Forwarded from OSINT | Форензика
Написал статью для xakep.ru про идентификацию владельцев луковичных ресурсов. Затронул темы поисковиков, теневой экономики, фингерпринтинга, ловушек и много другого. В ближайшем времени переведу на английский язык.
Читать
Please open Telegram to view this post
VIEW IN TELEGRAM
❤6👍4🔥2
|SaaS attack techniques|
"Без понимания каким образом совершаются наступательные действия атакующей стороны, трудно выстроить крепкую систему безопасности" - народная мудрость
🛡Данный репозитрий нацелен на сбор методов атак Software as a service (SaaS) для моделирования будущих атак на относительно новую поверхность атаки, расширяя кругозор как атакующей, так и защищающих сторон, и конечно оные могут пригодиться исследователям безопасности в целом.
Тезисы, озвучиваемые авторами:
💾Избегайте высокоэффективных средств контроля
💾Ищите функции, которыми можно злоупотреблять в долгосрочной перспективе, а не ошибки, которые будут быстро исправлены
💾Выйдите за рамки примерно дюжины основных SaaS-приложений
Можно в целом сократить до: "лучше поразмыслить в таком ключе, как другие не могут вообразить и не гнаться за 0-day эксплойтами, а думать о более долгоиграющих и недорогих способах обходах защиты". Так же можно адаптировать это и для защищающейся стороны, ибо далеко не всегда нужно искать с "потом на лице" способы защиты, оптимальнее подумать в том направлении, что редко рассматривается.
🔖Также важно понимать откуда ноги растут и по возможности читать предысторию проектов, если таковая имеется, как в данном случае.
"Without understanding how offensive actions of the attacking side are carried out, it is difficult to build a strong security system" - folk wisdom
🛡This repository is aimed at collecting Software as a service (SaaS) attack methods to simulate future attacks on a relatively new attack surface, expanding the horizons of both attacking and defending parties, and of course these can be useful to security researchers in general.
Theses voiced by the authors:
💾Avoid highly effective controls
💾Look for features that can be abused in the long run, not bugs that will be fixed quickly
💾Go beyond about a dozen basic SaaS applications
You can generally reduce it to: "it's better to think in this way, as others cannot imagine and not chase 0-day exploits, but think about longer-lasting and inexpensive ways to bypass protection." It is also possible to adapt this for the defending side, because it is not always necessary to look for ways of protection with "sweat on the face", it is more optimal to think in the direction that is rarely considered.
🔖It is also important to understand where the legs are growing from and, if possible, read the background of the projects, if any, as in this case.
#SaaS #networkless_attacks #DFIR #security_research #blue_team #red_team #Reconnaissance #Initial_Access #Execution #Persistence #PE #Defense_Evasion #Credential_Access #Discovery #Lateral_Movement #Exfiltration
"Без понимания каким образом совершаются наступательные действия атакующей стороны, трудно выстроить крепкую систему безопасности" - народная мудрость
🛡Данный репозитрий нацелен на сбор методов атак Software as a service (SaaS) для моделирования будущих атак на относительно новую поверхность атаки, расширяя кругозор как атакующей, так и защищающих сторон, и конечно оные могут пригодиться исследователям безопасности в целом.
Тезисы, озвучиваемые авторами:
💾Избегайте высокоэффективных средств контроля
💾Ищите функции, которыми можно злоупотреблять в долгосрочной перспективе, а не ошибки, которые будут быстро исправлены
💾Выйдите за рамки примерно дюжины основных SaaS-приложений
Можно в целом сократить до: "лучше поразмыслить в таком ключе, как другие не могут вообразить и не гнаться за 0-day эксплойтами, а думать о более долгоиграющих и недорогих способах обходах защиты". Так же можно адаптировать это и для защищающейся стороны, ибо далеко не всегда нужно искать с "потом на лице" способы защиты, оптимальнее подумать в том направлении, что редко рассматривается.
🔖Также важно понимать откуда ноги растут и по возможности читать предысторию проектов, если таковая имеется, как в данном случае.
"Without understanding how offensive actions of the attacking side are carried out, it is difficult to build a strong security system" - folk wisdom
🛡This repository is aimed at collecting Software as a service (SaaS) attack methods to simulate future attacks on a relatively new attack surface, expanding the horizons of both attacking and defending parties, and of course these can be useful to security researchers in general.
Theses voiced by the authors:
💾Avoid highly effective controls
💾Look for features that can be abused in the long run, not bugs that will be fixed quickly
💾Go beyond about a dozen basic SaaS applications
You can generally reduce it to: "it's better to think in this way, as others cannot imagine and not chase 0-day exploits, but think about longer-lasting and inexpensive ways to bypass protection." It is also possible to adapt this for the defending side, because it is not always necessary to look for ways of protection with "sweat on the face", it is more optimal to think in the direction that is rarely considered.
🔖It is also important to understand where the legs are growing from and, if possible, read the background of the projects, if any, as in this case.
#SaaS #networkless_attacks #DFIR #security_research #blue_team #red_team #Reconnaissance #Initial_Access #Execution #Persistence #PE #Defense_Evasion #Credential_Access #Discovery #Lateral_Movement #Exfiltration
GitHub
GitHub - pushsecurity/saas-attacks: Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques…
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown - pushsecurity/saas-attacks
👍7❤5
ELINT.pdf
563.7 KB
📡The E-Intelligence System
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
"Electronic Intelligence (ELINT), often known as E-Intelligence, is intelligence obtained through electronic sensors. Other than personal communications, ELINT intelligence is usually obtained. The goal is usually to determine a target's capabilities, such as radar placement. Active or passive sensors can be employed to collect data. A provided signal is analyzed and contrasted to collected data for recognized signal types.
The information may be stored if the signal type is detected; it can be classed as new if no match is found. ELINT collects and categorizes data. In a military setting (and others that have adopted the usage, such as a business), intelligence helps an organization make decisions that can provide them a strategic advantage over the competition. The term "intel" is frequently shortened. The two main subfields of signals intelligence (SIGINT) are ELINT and Communications Intel (COMINT)."
#Intelligence #SIGINT #ELINT #radar #signal #Electronic_Warfare #UAV #ESM
👍7❤3🤓1
🤔"Let’s take a computer example: EternalBlue. That’s the NSA code name for an exploit against the Windows operating system, used by the NSA for at least five years before 2017, when the Russians stole it from that agency." - Bruce Schneier told in the book: "A Hacker's Mind: How the Powerful Bend Society's Rules, and How to Bend them Back"
#NSA #EternalBlue #USA #Russia #Windows #SMB #vulnerability #exploitation #TheShadowBrokers #WannaCry #0day
#NSA #EternalBlue #USA #Russia #Windows #SMB #vulnerability #exploitation #TheShadowBrokers #WannaCry #0day
👍4🤔4❤2🔥1
👍15