@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
Introduction to AWS Services

This video gives the complete overview of various AWS services by designing a sample Application. Ideal for those who are new to AWS and those who want to understand where particular AWS service fits into a sample application architecture

https://youtu.be/Z3SYDTMP3ME
The Most Important AWS Services That You NEED To Learn!

If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB, and many more!

https://youtu.be/B08iQQhXG1Y
[Exploit] - Impropper Access Control - Arbitrary File Download + IDOR (0day Vulnerability) MEC

I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.

https://youtu.be/yOzoIGJJqvk
HTTP STATUS CODE
CYBER SECURITY KILL CHAIN / LIFE CYCLE

A Cyber Security Kill Chain framework is developed by Lockheed Martin which applies to Cyber Security and is part of the Intelligence Driven Defense model for identification and prevention of cyber intrusions activity.

https://hacklido.com/blog/30-cyber-security-kill-chain-life-cycle
Router Firmware Hacking - Extraction

This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router to give commands. Analysing routers gives an insight into potential vulnerabilities held by router firmware.

https://youtu.be/tmnvJe-TkJQ
Introduction to Firmware Reversing

To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out

https://youtu.be/GIU4yJn2-2A
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware

Over the last few years, as the world has moved closer to realizing the idea of the Internet of Things, an increasing amount of the things with which we interact every day have been replaced with embedded devices. These include previously non-electronic devices, such as locks, light switches, and utility meters (such as electric meters and water meters), as well as increasingly more complex and ubiquitous devices, such as network routers and printers. Other devices are becoming increasingly intelligent as well. Modern printers and cameras include complex social media functionality, smart televisions are increasingly including Internet-based entertainment options, and even previously-simple devices, such as watches and glasses are being augmented with complex embedded components.

https://youtu.be/Fi_S2F7ud_g
#Eko2020​ Main Track | Static analysis-based recovery of service function calls in UEFI firmware

Reversing #UEFI​ firmware requires a lot of background and knowledge about #firmware​ and understanding of #hardware​ before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware code looks like original

https://youtu.be/rK0tmVa19ME