Hypersec
https://www.openwall.com/lists/oss-security/2024/03/29/4
https://github.com/Neo23x0/signature-base/blob/master/yara/bkdr_xz_util_cve_2024_3094.yar
#CVE #detect #backdoor
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
signature-base/yara/bkdr_xz_util_cve_2024_3094.yar at master · Neo23x0/signature-base
YARA signature and IOC database for my scanners and tools - Neo23x0/signature-base
منبعی جامع برای بررسی جرائم رایانهای (APT)
#APT #book
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - CyberMonitor/APT_CyberCriminal_Campagin_Collections: APT & CyberCriminal Campaign Collection
APT & CyberCriminal Campaign Collection. Contribute to CyberMonitor/APT_CyberCriminal_Campagin_Collections development by creating an account on GitHub.
🙏1
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Hypersec
#CVE #XZ #linux
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
BleepingComputer
New XZ backdoor scanner detects implant in any Linux binary
Firmware security firm Binarly has released a free online scanner to detect Linux executables impacted by the XZ Utils supply chain attack, tracked as CVE-2024-3094.
این آسیب پذیری شامل یک مشکل تنظیمات پیکربندی در "seccenter.exe" است که می تواند به مهاجم اجازه دهد رفتار مورد انتظار محصول را تغییر دهد و به طور بالقوه یک کتابخانه شخص ثالث را پس از اجرا بارگذاری کند. این آسیب پذیری Bitdefender Total Security، Internet Security، Antivirus Plus و Antivirus Free، به طور خاص نسخه 27.0.25.114 را تحت تأثیر قرار می دهد. به آن نمره پایه CVSS v3 7.8 اختصاص داده شده است
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Bitdefender
Local privilege escalation in Bitdefender Total Security (VA-11168) - Bitdefender
A configuration setting issue in seccenter.exe as used in Bitdefender Total Security, Bitdefender Internet Security, Bitdefender Antivirus Plus, Bitdefender Antivirus Free allows an attacker to change the product’s expected behavior and potentially load a…
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
Please open Telegram to view this post
VIEW IN TELEGRAM
🤩4👍1👌1
Please open Telegram to view this post
VIEW IN TELEGRAM
Crypt0ace
Shellcode Injection in C# - Part 1 - Process Injection
Discussing shellcode injection techniques we can use while utilizing C#
🔥2👍1
Plugin used on millions of websites had a feature that was vulnerable to blind SQL injection. If the vulnerability was successfully exploited, the attacker could gain access to any confidential information.
#CVE #wordpress #sqli
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Wordfence
$5,500 Bounty Awarded for Unauthenticated SQL Injection Vulnerability Patched in LayerSlider WordPress Plugin
On March 25th, 2024, during our second Bug Bounty Extravaganza, we received a submission for an unauthenticated SQL Injection vulnerability in LayerSlider, a WordPress plugin with more than 1,000,000 estimated active installations. This vulnerability can…
👌2
Forwarded from Splunk> Knowledge Base
xz Utils versions 5.6.0 and 5.6.1 appear to be compromised.
XZ Utils is data compression software and may be present in Linux distributions. The malicious code may allow unauthorized access to affected systems.
#CVE #XZ #linux
@splunk_kb
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - FabioBaroni/CVE-2024-3094-checker: Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed…
Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094) - FabioBaroni/CVE-2024-3094-checker
#windows #malware
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Medium
Windows Malware in C# — Using Github as C2
In the realm of cybersecurity, Advanced Persistent Threat (APT) groups continue to evolve and adapt, often employing innovative techniques…
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1🤩1
Win_CMD.pdf
4.6 MB
pages : 948
lan :English
#windows #commands
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Memory Forensics Using Volatility Framework.pdf
3.6 MB
☢️ Memory Acquisition
☢️Importance of Memory Acquisition
☢️Dump Format Supported
☢️Memory Analysis Plugins
☢️Imageinfo
☢️Kdbgscan
☢️Processes
☢️DLLs
☢️Handles
☢️Netscan
☢️Hivelist
☢️Timeliner
☢️Hashdump
☢️Lsadump
☢️Modscan
☢️Filescan
☢️Svcscan
☢️History
☢️Dumpregistry
☢️Moddump
☢️Procdump
☢️Memdump
☢️notepad
#memory #forensic #volatility
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
My study logs on Windows pwnables, plus some hopefully helpful resources.
#windows
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - leesh3288/WinPwn: Windows Pwnable Study
Windows Pwnable Study. Contribute to leesh3288/WinPwn development by creating an account on GitHub.
MISP Threat Intelligence & Sharing
#MISP #Elastic #Docker
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
MISP Open Source Threat Intelligence Platform & Open Standards For Threat Information Sharing
MISP - Elastic Stack - Docker Lab
MISP Threat Intelligence & Sharing
Sophos-Active-Adversary-Report-H12024.pdf
990.8 KB
Sophos: Active Adversary Report H1 2024
این مقاله در مورد یک آسیب پذیری حیاتی در سیستم عامل Brocade Fabric است. در مورد تأثیر بالقوه آسیب پذیری و چگونگی کاهش خطر بحث می کند. آسیبپذیری، CVE-2023-3454، به مهاجمان راه دور اجازه میدهد تا کد را روی سوئیچهای آسیبدیده اجرا کنند . که می تواند به آنها کنترل کامل روی سوئیچ و شبکه را بدهد. نسخه های سیستم عامل Brocade Fabric 9.x تا 9.2.0 آسیب پذیر هستند . ارتقاء به نسخه 9.2.0 یا جدیدتر توصیه می شود .
#cve
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2