" From February to September 2016, WhiteBear activity was narrowly focused on embassies and consular operations around the world. All of these early WhiteBear targets were related to embassies and diplomatic/foreign affair organizations. Continued WhiteBear activity later shifted to include defense-related organizations into June 2017. "
https://securelist.com/introducing-whitebear/81638/
https://securelist.com/introducing-whitebear/81638/
Securelist
Introducing WhiteBear
WhiteBear is a parallel project or second stage of the Skipper Turla cluster of activity documented in another private intelligence report “Skipper Turla – the White Atlas framework” from mid-2016.
The No-Bullshit Guide to Pentest
Here's a few suggestions in no particular order.
> Learn python
> Learn assembly for at least x86
> Set up a test lab
> Put a small Windows domain in your lab and try to go from a regular user foothold to domain admin. Also try to go from a local administrator to domain admin. You can simulate that scenario by having a privileged account login to a workstation used by the local admin as if it were helpdesk troubleshooting a problem, then attack it as the stolen local admin account and use a tool like Mimikatz to get the privileged account and pivot from that workstation.
> Grab some intentionally vulnerable virtual machines and poke at them in your lab. Vulnhub has these for download and there's several other places too.
> If you're wanting to get into web app pentesting, learn javanoscript, learn how web servers work, learn how web browsers work, fire up wireshark and capture then analyze the traffic when you browse to a regular HTTP website, then again when you browse to HTTPS.
> Get good with Google.
> Hit up a training course for CEH (weak, but teaches some basic concepts) or PWK/OSCP (beast, and probably way out of your league as a beginner) and take everything you learn and apply it in your test lab. The knowledge is worthless unless you do something with it, so practice, practice, practice!
> Learn to hide. Find ways to hide your traffic in the normal background noise of a busy network. Learn to know what I mean by normal background noise of a network.
> Learn about the tools the blue teams will use to detect and stop you. Learn about next-gen firewalls, IPS devices, malware sandboxes, etc. Be too noisy and you get caught.
> And the most important one: never attack something without getting the owner's permission in writing first. CYA is a way of life
~ @H0N3YP07
Here's a few suggestions in no particular order.
> Learn python
> Learn assembly for at least x86
> Set up a test lab
> Put a small Windows domain in your lab and try to go from a regular user foothold to domain admin. Also try to go from a local administrator to domain admin. You can simulate that scenario by having a privileged account login to a workstation used by the local admin as if it were helpdesk troubleshooting a problem, then attack it as the stolen local admin account and use a tool like Mimikatz to get the privileged account and pivot from that workstation.
> Grab some intentionally vulnerable virtual machines and poke at them in your lab. Vulnhub has these for download and there's several other places too.
> If you're wanting to get into web app pentesting, learn javanoscript, learn how web servers work, learn how web browsers work, fire up wireshark and capture then analyze the traffic when you browse to a regular HTTP website, then again when you browse to HTTPS.
> Get good with Google.
> Hit up a training course for CEH (weak, but teaches some basic concepts) or PWK/OSCP (beast, and probably way out of your league as a beginner) and take everything you learn and apply it in your test lab. The knowledge is worthless unless you do something with it, so practice, practice, practice!
> Learn to hide. Find ways to hide your traffic in the normal background noise of a busy network. Learn to know what I mean by normal background noise of a network.
> Learn about the tools the blue teams will use to detect and stop you. Learn about next-gen firewalls, IPS devices, malware sandboxes, etc. Be too noisy and you get caught.
> And the most important one: never attack something without getting the owner's permission in writing first. CYA is a way of life
~ @H0N3YP07
Forwarded from .: PR1V8 :.
#desec #pr1v8 #informacaolivre #acervopr1v8 #kopimi
Novo curso no @acervopr1v8!
Desec Security - Pentest Profissional Completo
dl: https://news.1rj.ru/str/acervopr1v8/224
senha: @PR1V8
🌐 @PR1V8
Novo curso no @acervopr1v8!
Desec Security - Pentest Profissional Completo
dl: https://news.1rj.ru/str/acervopr1v8/224
senha: @PR1V8
🌐 @PR1V8
https://drive.google.com/open?id=0B9NFM_JUmxW_UmYxSmdDUkt3Nmc
Correção do Módulo 6 incluso - Mairo Vergara 4.0
🕴🏼 @NoUs3r
🕴🏼 @Phantasm_Lab
Correção do Módulo 6 incluso - Mairo Vergara 4.0
🕴🏼 @NoUs3r
🕴🏼 @Phantasm_Lab
Universitário é preso suspeito de usar cartão clonado para pedir pizzas na PB
As compras eram feitas por aplicativo com dados de cartões clonados.
Dono de restaurante descobriu fraude e denunciou à polícia.
Do G1 PB
FACEBOOK
Um estudante de Ciências Contábeis, de 21 anos, foi preso na quinta-feira (17) suspeito de usar dados de cartões de créditos de terceiros para fazer compras. Segundo informações do delegado Lucas Sá, da Delegacia de Defraudações, o universitário usava dados dos cartões de crédito clonados para realizar compras pela internet e até pedir pizzas. A polícia informou que a fraude rendeu benefícios de cerca de R$ 10 mil ao suspeito.
http://g1.globo.com/pb/paraiba/noticia/2016/11/universitario-e-preso-suspeito-de-usar-cartao-clonado-para-pedir-pizzas-na-pb.html
🕴🏼 @Phantasm_Lab
As compras eram feitas por aplicativo com dados de cartões clonados.
Dono de restaurante descobriu fraude e denunciou à polícia.
Do G1 PB
Um estudante de Ciências Contábeis, de 21 anos, foi preso na quinta-feira (17) suspeito de usar dados de cartões de créditos de terceiros para fazer compras. Segundo informações do delegado Lucas Sá, da Delegacia de Defraudações, o universitário usava dados dos cartões de crédito clonados para realizar compras pela internet e até pedir pizzas. A polícia informou que a fraude rendeu benefícios de cerca de R$ 10 mil ao suspeito.
http://g1.globo.com/pb/paraiba/noticia/2016/11/universitario-e-preso-suspeito-de-usar-cartao-clonado-para-pedir-pizzas-na-pb.html
🕴🏼 @Phantasm_Lab
Paraíba
Universitário é preso suspeito de usar cartão clonado para pedir pizzas na PB
As compras eram feitas por aplicativo com dados de cartões clonados.
Dono de restaurante descobriu fraude e denunciou à polícia.
Dono de restaurante descobriu fraude e denunciou à polícia.
For miners in the RF can be introduced benefits for electricity
At present, the project of creating a farm for the production of crypto-currency in one of the Russian cities is being developed.
It seems that Russia has seriously set out to become world leader in the production of crypto currency and is now working to create favorable conditions for miners. As reported by Izvestia, referring to Arseniy Sheltsin, director of project activities of the Institute for Internet Development (IRI), Russian miners may be granted benefits, for example, discounts on electricity.
http://www.securitylab.ru/news/488211.php
🕴🏼 @Phantasm_Lab
At present, the project of creating a farm for the production of crypto-currency in one of the Russian cities is being developed.
It seems that Russia has seriously set out to become world leader in the production of crypto currency and is now working to create favorable conditions for miners. As reported by Izvestia, referring to Arseniy Sheltsin, director of project activities of the Institute for Internet Development (IRI), Russian miners may be granted benefits, for example, discounts on electricity.
http://www.securitylab.ru/news/488211.php
🕴🏼 @Phantasm_Lab
SecurityLab.ru
Для майнеров в РФ могут быть введены льготы на электроэнергию
В настоящее время разрабатывается проект создания фермы по добыче криптовалют в одном из российских городов.
Attackers could distribute malicious software through the FCC.gov site
Vulnerability on the site of the Federal Communications Commission allowed attackers to download malicious software to the server.
A 20-year-old student from the US accidentally discovered a vulnerability on the site of the Federal Communications Commission (FCC). The error allowed any user to attach a file with an arbitrary extension and publish a link to it as a public comment on the agency's website.
According to the researcher, the vulnerability allowed to upload arbitrary files to the FCC server up to 25 MB. Thus, attackers could easily distribute malware through the official website of the Federal Communications Commission. Vulnerability is supposed to be present for about 5 months.
The problem was the lack of checking the types of files being uploaded in the public API. Access to the API was provided using a key sent at the user's request to his email.
The FCC is currently investigating the incident.
🕴🏼 @Phantasm_Lab
http://www.securitylab.ru/news/488206.php
Vulnerability on the site of the Federal Communications Commission allowed attackers to download malicious software to the server.
A 20-year-old student from the US accidentally discovered a vulnerability on the site of the Federal Communications Commission (FCC). The error allowed any user to attach a file with an arbitrary extension and publish a link to it as a public comment on the agency's website.
According to the researcher, the vulnerability allowed to upload arbitrary files to the FCC server up to 25 MB. Thus, attackers could easily distribute malware through the official website of the Federal Communications Commission. Vulnerability is supposed to be present for about 5 months.
The problem was the lack of checking the types of files being uploaded in the public API. Access to the API was provided using a key sent at the user's request to his email.
The FCC is currently investigating the incident.
🕴🏼 @Phantasm_Lab
http://www.securitylab.ru/news/488206.php
SecurityLab.ru
Злоумышленники могли распространять вредоносное ПО через сайт FCC.gov
Уязвимость на сайте Федеральной комиссии по связи позволяла злоумышленниками загружать вредоносное ПО на сервер.
[+] Russian;
[+] Portuguese;
[+] Espanish;
https://youtu.be/anKt8gsmQLM
🕴🏼 @Phantasm_Lab
Загрузить Gifs сайт vk.com[+] Portuguese;
Download de Gifs, site vk.com[+] Espanish;
dowload gifs de paredes, sitio vk.comhttps://youtu.be/anKt8gsmQLM
🕴🏼 @Phantasm_Lab
YouTube
[Python] Dowload Gifs from walls, site vk.com
[+] Russian;
Загрузить Gifs сайт vk.com
[+] Portuguese;
Download de Gifs, site vk.com
[+] Espanish;
dowload gifs de paredes, sitio vk.com
Script
[ - ] GitHub:
https://github.com/hhiki/vk_wall_gifs
[+] Telegram:
Hachiman Hikigaya: @H4ch1m4n
🏴 łαbørαŧøriø…
Загрузить Gifs сайт vk.com
[+] Portuguese;
Download de Gifs, site vk.com
[+] Espanish;
dowload gifs de paredes, sitio vk.com
Script
[ - ] GitHub:
https://github.com/hhiki/vk_wall_gifs
[+] Telegram:
Hachiman Hikigaya: @H4ch1m4n
🏴 łαbørαŧøriø…
GNUroot debian - Arabic and Persian.
https://www.youtube.com/channel/UCt3kSNGDj8AiD6xBlVAwXUg/feed
🕴🏼 @Phantasm_Lab
https://www.youtube.com/channel/UCt3kSNGDj8AiD6xBlVAwXUg/feed
🕴🏼 @Phantasm_Lab
YouTube
gnuroot debian
https://www.facebook.com/groups/869457613164332/
http://www.techtudo.com.br/noticias/2017/08/o-que-e-replika-app-usa-inteligencia-artificial-para-criar-um-clone-seu.ghtml
🕴🏼 @Phantasm_Lab
🕴🏼 @Phantasm_Lab
TechTudo
O que é Replika? App usa inteligência artificial para criar um ‘clone’ seu
Internautas fazem caçada a convite para entrar no aplicativo, disponível para Android e iOS.
This media is not supported in your browser
VIEW IN TELEGRAM
Vídeo de apresentação do Replika
Replika presentation video
Replika presentation video
Olá!
Vi que você está no grupo do @sumobrasil, que tal nos ajudar? O SUMO precisa de *você*! Para manter-se informado participe conosco de nossa reunião quinzenal.
Segue abaixo todas as informações para a reunião, bem como os tópicos que serão tratados:
https://discourse.mozilla.org/t/reuniao-sumo-br-06-09-2017/18827
🕴🏽 @Phantasm_Lab
Vi que você está no grupo do @sumobrasil, que tal nos ajudar? O SUMO precisa de *você*! Para manter-se informado participe conosco de nossa reunião quinzenal.
Segue abaixo todas as informações para a reunião, bem como os tópicos que serão tratados:
https://discourse.mozilla.org/t/reuniao-sumo-br-06-09-2017/18827
🕴🏽 @Phantasm_Lab
Mozilla Discourse
Reunião SUMO BR - 06/09/2017
Olá pessoal, No dia 06/09/2017 a partir das 22h30m (horário de Brasília) via Discord teremos mais uma reunião do SUMO! Para participar inscreva-se no nosso Discord. Tópicos: Fórum de Suporte Base de conhecimento Novos artigos Revisão Social Support…