Offensive Security – Telegram
Offensive Security
255 subscribers
91 photos
9 videos
20 files
113 links
I post what I read; I'm a low-level programmer with a focus on offensive security and redteam development.
Download Telegram
Graph-CTI-annual-report1403.pdf
16.2 MB
توصیه میکنیم حتما زمان بزارید و این گزارش رو بخونید.

"این مستند شامل بررسی دوساله حملات به زیرساخت‌های فناوری کشور از ابتدای ۱۴۰۲ تا اسفند ۱۴۰۳ است و توسط تیم CTI گراف تهیه شده است."
@graph_inc_ir

#report #iran #attack
@GoSecurity
lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad[.]onion

Lock bit5.0
Signup $500

#Raas
Linux_Device_Driver_Development_Everything_you_need_to_start_with.pdf
5.4 MB
Linux Device Driver Development

Everything you need to start with device driver
development for Linux kernel and embedded Linux
Zorin Os the best alternative to Win10-11

Kernel: Linux
Distribution of Ubuntu

https://github.com/ZorinOS
Beacon Object File (BOF) for Using the BadSuccessor Technique for Account Takeover

After Microsoft patched Yuval Gordon’s BadSuccessor privilege escalation technique, BadSuccessor returned with another blog from Yuval, briefly mentioning to the community that attackers can still abuse dMSAs to take over any object where we have a write primitive. This mention did not gather significant attention from the community, leaving an operational gap for dMSA related tooling and attention. This blog dives into why dMSA abuse is still a problem, the release of a new Beacon object file (BOF) labeled BadTakeover, plus additions to SharpSuccessor, all to show that BadSuccessor’s impact as a technique (not a vulnerability) will still hold a lasting effect.


@GoSecurity
https://github.com/logangoins/BadTakeover-BOF
https://specterops.io/blog/2025/10/20/the-near-return-of-the-king-account-takeover-using-the-badsuccessor-technique/
👍1
 هکرها برای ۷۳ آسیب‌پذیری زیرودی در مسابقه Pwn2Own ایرلند، ۱٬۰۲۴٬۷۵۰ دلار کسب کردند

مسابقه هک Pwn2Own ایرلند ۲۰۲۵ با جمع‌آوری جوایز نقدی به مبلغ ۱٬۰۲۴٬۷۵۰ دلار توسط پژوهشگران امنیتی پس از بهره‌برداری از ۷۳ آسیب‌پذیری صفر روزه به پایان رسید.

@GoSecurity
https://www.bleepingcomputer.com/news/security/hackers-earn-1-024-750-for-73-zero-days-at-pwn2own-ireland/
CVE-2022-4445
The FL3R FeelBox WordPress plugin through 8.1 does not properly sanitise and escape a parameter before using it in a SQL statement via an AJAX action available to unauthenticated users, leading to a SQL injection.

@GoSecurity