Hypersec – Telegram
Hypersec
4.02K subscribers
274 photos
17 videos
210 files
866 links
🔐🔏 تیم عملیات امنیت سورین
ارائه دهنده راهکارهای نوین مرکز عملیات امنیت (SOC)

Soorinsec.ir
۰۲۱-۲۲۰۲۱۷۳۴

instagram : sector_soorin
linkdin : https://www.linkedin.com/company/soorinsec/
Admin:
@Fze01
Download Telegram
🚀SandAnalyze - Simulate Windows EXE on Linux / macOS!

🔺https://github.com/alicangnll/SandAnalyze

تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3
🔈CVE-2024-24576 (CVSS 10): Rust Flaw Exposes Windows Systems to Command Injection Attacks❗️

یک آسیب پذیری حیاتی در کتابخانه استاندارد Rust کشف شده است که سیستم های مبتنی بر ویندوز را در معرض خطر اجرای کد دلخواه قرار می دهد. این نقص که به عنوان CVE-2024-24576 ردیابی می شود، به طور بالقوه می تواند توسط مهاجمان برای به دست آوردن کنترل غیرمجاز یک سیستم مورد سوء استفاده قرار گیرد.

↘️https://securityonline.info/cve-2024-24576-cvss-10-rust-flaw-exposes-windows-systems-to-command-injection-attacks/

#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1
🔴CVE-2024-3400: command injection in Palo Alto Networks PAN-OS, 10.0 rating 🔥

A 0-day vulnerability in PAN-OS that allows an unauthenticated attacker to execute arbitrary code on the firewall with root rights. According to Palo Alto Networks, attacks have already been carried out that exploit this vulnerability!

👉 Dork: tag.name:"palo_alto"

😎https://security.paloaltonetworks.com/CVE-2024-3400

#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Search for data on vulnerabilities and indicators of compromise Search for data on vulnerabilities and indicators of compromise

🔎 Online services

MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.

NIST NVD — search the official American government vulnerability database.

GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.

CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.

opencve.io CVE search engine with built-in alerts new threats.

security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.

#tool #CVE

تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
2
Threat Hunting .pdf
2.7 MB
📚Threat Hunting Play Book
LEARN HOW TO EMBRACE A PROACTIVE SECURITY POSTURE

#TH
تیم سورین
❤‍🔥1
➡️PurpleLab: Revolutionizing Cybersecurity Testing with Speed and Simplicity


این راه حل به شما این امکان را می دهد که به راحتی یک آزمایشگاه کامل را برای ایجاد/آزمایش detection rules خود، شبیه سازی گزارش ها، اجرای آزمایش ها، دانلود و اجرای بدافزارها و تکنیک های حمله miter، بازیابی سندباکس و بسیاری ویژگی های دیگر مستقر کنید.

https://github.com/Krook9d/PurpleLab?tab=readme-ov-file#installation

تیم سورین
#purple
Please open Telegram to view this post
VIEW IN TELEGRAM
1
💻MasterParser v2.5

ابزار MasterParser به‌عنوان یک ابزار قوی Digital Forensics و Incident Response است که به دقت برای تجزیه و تحلیل لاگ‌های لینوکس در فهرست var/log ساخته شده است. MasterParser که به طور خاص برای تسریع فرآیند تحقیق در مورد حوادث امنیتی در سیستم‌های لینوکس طراحی شده است، به طور ماهرانه لاگ‌های پشتیبانی شده مانند auth.log را اسکن می‌کند، جزئیات حیاتی از جمله ورود به سیستم SSH، ایجاد کاربر، نام رویداد، آدرس IP و موارد دیگر را استخراج می‌کند. خلاصه تولید شده ابزار این اطلاعات را در قالبی واضح و مختصر ارائه می‌کند و کارایی و دسترسی را برای پاسخ‌دهندگان حادثه افزایش می‌دهد.

👩‍💻https://github.com/securityjoes/MasterParser

#IR #DFIR #Linux
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
🤩1
Windows 11 Security Book: Powerful security by design, Microsoft, 2023

Windows 11 is the most secure Windows ever, built in deep partnership with original
equipment manufacturers (OEMs) and silicon manufacturers. Discover why organizations of all sizes, including 90% of Fortune 500 companies, are taking advantage of the powerful default protection of Windows 11.

#docs #windows #defensive

تیم سورین
MSFT-Windows11-Security-book_Sept2023.pdf
8.8 MB
Windows 11 Security Book: Powerful security by design, Microsoft, 2023

تیم سورین
👍2
👩‍💻 فرآیندها (پروسس‌های) اصلی ویندوز چه هستند؟

فرآیندهای اصلی ویندوز، بلوک‌‌های ساختمانی ضروری هستند که سیستم را به خوبی اجرا ‌می‌کنند. درک این فرآیندها ‌می‌تواند برای عیب یابی مشکلات، شناسایی بدافزارهای بالقوه و به دست آوردن درک عمیق تر از نحوه عملکرد ویندوز مفید باشد.
در این مقاله در مورد ۹ پروسس زیر توضیح داده شده است :
1️⃣System (System Process)
2️⃣ Session Manager Subsystem (SMSS.EXE)
3️⃣ Client-Server Runtime Process (CSRSS.EXE)
4️⃣ Wininit.exe (Windows Initialization Process)
5️⃣ services.exe (Service Control Manager)
6️⃣ lsass.exe (Local Security Authority Subsystem Service
7️⃣ Windows Logon (WINLOGON.EXE)
8️⃣ Windows Explorer (EXPLORER.EXE)
9️⃣ Svchost.exe

🔘https://soorinsec.ir/core-windows-processes/

#windows
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍32🔥1
🚨 Alert - A critical vulnerability in PuTTY versions 0.68 to 0.80 could lead to private key compromises.

هشدار - یک آسیب پذیری حیاتی در PuTTY نسخه های 0.68 تا 0.80 می تواند منجر به به خطر افتادن کلید خصوصی شود.

➡️ https://thehackernews.com/2024/04/widely-used-putty-ssh-client-found.html
➡️https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-p521-bias.html

Don't let hackers take control—update immediately.

#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
🎖Top 10 Standard IOC and TTPs for SOC

Here is standard top ten common Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) that SOC analysts often encounter over the period.

A: Indicators of Compromise (IOCs):

1.#Malicious IP Addresses: IP addresses associated with known command and control (C2) servers or malicious activities.
2. #Malware Hashes: Hashes of malicious files used in attacks, such as viruses or Trojans.
3. #Domain Names: Suspicious or typo-squatting domains used for phishing or C2 communication.
4. #URLs: Links to malicious websites or payloads, often delivered through phishing emails.
5. #Email Addresses: Addresses used in phishing campaigns or to receive stolen data.
6. #File Paths: Unusual or suspicious file paths on systems or servers.
7. #Registry Keys: Unauthorized or malicious registry keys that may indicate compromise.
8. #User-Agent Strings: Uncommon or malicious user-agent strings in HTTP requests.
9. #YARA Signatures: Custom rules used to detect specific patterns or characteristics in files.
10. #Behavioral Anomalies: Unusual behavior, like excessive data exfiltration or unusual system activities.

B: Tactics, Techniques, and Procedures (TTPs):

1. #Phishing: Attackers use deceptive emails to trick users into revealing sensitive information or executing malicious code.
2. #Malware Delivery: Sending malicious files via email attachments, compromised websites, or other means.
3. #Command and Control (C2): Communication between malware and attacker-controlled servers for remote control and data exfiltration.
4. #Credential Theft: Techniques like keylogging or credential dumping to steal login credentials.
5. #Lateral Movement: Moving laterally within a network to explore and compromise other systems.
6. #Privilege Escalation: Gaining higher-level access to systems by exploiting vulnerabilities or misconfigurations.
7. #Data Exfiltration: Stealing sensitive data and sending it to the attacker-controlled infrastructure.
8. #Denial of Service (DoS): Overwhelming a system or network to disrupt availability.
9. #Ransomware: Encrypting data and demanding a ransom for decryption.
10. #Fileless Attacks: Exploiting legitimate system tools and processes to carry out attacks without leaving traces on disk.

These IOCs and TTPs are just a starting point, as the threat landscape is constantly evolving.

Effective SOC analysts should continuously update their knowledge and adapt their detection strategies to new attack techniques by keeping themselves up to date with Applicable threats based on the type of industry.

#TTP #IOC
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
👍1👏1
Comparison_of_SOC_Workflow_Automation_Options_for_SMEs_and_Practical.pdf
1.6 MB
📚Comparison of SOC Workflow Automation
Options for SMEs and Practical Impact Analysis


#SOC
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM