Forwarded from Security Analysis
UAC bypass (Privilege escalation)
Real Time Detection of User Account Control (UAC) bypass via hijacking The DiskCleanup Scheduled Task
https://github.com/elastic/detection-rules/blob/main/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml
#UAS_Bypass
@securation
Real Time Detection of User Account Control (UAC) bypass via hijacking The DiskCleanup Scheduled Task
https://github.com/elastic/detection-rules/blob/main/rules/windows/privilege_escalation_uac_bypass_diskcleanup_hijack.toml
#UAS_Bypass
@securation
Offensive Terraform Modules
Automated multi step offensive attack modules with Infrastructure as Code(IAC)
https://offensive-terraform.github.io/
Automated multi step offensive attack modules with Infrastructure as Code(IAC)
https://offensive-terraform.github.io/
offensive-terraform.github.io
Offensive Terraform
Automated multi step offensive attack modules with Infrastructure as Code(IAC)
Exploit Development (Format Strings Series 1 - 6 which covers :
Intro & dumping sensitive data
Redirecting code flow
More control over the writing process
Rewriting the GOT table
Memory leak + ASLR bypass
x86 exploitation :
https://www.youtube.com/playlist?list=PL9T4qUiaXpm5kpeqEQOpYVUaHF-FyAHHc
Intro & dumping sensitive data
Redirecting code flow
More control over the writing process
Rewriting the GOT table
Memory leak + ASLR bypass
x86 exploitation :
https://www.youtube.com/playlist?list=PL9T4qUiaXpm5kpeqEQOpYVUaHF-FyAHHc
YouTube
Exploit Development - YouTube
https://betrusted.io
A prototype security-foccussed open-software/hardware device (akin to a PDA) for delegating your sensitive information and tasks to. It has a microkernel and userspace in rust and the development version uses a reconfigurable FPGA instead of a CPU.
Betrusted is a secure and private communications system. It gives users an evidence-based reason to believe that private matters are kept private.
Betrusted is more than just an app, and more than just a gadget – it is a co-designed hardware + software solution that provides safe defaults for everyday users. It’s also open source, empowering advanced users to analyze, extend and explore this secure mobile computer.
#betrusted #mobile #phone #alternatives
A prototype security-foccussed open-software/hardware device (akin to a PDA) for delegating your sensitive information and tasks to. It has a microkernel and userspace in rust and the development version uses a reconfigurable FPGA instead of a CPU.
Betrusted is a secure and private communications system. It gives users an evidence-based reason to believe that private matters are kept private.
Betrusted is more than just an app, and more than just a gadget – it is a co-designed hardware + software solution that provides safe defaults for everyday users. It’s also open source, empowering advanced users to analyze, extend and explore this secure mobile computer.
#betrusted #mobile #phone #alternatives
Sysmon Internals - From File Delete Event to Kernel Code Execution
https://undev.ninja/sysmon-internals-from-file-delete-event-to-kernel-code-execution
https://undev.ninja/sysmon-internals-from-file-delete-event-to-kernel-code-execution
undev.ninja
Sysmon Internals - From File Delete Event to Kernel Code Execution
Sysmon File Delete Event Internals and Kernel Code Execution
Researchers reported security flaws in top ANTIVIRUS software that could make your computers more vulnerable to hackers.
https://thehackernews.com/2020/10/antivirus-software-vulnerabilities.html
Affected vendors have released patches:
—Kaspersky
—McAfee
—Symantec
—Fortinet
—Check Point
—Trend Micro
—Avira
—Microsoft Defender
https://thehackernews.com/2020/10/antivirus-software-vulnerabilities.html
Affected vendors have released patches:
—Kaspersky
—McAfee
—Symantec
—Fortinet
—Check Point
—Trend Micro
—Avira
—Microsoft Defender