یک Methodology درمورد مهندسی معکوس درایورهای ویندوز که بسیار کاربردی و مفید هست .
مثالی ساده ای که زده برای شناسایی IOCTL کد ها و عملکردشون برای اینکه بفهمیم از چه روشی برای بافر استفاده میکنه.کشف DriverEntry برای اینکه بدونیم از کدوم هندلر استفاده میکنه برای تعیین IRP ها.
https://voidsec.com/windows-drivers-reverse-engineering-methodology/
#reverse #dispatch #MSRS
@securation
مثالی ساده ای که زده برای شناسایی IOCTL کد ها و عملکردشون برای اینکه بفهمیم از چه روشی برای بافر استفاده میکنه.کشف DriverEntry برای اینکه بدونیم از کدوم هندلر استفاده میکنه برای تعیین IRP ها.
https://voidsec.com/windows-drivers-reverse-engineering-methodology/
#reverse #dispatch #MSRS
@securation
VoidSec
Windows Drivers Reverse Engineering Methodology
Methodology for reverse engineering Windows drivers, finding vulnerabilities and understanding their exploitability.
👍1
Security Analysis
https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
GitHub
GitHub - berdav/CVE-2021-4034: CVE-2021-4034 1day
CVE-2021-4034 1day. Contribute to berdav/CVE-2021-4034 development by creating an account on GitHub.
⭕️ Exploiting URL Parsing Confusion
https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing-confusion/ #web #bughunting
@securation
https://claroty.com/2022/01/10/blog-research-exploiting-url-parsing-confusion/ #web #bughunting
@securation
⭕️ Source codes of Windows API Exploitation for Red and Blue teams from Pentester Academy
https://github.com/tbhaxor/WinAPI-RedBlue
#api #exploit #redteam #blueteam
@securation
https://github.com/tbhaxor/WinAPI-RedBlue
#api #exploit #redteam #blueteam
@securation
GitHub
GitHub - tbhaxor/WinAPI-RedBlue: Source code of exploiting windows API for red teaming series
Source code of exploiting windows API for red teaming series - tbhaxor/WinAPI-RedBlue
👍1
مایکروسافت یک حمله DDoS را که به مشتریان Azure با حداکثر سرعت 3.47 ترابیت در ثانیه و دو حمله دیگر که به 2.4 ترابیت در ثانیه رسید، دفع کرد و رکورد را شکست !
https://thehackernews.com/2022/01/microsoft-mitigated-record-breaking-347.html
#DDOS #Attack
@securation
https://thehackernews.com/2022/01/microsoft-mitigated-record-breaking-347.html
#DDOS #Attack
@securation
👍5👎1
⭕️ A tool to hide your payload in DNS
https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
@securation
https://shells.systems/unveiling-dnsstager-a-tool-to-hide-your-payload-in-dns/
@securation
Shells.Systems
Unveiling DNSStager: A tool to hide your payload in DNS - Shells.Systems
Estimated Reading Time: 8 minutesIn the past few weeks, I was working on a new project that could help me to solve an issue during a case I was facing, I needed a tool to help me pulling off my payload through DNS without being noisy or suspicious with the…
👍6🤩1
Intro to Embedded RE: UART Discovery and Firmware Extraction via UBoot
https://voidstarsec.com/blog//2022/01/27/uart-uboot-and-usb
https://voidstarsec.com/blog//2022/01/27/uart-uboot-and-usb
👍1