineer_Computer
سرتیفیکیت بیش از ۸۳ هزار دامین چرا باطل می‌شود؟

https://thehackernews.com/2024/07/digicert-to-revoke-83000-ssl.html

@Engineer_Computer
⭕️ قابل توجه کاربران ایرانی که از سرویس دهنده Aeza بدلیل ارزون بودن استفاده هایی مثل راه اندازی VPN میکنند .
گزارش فعالیت های هکرهای روسیه در اروپا نشون میده که در جهت گسترش منافع روسیه بحثهایی که شکل گرفته نشون میده از اسم شرکت Aeza به عنوان یکی از اهرم های اصلی تهیه زیرساخت های هکرهای روس نام برده شده است.
سرویس دهنده ای که بین کاربران ایرانی خیلی پرطرفدار است.
باید مراقب و آگاهی نسبت به ریسک های استفاده از سرورهای این سرویس دهنده رو داشته باشید.
https://correctiv.org/en/fact-checking-en/2024/07/22/inside-doppelganger-how-russia-uses-eu-companies-for-its-propaganda/

#Aeza #VPN #ru
@Engineer_Computer
از chatGPT بهینه استفاده کنیم

مثال : سوال

As a forensic expert , Explain system call

جواب :

A system call is an essential mechanism that allows user-level processes to request services from the operating system's kernel. These services can include tasks like accessing hardware, managing files, allocating memory, or creating and managing processes. Here’s a detailed breakdown of system calls from a forensic expert's perspective:

### Basic Concept

1. Definition: A system call is a controlled entry point that allows a program to request a service from the operating system's kernel.
2. Purpose: It provides an interface between user-space applications and the kernel, enabling them to perform operations that require higher privileges.

### Categories of System Calls

System calls can be broadly categorized based on their functionality:

1. Process Control: Creating and managing processes (e.g., fork(), exec(), wait(), exit()).
2. File Management: Handling files and directories (e.g., open(), read(), write(), close(), unlink()).
3. Device Management: Interacting with hardware devices (e.g., ioctl(), read(), write()).
4. Information Maintenance: Gathering and setting system information (e.g., getpid(), alarm(), sleep()).
5. Communication: Facilitating inter-process communication (e.g., pipe(), shmget(), msgsnd(), recv()).

### System Call Lifecycle

1. Invocation: A system call is typically invoked by a user-level process through a library function (e.g., the C standard library).
2. Transition to Kernel Mode: The CPU switches from user mode to kernel mode to execute the system call. This transition is often triggered by a software interrupt or trap.
3. Kernel Execution: The kernel executes the requested service using its internal resources and privileged instructions.
4. Return to User Mode: The results of the system call are returned to the user process, and the CPU switches back to user mode.

### Forensic Relevance

From a forensic perspective, understanding system calls is crucial for several reasons:

1. Activity Monitoring: System calls provide insights into what a process is doing. By monitoring system calls, forensic experts can track file access, process creation, and other critical activities.
2. Malware Analysis: Malicious software often relies on system calls to perform its actions. By analyzing the sequence of system calls, experts can understand the behavior of malware.
3. Incident Response: During an incident, system call logs can help reconstruct the events leading up to the security breach.
4. Digital Evidence: System call traces can serve as digital evidence in investigations, revealing unauthorized access or data manipulation.

### Tools and Techniques

1. Strace: A widely used tool in Unix-like systems to trace system calls made by a process.
2. Auditd: The Linux Auditing System, which can log system calls for security monitoring and compliance purposes.
3. Sysmon: A Windows system service that logs system calls and other system events for detailed monitoring.

### Example

Here’s a simple example of how a system call works:

#include <unistd.h>
#include <stdio.h>

int main() {
char buffer[128];
int bytesRead;

// System call: read from standard input (file denoscriptor 0)
bytesRead = read(0, buffer, 128);

// System call: write to standard output (file denoscriptor 1)
write(1, buffer, bytesRead);

return 0;
}

In this C program:
- The read() system call reads data from the standard input.
- The write() system call writes data to the standard output.

By understanding and analyzing such system calls, forensic experts can gain insights into the actions performed by processes on a system.

@Engineer_Computer
🔥1