Ruby Of Security – Telegram
Ruby Of Security
1.14K subscribers
151 photos
9 videos
114 files
1.03K links
Here you will find content like:

🌎 Notícias | 📡 Tecnologia | 🌐Hacking
📚 Cursos | Ferramentas | 📝Tutoriais

@DARKNET_BR
@TIdaDepressaoOficial
@ExploitHub
@AcervoDoSam

Acervo:@AcervoRubyOfSec

Group:@RubyOfSecGroup

© Ruby Of Security - 2014 - 2019
Download Telegram
Você já sabe que o BadUSB é uma "vulnerabilidade" nas unidades flash USB que permite reprogramar para que funcionem como um teclado ou digite comandos nas máquinas de destino.

Elite:
. Os noscripts são armazenados em um cartão microSD, sem reprogramar o MalDuino para cada noscript!
. Possui um conjunto de comutadores DIP, que permite armazenar muitos noscripts em um cartão microSD e alternar entre eles.
. Não há limite de tamanho de noscript, desde que ele caiba no cartão microSD.

- Lite:
. O menor e o mais oculto dos dois.
. Use os 30kb de memória interna para armazenar noscripts (mais do que suficiente para a maioria dos noscripts)
. Ele incorpora uma opção para desativar o dispositivo, para que não seja executado quando você desejar programá-lo.



URL do vídeo: https://youtu.be/nNDWdmJI6bw

Com qualquer uma das duas versões, é possível obter um shell reverso, alterar o plano de fundo da área de trabalho e fazer outras piadas ... A coisa boa: teremos o código fonte.Com qualquer uma das duas versões, é possível obter um shell reverso, alterar o plano de fundo da área de trabalho e fazer outras piadas ... A coisa boa: teremos o código fonte ...

Projeto: https://www.indiegogo.com/projects/malduino-badusb-arduino-usb#/

fonte: http://hpysrwnlmylhsxkd.onion/discussion/116/malduino-el-badusb-open-source-construido-sobre-arduino
Cyber Kiosks: The Digital Age Weapon of Police Scotland

Police Scotland has geared up for the first phase roll-out of Digital Triage Devices, known as Cyber Kiosks, on January 20, 2020. These Cyber Kiosks are desktop computers configured with a special software, and are approved by Police Scotland’s Strategic Leadership Board. In the first phase, 41 police stations across local policing divisions will receive these Cyber Kiosks. This new device empowers Police Scotland to detect and mitigate cybercrimes at a granular level.

How do Cyber Kiosks Work?
Cyber Kiosks allow its operator to carry-out a specific search on a mobile or tablet device for criteria such as:
Date
Time
Telephone number

Cyber Kiosks also enable a filtered search of text messages or photographs on the scanned device. On identification of critical/criminal information on a device, it is submitted to a Digital Forensics Hub for further examination and evidence for court. This quickens the progress of investigations and leads to quicker return of irrelevant devices. Identification of evidence at early stages largely enhances the ability of threat detection and inversely helps in bringing down the crime rate...

Mais aqui : https://www.cisomag.com/cyber-kiosks-the-digital-age-weapon-of-police-scotland/
PinePhone é um celular de US$ 150 que roda Linux

Você paga US$ 150 por um smartphone e, quando o produto chega, descobre que precisa instalar um sistema operacional nele. Tudo bem para você? Se a resposta for sim, o PinePhone, da Pine64, pode ser a opção ideal para o seu perfil: o celular foi desenvolvido para rodar Linux, mas é você quem deve instalar uma das distribuições disponíveis.

Fonte: https://www.google.com/amp/s/tecnoblog.net/321779/pine64-pinephone-celular-roda-distribuicao-linux/amp/
Conheça o ScyllaDB, um banco de dados NoSQL colunar para ambientes de Big Data.

Neste artigo você terá uma visão arquitetural, funcional e também a oportunidade de fazer um hands-on com Docker criando um cluster com o banco.

<https://autociencia.blogspot.com/2020/01/scylladb-um-banco-de-dados-nosql-big-data.html>

De : #autociencia
Por : #Clederson
Para quem quiser um ambiente de desenvolvimento completo, instale o meu arquivo de configuração VIM/Neovim https://github.com/foxx3r/amazing-vimrc, na qual inclui:

* Suporte a REPL integrado com Ctrl + a
* Compilação automática com Ctrl + g
* Auto complete baseado em texto já digitado e auto-complete integrado de HTML
* Suporte a 743 linguagens
* Destaque de sintaxe para 743 linguagens e destaque de link/IP
* Pesquisa com regex integrada
* Análise sintática
* Pesquisa por diretórios
* Possível abrir uma janela com diretórios
* Fechamento automático de crases, parenteses, aspas, aspas simples, colchetes e chaves
* Colorscheme leve que não cansa os olhos
* Agora integrado agora um sistema de backup caso o VIM ou o sistema entre em pânico
* Changelog integrado com suporte a inglês e português
* Rola a janela abaixo (ao splitar o editor) de maneira mais amigável com ALT + teclas (down, up)
* Comentário automático
* Indentação automática
* TAB para 4 espaços (Recomendado)
* Espaços ao invés de TAB (Recomendado principalmente para Python)
* Suporte aos 3 gerenciadores de pacotes mais conhecidos do VIM/Neovim

Por : @foxx3r
Forwarded from Acervo D'& Notícias (>_Cyb3r P1rat3)
📡 Live Recent
🗂 VulDB
🌐 https://vuldb.com/?live.recent
Microsoft Zero-Day Actively Exploited, Patch Forthcoming

CVE-2020-0674 is a critical flaw for most Internet Explorer versions, allowing remote code execution and complete takeover.

An unpatched remote code-execution vulnerability in Internet Explorer is being actively exploited in the wild, Microsoft has announced. It’s working on a patch. In the meantime, workarounds are available.

The bug (CVE-2020-0674) which is listed as critical in severity for IE 11, and moderate for IE 9 and IE 10, exists in the way that the jnoscript.dll noscripting engine handles objects in memory in the browser, according to Microsoft’s advisory, issued Friday.

The vulnerability could corrupt memory in such a way that an attacker could execute arbitrary code in the context of the current user – meaning that an adversary could gain the same user rights as the current user.

“If the current user is logged on with administrative user rights, an attacker who successfully exploited the vulnerability could take control of an affected system,” Microsoft explained. “An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.”(...)


Leia mais em - Fonte : https://threatpost.com/microsoft-zero-day-actively-exploited-patch/152018/
Forwarded from Tica 0x177
em uma das diretivas eh pedido o analises dos firmware
Forwarded from Tica 0x177
nao especificamente
Forwarded from Tica 0x177
hen someone really needs the information off of a damaged hard drive, they call Persistence. This would be a unique tour learning from a world-class expert how to fix hardware and firmware problems. You would be working on targets, extracting data, troubleshooting hardware, rebuilding SCSI arrays, and using analytical engineering skill to produce real collection. Position requires good hearing for some of the troubleshooting. Intern should know how to solder.
Forwarded from Tica 0x177
(U) IRATEMONK [edit] (TS//SI//REL) SSD Support (TS//SI//REL) Integrate SSD research into IRATEMONK products. This will involve 4 different parts: • (TS//SI//REL) Leveraging research to create ARM-based SSD implant. This works involves reverse engineering SSD firmware and creating C and ARM assembly code to place inside of a firmware image to implement the IRATEMONK algorithm. • (TS//SI//REL) Create version of the IMBIOS code that supports the SSD implant. This code runs on the x86 host and involves writing both C and
Forwarded from Tica 0x177
x86 assembly. This work will involve interacting with the firmware implant as well as the code that IMBIQS bootstraps (SIERRAMIST). • (TS//SI//REL) Add support for the SSD to WICKEDVICAR. WICKEDVICAR is the remote tool used to perform remote survey and installation. This code is C + + and will involve interacting with the firmware implant from a Windows OS. • (TS//SI//REL) Add the SSD vendor support to the IRATEMONK firmware and implant database tool. This code is mostly python code that interacts with a drive via a Linux driver.
Forwarded from Tica 0x177
eles puderam ter accesso aos firmwares das companias pedindo uma revisão
Forwarded from Tica 0x177
o que eh bastante comum, uma agencia de segurança fazer uma revisão do sistema quando ele eh vendido por uma empresa extrangeira
Forwarded from Tica 0x177
com accesso eles conseguiram o firmware
Forwarded from Tica 0x177
hackearam e modificaram o accesso de datos
Forwarded from Tica 0x177
Create a covert storage product that is enabled from a hard drive firmware modification. The idea would be to modify the firmware of a particular hard drive so that it normally only recognizes say half of its available space. It would report this size back to the operating system and not provide any way to access the additional space. The firmware would have a special hook inside of it that on receipt of some custom ATA command, it would "unlock" the rest of the drive on the next boot of the drive. When covert storage is locked, only 1 partition would be present on the drive. When unlocked, the firmware would fix up the partition table to account for the second hidden partition whose space is now available on the drive. When finished with covert storage, a special command can be sent back to the drive that will lock the drive again. On the next boot, the firmware will hide the extra space and fix up the partition table so only 1 partition exists.
Forwarded from Tica 0x177
aqui temos as implementações RC6/5