@Phantasm_Lab – Telegram
@Phantasm_Lab
2.56K subscribers
712 photos
34 videos
671 files
2.71K links
- Red x Blue Security
- Bug Bounty 💷 💵
- Exploitable tools
- Programming Languages
- Malware Analysis

🇺🇸 🇧🇷 🇪🇸

since 2017 ©


Parceiros:
@TIdaDepressaoOficial @acervoprivado @ReneGadesx @G4t3w4y
Download Telegram
DevSecCon24

DevSecCon24
is a global, vendor-neutral, community-driven conference that connects developers, security and operations teams to learn and enable the integration of security into their development practices.

https://events.bizzabo.com/308842/agenda
John McAfee, criador do antivírus McAfee, é encontrado morto em prisão de Barcelona

Empresário estava preso preventivamente na Espanha, por acusações de fraudes fiscais, e seria extraditado para os EUA. Ele tinha 75 anos e foi um dos pioneiros no mercado de antivírus para computadores pessoais.

https://g1.globo.com/economia/tecnologia/noticia/2021/06/23/john-mcafee-criador-do-antivirus-mcaffe-e-encontrado-morto-dizem-jornais.ghtml
Grupo Fleury é alvo de ataque cibernético

Os sistemas online do Grupo Fleury foram alvo de uma tentativa de ataque cibernético nessa terça-feira (22), ficando fora do ar desde então. Em nota divulgada à imprensa, a companhia confirmou a investida contra o seu ambiente de Tecnologia da Informação, deixando parte das suas operações indisponíveis.

https://www.tecmundo.com.br/seguranca/219831-grupo-fleury-alvo-ataque-cibernetico.htm
Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP

The Hide 'N Seek botnet was first discovered in January 2018 and is known for its unique use of Peer-to-Peer communication between bots.
Since its discovery, the malware family has seen a couple of upgrades, from the addition of persistence and new exploits, to targeting Android devices via the Android Debug Bridge (ADB).

https://unit42.paloaltonetworks.com/hide-n-seek-botnet-updates-arsenal-with-exploits-against-nexus-repository-manager-thinkphp/
Web Application Firewalls: Analysis of Detection Logic

The presentation will highlight the core of Web Application Firewall (WAF): detection logic, with an accent on regular expressions detection mechanism. The security of 6 trending opensource WAFs (OWASP CRS 2,3 - ModSecurity, Comodo WAF, PHPIDS, QuickDefense, Libinjection) will be called into question.

https://youtu.be/dMFJLicdaC0
Práticas da OWASP para Testes em Segurança Web

Mostrar a utilização de recursos da OWASP para testar a segurança em aplicações WEB.

https://youtu.be/FhyLmDBdIO0
Exploit Subdomain Takeover Vulnerability

Subdomain and bucket sniping is very easy to find and dangerous vulnerability that attacker uses to exploit and perform phishing attacks. In this episode, we have discussed what are these vulnerabilities, examples and mitigation strategy.

https://youtu.be/FrleeNN-gXw
CVE-2020-1350 SIGRed PoC Demo - Microsoft Windows DNS Server DoS Vulnerability

This vulnerability has been identified by researchers from CheckPoint and Microsoft as Critical with the ability to perform Remote Code Execution. In this Proof of Concept, the vulnerability is designed to crash the DNS Server as a Denial of Service.

https://youtu.be/gZo1EufWj-E
DNS Attacks Explained

https://youtu.be/czKHFxaO56c