Media is too big
VIEW IN TELEGRAM
Linux File System Structure Explained From Root (/) to /usr
Topics covered in this video include:
1. What the root directory (
2. The role of essential folders like
3. The importance of the
4. How user-specific files and personal data are organized inside
5. Why
6. The purpose of
7. A detailed look at
8. What lives inside
9. Why
10. How all these directories interact to create a stable, flexible, and secure Linux environment
@GoSecurity
#Linux #FHS #FileSystem #root
Topics covered in this video include:
1. What the root directory (
/) is and how the Linux filesystem tree is structured2. The role of essential folders like
/bin and /sbin for core system commands3. The importance of the
/etc directory for configuration and system settings4. How user-specific files and personal data are organized inside
/home5. Why
/var stores logs, databases, caches, and other changing system data6. The purpose of
/tmp for temporary files and safe-to-delete data7. A detailed look at
/usr, one of the largest and most important directories in Linux8. What lives inside
/dev and how Linux represents hardware as files9. Why
/boot is required for the system to start properly10. How all these directories interact to create a stable, flexible, and secure Linux environment
@GoSecurity
#Linux #FHS #FileSystem #root
❤2
This cve addresses a vulnerability in sudo versions 1.9.14 to 1.9.17, enabling unauthorized local privilege escalation to root access.
https://github.com/Nowafen/CVE-2025-32463
@GoSecurity
#CVE #LPE #Linux #exploit
https://github.com/Nowafen/CVE-2025-32463
@GoSecurity
#CVE #LPE #Linux #exploit
👾2
Forwarded from 1N73LL1G3NC3
Synology BeeStation RCE & A Novel SQLite Injection RCE Technique (CVE-2024-50629~50631)
This chain is a compelling case study of how chaining seemingly low-severity primitives can bridge the gap to full system compromise. A CRLF injection reads limited file, a conditional auth bypass, and a post-auth SQL injection—while individually limited, they become critical when chained together.
Exploit: https://github.com/kiddo-pwn/CVE-2024-50629_50631
AFFECTED PRODUCTS:
BeeStation BST150-4T
Tweet: https://x.com/kiddo_pwn/status/1995435316304588881?s=46
Search Query: service: “synology” tag: “NAS” noscript: DiskStation
This chain is a compelling case study of how chaining seemingly low-severity primitives can bridge the gap to full system compromise. A CRLF injection reads limited file, a conditional auth bypass, and a post-auth SQL injection—while individually limited, they become critical when chained together.
• CVE-2024-50629: Synology BeeStation BST150-4T CRLF Injection Information Disclosure Vulnerability
• CVE-2024-50631: This
vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Synology BeeStation BST150-4T devices. Authentication is required to exploit this vulnerability.
Exploit: https://github.com/kiddo-pwn/CVE-2024-50629_50631
AFFECTED PRODUCTS:
BeeStation BST150-4T
Tweet: https://x.com/kiddo_pwn/status/1995435316304588881?s=46
Search Query: service: “synology” tag: “NAS” noscript: DiskStation
‼️Smartphones worldwide were silently infected with Israeli malware via malicious ads
Simply viewing their ads was enough to get infected.
Surveillance company Intellexa gained full access to cameras, microphones, chat apps, emails, GPS locations, photos, files, and browsing activity.
@GoSecurity
#israel #malware
Simply viewing their ads was enough to get infected.
Surveillance company Intellexa gained full access to cameras, microphones, chat apps, emails, GPS locations, photos, files, and browsing activity.
@GoSecurity
#israel #malware
Forwarded from Ai000 Cybernetics QLab
وقتی فکر میکنم که یک نفر در سال 2009 نشسته و کل سورسکد glibc را خطبهخط تحلیل کرده تا نهایتاً به تکنیک Prime برسد، واقعاً mind‑blowing است. اینکه بتوانی از دل پیادهسازی داخلی allocator، یک miscalculation در fastbin_index را شناسایی کنی و نشان بدهی چگونه یک heap overflow کاملاً معمولی میتواند به کنترل کامل ساختار malloc_state منجر شود و مسیر را برای یک arbitrary write تضمینی باز کند… این سطح دقت و توانایی dissect کردن allocator واقعاً یک ذهن فوقالعاده تیز میخواهد. بعد طرف داخل اسپلانک یک رول مینویسد که دو نوع مقدار را با هم مقایسه کند، فکر میکند ارباب حلقهها شده است.
@aioooir | #hell
@aioooir | #hell
🔥2
Age of Programming Languages
Swift (11 years old) (2014)
Kotlin (13 years old) (2011)
Rust (14 years old) (2010)
Go (15 years old) (2009)
TypeScript (12 years old) (2012)
C# (24 years old) (2000)
Ruby (29 years old) (1995)
Java (29 years old) (1995)
JavaScript (29 years old) (1995)
PHP (30 years old) (1994)
Python (34 years old) (1991)
Perl (37 years old) (1987)
C++ (39 years old) (1985)
Objective-C (40 years old) (1984)
Prolog (52 years old) (1972)
Smalltalk (52 years old) (1972)
C (52 years old) (1972)
Pascal (54 years old) (1970)
BASIC (60 years old) (1964)
COBOL (65 years old) (1959)
Lisp (66 years old) (1958)
Fortran (67 years old) (1957)
Assembly (76 years old) (1949)
@GoSecurity
#programming
Swift (11 years old) (2014)
Kotlin (13 years old) (2011)
Rust (14 years old) (2010)
Go (15 years old) (2009)
TypeScript (12 years old) (2012)
C# (24 years old) (2000)
Ruby (29 years old) (1995)
Java (29 years old) (1995)
JavaScript (29 years old) (1995)
PHP (30 years old) (1994)
Python (34 years old) (1991)
Perl (37 years old) (1987)
C++ (39 years old) (1985)
Objective-C (40 years old) (1984)
Prolog (52 years old) (1972)
Smalltalk (52 years old) (1972)
C (52 years old) (1972)
Pascal (54 years old) (1970)
BASIC (60 years old) (1964)
COBOL (65 years old) (1959)
Lisp (66 years old) (1958)
Fortran (67 years old) (1957)
Assembly (76 years old) (1949)
@GoSecurity
#programming
🗿2
Linux Malware Sample Archive including various types of malicious ELF binaries and viruses. Be careful!
https://github.com/MalwareSamples/Linux-Malware-Samples
@GoSecurity
#Linux #malware
https://github.com/MalwareSamples/Linux-Malware-Samples
@GoSecurity
#Linux #malware
👾2
Forwarded from Sec Note
LazyHook is a stealthy API hooking framework that bypasses Host Intrusion Prevention Systems (HIPS) through call stack spoofing. By leveraging CPU-level hardware breakpoints and Vectored Exception Handling, it executes arbitrary code as if it originated from trusted, Microsoft-signed modules—completely fooling behavioral analysis engines that rely on call stack inspection and module origin verification.
#callstackspoofing #edr
Evade behavioral analysis by executing malicious code within trusted Microsoft call stacks
Uses hardware breakpoints + VEH to hijack legitimate functions and spoof module origins
│ 1. Target Function Call
│ ↓
│ 2. CPU Debug Register Triggers (DR0-DR3) │
│ ↓
│ 3. EXCEPTION_SINGLE_STEP Raised │
│ ↓
│ 4. VEH Handler Intercepts Exception │
│ ↓
│ 5. Execution Redirected to Hook Function │
│ ↓
│ 6. CallOriginal() Temporarily Disables Breakpoint
│ ↓
│ 7. Original Function Executes │
│ ↓
│ 8. Breakpoint Re-enabled
#callstackspoofing #edr
منطق دودویی (Binary Logic)
ایدهی صفر و یک در اصل از منطق ارسطویی گرفته شده که بر پایهی دوگانگی «درست/نادرست» (True/False) بنا شده است.
بعدها جورج بول (George Boole) در قرن ۱۹ آن را به یک نظام ریاضی تبدیل کرد:
• ۱ = درست
• ۰ = نادرست
از همینجا منطق بولی و نهایتاً پایهی کامپیوترها شکل گرفت.
در این معنا، «فلسفهی صفر و یک» را میتوان همان فلسفهی منطق صوری و قطعیگرایی دانست.
@GoSecurity
#Binary
ایدهی صفر و یک در اصل از منطق ارسطویی گرفته شده که بر پایهی دوگانگی «درست/نادرست» (True/False) بنا شده است.
بعدها جورج بول (George Boole) در قرن ۱۹ آن را به یک نظام ریاضی تبدیل کرد:
• ۱ = درست
• ۰ = نادرست
از همینجا منطق بولی و نهایتاً پایهی کامپیوترها شکل گرفت.
در این معنا، «فلسفهی صفر و یک» را میتوان همان فلسفهی منطق صوری و قطعیگرایی دانست.
@GoSecurity
#Binary
❤2
Researchers from Bitdefender revealed that a fake Leonardo DiCaprio movie torrent for "One Battle After Another" is spreading the Agent Tesla malware through a complex PowerShell chain, exploiting the film's popularity as a cybercriminal lure.
@GoSecurity
#malware #subnoscripts
@GoSecurity
#malware #subnoscripts
👾3❤1
❗️New ransomware Group:
Dark Shinigamis
darkshiz4d5ayumjvgbdhchwc7oeuc5jgbqkkgr2jj3ga5nvpjsswdad[.]onion
@GoSecurity
#raas #ransomware #malware
Dark Shinigamis
darkshiz4d5ayumjvgbdhchwc7oeuc5jgbqkkgr2jj3ga5nvpjsswdad[.]onion
@GoSecurity
#raas #ransomware #malware