A 0-day vulnerability in PAN-OS that allows an unauthenticated attacker to execute arbitrary code on the firewall with root rights. According to Palo Alto Networks, attacks have already been carried out that exploit this vulnerability!
👉 Dork: tag.name:"palo_alto"
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
Palo Alto Networks Product Security Assurance
CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurat...
Search for data on vulnerabilities and indicators of compromise Search for data on vulnerabilities and indicators of compromise
🔎 Online services
⏺ MITRE CVE — is a search engine, database and generally accepted classifier of vulnerabilities.
⏺ NIST NVD — search the official American government vulnerability database.
⏺ GitHub Advisory Database — a database of vulnerabilities that includes CVEs and security recommendations.
⏺ CVEDetails, osv.dev, VulDB, maltiverse — a number of other sources of data on vulnerabilities and indicators of compromise.
⏺ opencve.io — CVE search engine with built-in alerts new threats.
⏺ security.snyk.io и Mend Vulnerability Database, Vulncode-DB — open source vulnerability databases.
#tool #CVE
تیم سورین
#tool #CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub Advisory Database
A database of software vulnerabilities, using data from maintainer-submitted advisories and from other vulnerability databases.
❤2
این راه حل به شما این امکان را می دهد که به راحتی یک آزمایشگاه کامل را برای ایجاد/آزمایش detection rules خود، شبیه سازی گزارش ها، اجرای آزمایش ها، دانلود و اجرای بدافزارها و تکنیک های حمله miter، بازیابی سندباکس و بسیاری ویژگی های دیگر مستقر کنید.
تیم سورین
#purple
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1
ابزار MasterParser بهعنوان یک ابزار قوی Digital Forensics و Incident Response است که به دقت برای تجزیه و تحلیل لاگهای لینوکس در فهرست var/log ساخته شده است. MasterParser که به طور خاص برای تسریع فرآیند تحقیق در مورد حوادث امنیتی در سیستمهای لینوکس طراحی شده است، به طور ماهرانه لاگهای پشتیبانی شده مانند auth.log را اسکن میکند، جزئیات حیاتی از جمله ورود به سیستم SSH، ایجاد کاربر، نام رویداد، آدرس IP و موارد دیگر را استخراج میکند. خلاصه تولید شده ابزار این اطلاعات را در قالبی واضح و مختصر ارائه میکند و کارایی و دسترسی را برای پاسخدهندگان حادثه افزایش میدهد.
#IR #DFIR #Linux
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - securityjoes/MasterParser: MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs
MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs - securityjoes/MasterParser
🤩1
Windows 11 Security Book: Powerful security by design, Microsoft, 2023
Windows 11 is the most secure Windows ever, built in deep partnership with original
equipment manufacturers (OEMs) and silicon manufacturers. Discover why organizations of all sizes, including 90% of Fortune 500 companies, are taking advantage of the powerful default protection of Windows 11.
#docs #windows #defensive
تیم سورین
Windows 11 is the most secure Windows ever, built in deep partnership with original
equipment manufacturers (OEMs) and silicon manufacturers. Discover why organizations of all sizes, including 90% of Fortune 500 companies, are taking advantage of the powerful default protection of Windows 11.
#docs #windows #defensive
تیم سورین
#windows #forensic
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - Psmths/windows-forensic-artifacts: Handbook of windows forensic artifacts across multiple Windows version with interpretation…
Handbook of windows forensic artifacts across multiple Windows version with interpretation tips and some examples. Work in progress! - Psmths/windows-forensic-artifacts
فرآیندهای اصلی ویندوز، بلوکهای ساختمانی ضروری هستند که سیستم را به خوبی اجرا میکنند. درک این فرآیندها میتواند برای عیب یابی مشکلات، شناسایی بدافزارهای بالقوه و به دست آوردن درک عمیق تر از نحوه عملکرد ویندوز مفید باشد.
در این مقاله در مورد ۹ پروسس زیر توضیح داده شده است :
#windows
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
شرکت فناوری راه سورین
فرآیندهای اصلی ویندوز
فرآیندهای اصلی ویندوز - System (System Process) یا پروسس svchost.exe در ویندوز چه وظایفی را بر عهده دارند
👍3❤2🔥1
هشدار - یک آسیب پذیری حیاتی در PuTTY نسخه های 0.68 تا 0.80 می تواند منجر به به خطر افتادن کلید خصوصی شود.
Don't let hackers take control—update immediately.
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
soorinsec.ir
سورین | خدمات امنیت سایبری
سورین ارائه دهنده خدمات امنیت سایبری با کیفیت و حرفهای
Please open Telegram to view this post
VIEW IN TELEGRAM
YouTube
Telegram Has Been Hacked
Learn Cybersecurity - Name Your Price Training with John Hammond: https://nameyourpricetraining.com
📧JOIN MY NEWSLETTER ➡ https://jh.live/email
🙏SUPPORT THE CHANNEL ➡ https://jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ https://jh.live/sponsor
🌎FOLLOW ME EVERYWHERE…
📧JOIN MY NEWSLETTER ➡ https://jh.live/email
🙏SUPPORT THE CHANNEL ➡ https://jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ https://jh.live/sponsor
🌎FOLLOW ME EVERYWHERE…
https://github.com/wpscanteam/wpscan?tab=readme-ov-file
#tools #wordpress #scanner
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - wpscanteam/wpscan: WPScan WordPress security scanner. Written for security professionals and blog maintainers to test…
WPScan WordPress security scanner. Written for security professionals and blog maintainers to test the security of their WordPress websites. Contact us via contact@wpscan.com - wpscanteam/wpscan
Here is standard top ten common Indicators of Compromise (IOCs) and Tactics, Techniques, and Procedures (TTPs) that SOC analysts often encounter over the period.
1.#Malicious IP Addresses: IP addresses associated with known command and control (C2) servers or malicious activities.
2. #Malware Hashes: Hashes of malicious files used in attacks, such as viruses or Trojans.
3. #Domain Names: Suspicious or typo-squatting domains used for phishing or C2 communication.
4. #URLs: Links to malicious websites or payloads, often delivered through phishing emails.
5. #Email Addresses: Addresses used in phishing campaigns or to receive stolen data.
6. #File Paths: Unusual or suspicious file paths on systems or servers.
7. #Registry Keys: Unauthorized or malicious registry keys that may indicate compromise.
8. #User-Agent Strings: Uncommon or malicious user-agent strings in HTTP requests.
9. #YARA Signatures: Custom rules used to detect specific patterns or characteristics in files.
10. #Behavioral Anomalies: Unusual behavior, like excessive data exfiltration or unusual system activities.
1. #Phishing: Attackers use deceptive emails to trick users into revealing sensitive information or executing malicious code.
2. #Malware Delivery: Sending malicious files via email attachments, compromised websites, or other means.
3. #Command and Control (C2): Communication between malware and attacker-controlled servers for remote control and data exfiltration.
4. #Credential Theft: Techniques like keylogging or credential dumping to steal login credentials.
5. #Lateral Movement: Moving laterally within a network to explore and compromise other systems.
6. #Privilege Escalation: Gaining higher-level access to systems by exploiting vulnerabilities or misconfigurations.
7. #Data Exfiltration: Stealing sensitive data and sending it to the attacker-controlled infrastructure.
8. #Denial of Service (DoS): Overwhelming a system or network to disrupt availability.
9. #Ransomware: Encrypting data and demanding a ransom for decryption.
10. #Fileless Attacks: Exploiting legitimate system tools and processes to carry out attacks without leaving traces on disk.
These IOCs and TTPs are just a starting point, as the threat landscape is constantly evolving.
Effective SOC analysts should continuously update their knowledge and adapt their detection strategies to new attack techniques by keeping themselves up to date with Applicable threats based on the type of industry.
#TTP #IOC
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
soorinsec.ir
سورین | خدمات امنیت سایبری
سورین ارائه دهنده خدمات امنیت سایبری با کیفیت و حرفهای
👍1👏1
Please open Telegram to view this post
VIEW IN TELEGRAM
https://labs.nettitude.com/blog/cve-2024-20356-jailbreaking-a-cisco-appliance-to-run-doom/
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
LRQA
CVE-2024-20356: Jailbreaking a Cisco appliance to run DOOM
A walkthrough of CVE-2024-20356, a high severity Command Injection vulnerability affecting a range of Cisco products. This vulnerability can be used in a larger attack chain to compromise the Secure Boot configuration and run unauthorised software (in this…
Oracle VirtualBox Prior to 7.0.16 is vulnerable to Local Privilege Escalation via Symbolic Link Following leading to Arbitrary File Delete and Arbitrary File Move.
#CVE
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - mansk1es/CVE-2024-21111: Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability
Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability - mansk1es/CVE-2024-21111
#kql
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - cyb3rmik3/KQL-threat-hunting-queries: A repository of KQL queries focused on threat hunting and threat detecting for Microsoft…
A repository of KQL queries focused on threat hunting and threat detecting for Microsoft Sentinel & Microsoft XDR (Former Microsoft 365 Defender). - cyb3rmik3/KQL-threat-hunting-queries
Forwarded from PCSG • Girls in Cybersecurity (Azita)
PCSG-SplunkVS.Elk-V1.9.2.pdf
1 MB
درود🪷
در این مقاله سعی کردیم با استفاده از منابع معتبر، دو محصول معروف رو با هم مقایسه کنیم و جنبههای مختلف اونهارو بررسی کنیم، امید داریم زمانی که برای مطالعه این فایل میگذارید براتون مفید باشه.
مثل همیشه از همراهیتون ممنونیم.
⚠️ این سند هر چندماه بروزرسانی خواهد شد ⚠️
Hi 🪷
in this paper we analyse the diffrence between two famous product and talk about diffrent aspects of them, we hope u read and grow.
thanks for your suppurts as always.
-------------------------
📌 Splunk vs. ELK (Version 1.9.2)
✨ Marjan Kamran
🔖 #Paper / #English
🌍 Website • Links • Boost
📑 #PCSGCommunity #SIEM #ELK #Splunk #Elasticsearch #ElasticStack #Hadoop
در این مقاله سعی کردیم با استفاده از منابع معتبر، دو محصول معروف رو با هم مقایسه کنیم و جنبههای مختلف اونهارو بررسی کنیم، امید داریم زمانی که برای مطالعه این فایل میگذارید براتون مفید باشه.
مثل همیشه از همراهیتون ممنونیم.
⚠️ این سند هر چندماه بروزرسانی خواهد شد ⚠️
Hi 🪷
in this paper we analyse the diffrence between two famous product and talk about diffrent aspects of them, we hope u read and grow.
thanks for your suppurts as always.
-------------------------
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1🙏1💯1
Learn Python for Data Science in 2024
Learn Python 3 repo
A collection of Jupyter notebooks for learning Python.
GitHub repo link
The Algorithms repo
All algorithms implemented in Python for training.
GitHub repo link
Awesome Python repo
A list of great Python frameworks, libraries, software, and resources.
GitHub repo link
100 Days of ML repo
Learning algorithms and building neural networks without any programming experience.
GitHub repo link
Cosmic Python book repo
A book on Python's functional architectural patterns for managing complexity.
GitHub repo link
A Byte of Python book repo
If you do not learn Python programming, start with this book.
GitHub repo link
Python Machine Learning book repo
Python Machine Learning book code repository.
GitHub repo link
Repo of interactive interview challenges
120+ interactive Python coding interview challenges.
GitHub repo link
Repo of coding problems
Solutions for various coding/algorithmic problems.
GitHub repo link
Python Basics repo
A list of 300 Python interview questions + answer sheet.
GitHub repo link
Python programming exercises repo
100+ challenging Python programming exercises.
GitHub repo link
#python
تیم سورین
Please open Telegram to view this post
VIEW IN TELEGRAM
GitHub
GitHub - jerry-git/learn-python3: Jupyter notebooks for teaching/learning Python 3
Jupyter notebooks for teaching/learning Python 3. Contribute to jerry-git/learn-python3 development by creating an account on GitHub.
👍1