@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Russian Hacking Tools Codenamed WhiteBear

🕴🏽@Phantasm_Lab
" From February to September 2016, WhiteBear activity was narrowly focused on embassies and consular operations around the world. All of these early WhiteBear targets were related to embassies and diplomatic/foreign affair organizations. Continued WhiteBear activity later shifted to include defense-related organizations into June 2017. "

https://securelist.com/introducing-whitebear/81638/
The No-Bullshit Guide to Pentest

Here's a few suggestions in no particular order.

> Learn python

> Learn assembly for at least x86

> Set up a test lab

> Put a small Windows domain in your lab and try to go from a regular user foothold to domain admin. Also try to go from a local administrator to domain admin. You can simulate that scenario by having a privileged account login to a workstation used by the local admin as if it were helpdesk troubleshooting a problem, then attack it as the stolen local admin account and use a tool like Mimikatz to get the privileged account and pivot from that workstation.

> Grab some intentionally vulnerable virtual machines and poke at them in your lab. Vulnhub has these for download and there's several other places too.

> If you're wanting to get into web app pentesting, learn javanoscript, learn how web servers work, learn how web browsers work, fire up wireshark and capture then analyze the traffic when you browse to a regular HTTP website, then again when you browse to HTTPS.

> Get good with Google.

> Hit up a training course for CEH (weak, but teaches some basic concepts) or PWK/OSCP (beast, and probably way out of your league as a beginner) and take everything you learn and apply it in your test lab. The knowledge is worthless unless you do something with it, so practice, practice, practice!

> Learn to hide. Find ways to hide your traffic in the normal background noise of a busy network. Learn to know what I mean by normal background noise of a network.

> Learn about the tools the blue teams will use to detect and stop you. Learn about next-gen firewalls, IPS devices, malware sandboxes, etc. Be too noisy and you get caught.

> And the most important one: never attack something without getting the owner's permission in writing first. CYA is a way of life

~ @H0N3YP07
From: SecurityBreach
Forwarded from .: PR1V8 :.
#desec #pr1v8 #informacaolivre #acervopr1v8 #kopimi
Novo curso no @acervopr1v8!

Desec Security - Pentest Profissional Completo

dl: https://news.1rj.ru/str/acervopr1v8/224
senha: @PR1V8


🌐 @PR1V8
https://drive.google.com/open?id=0B9NFM_JUmxW_UmYxSmdDUkt3Nmc

Correção do Módulo 6 incluso - Mairo Vergara 4.0

🕴🏼 @NoUs3r
🕴🏼 @Phantasm_Lab
Universitário é preso suspeito de usar cartão clonado para pedir pizzas na PB
As compras eram feitas por aplicativo com dados de cartões clonados.
Dono de restaurante descobriu fraude e denunciou à polícia.
Do G1 PB
FACEBOOK
Um estudante de Ciências Contábeis, de 21 anos, foi preso na quinta-feira (17) suspeito de usar dados de cartões de créditos de terceiros para fazer compras. Segundo informações do delegado Lucas Sá, da Delegacia de Defraudações, o universitário usava dados dos cartões de crédito clonados para realizar compras pela internet e até pedir pizzas. A polícia informou que a fraude rendeu benefícios de cerca de R$ 10 mil ao suspeito.

http://g1.globo.com/pb/paraiba/noticia/2016/11/universitario-e-preso-suspeito-de-usar-cartao-clonado-para-pedir-pizzas-na-pb.html

🕴🏼 @Phantasm_Lab
For miners in the RF can be introduced benefits for electricity

At present, the project of creating a farm for the production of crypto-currency in one of the Russian cities is being developed.
It seems that Russia has seriously set out to become world leader in the production of crypto currency and is now working to create favorable conditions for miners. As reported by Izvestia, referring to Arseniy Sheltsin, director of project activities of the Institute for Internet Development (IRI), Russian miners may be granted benefits, for example, discounts on electricity.

http://www.securitylab.ru/news/488211.php

🕴🏼 @Phantasm_Lab
Attackers could distribute malicious software through the FCC.gov site

Vulnerability on the site of the Federal Communications Commission allowed attackers to download malicious software to the server.
A 20-year-old student from the US accidentally discovered a vulnerability on the site of the Federal Communications Commission (FCC). The error allowed any user to attach a file with an arbitrary extension and publish a link to it as a public comment on the agency's website.
According to the researcher, the vulnerability allowed to upload arbitrary files to the FCC server up to 25 MB. Thus, attackers could easily distribute malware through the official website of the Federal Communications Commission. Vulnerability is supposed to be present for about 5 months.
The problem was the lack of checking the types of files being uploaded in the public API. Access to the API was provided using a key sent at the user's request to his email.
The FCC is currently investigating the incident.

🕴🏼 @Phantasm_Lab

http://www.securitylab.ru/news/488206.php
This media is not supported in your browser
VIEW IN TELEGRAM
Vídeo de apresentação do Replika

Replika presentation video
Olá!
Vi que você está no grupo do @sumobrasil, que tal nos ajudar? O SUMO precisa de *você*! Para manter-se informado participe conosco de nossa reunião quinzenal.
Segue abaixo todas as informações para a reunião, bem como os tópicos que serão tratados:
https://discourse.mozilla.org/t/reuniao-sumo-br-06-09-2017/18827

🕴🏽 @Phantasm_Lab