👍3
👍2
👍3
An Introduction to Deep File Inspection® (DFI)
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
inquest.net/blog/an-introduc…
#CVE ,
———
@islemolecule_source
🤔3
Download data from the internet bypassing the firewall using process injection
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
https://github.com/redeflesq/firewall-bypass
#tool
———
@islemolecule_source
👍3
Forwarded from CyberSecurityTechnologies (-CST-)
#Cyber_Education
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
Writing a Debugger
Part 1 - Attaching to a Process
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-1
Part 2 - Register State and Stepping
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-2
Part 3 - Reading Memory
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-3
Part 4 - Exports and Private Symbols
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-4
Part 5 - Breakpoints
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-5
Part 6 - Stacks
https://www.timdbg.com/posts/writing-a-debugger-from-scratch-part-6
🔥3👍2
👍2
Forwarded from APT
298559809-27f286d7-e0e3-47ab-864a-e040f8749708.webm
6.5 MB
This vulnerability targets the Common Log File System (CLFS) and allows attackers to escalate privileges and potentially fully compromise an organization’s Windows systems. In April 2023, Microsoft released a patch for this vulnerability and the CNA CVE-2023-28252 was assigned.
📊 Affects version:
— Windows 11 21H2 (clfs.sys version 10.0.22000.1574);
— Windows 11 22H2;
— Windows 10 21H2;
— Windows 10 22H2;
— Windows Server 2022.
Research:
🔗 https://www.coresecurity.com/core-labs/articles/analysis-cve-2023-28252-clfs-vulnerability
Exploit:
🔗 https://github.com/duck-sec/CVE-2023-28252-Compiled-exe
#windows #privesc #clfs #driver
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
👍2
Buffer Overflow Guide 1.pdf
644.8 KB
Buffer Overflow Guide 1.pdf
👍4
Source Byte
Linux Internals and Forensics.pdf
Mr. Kazemi is one of the best teachers in Iran got into problem with an organization for his Linux Internals and Linux Forensics course and that organization did not pay for the course.
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
So the course is published for free by Mr. Kazemi to be reviewed by the public.
This course has high quality because it was created for an important organization.
slides 👆🏻
language : persian
course materials : https://news.1rj.ru/str/source_chat/3075 / https://news.1rj.ru/str/akazemi67_courses/23
Telegram
Source Byte in Source Chat
❤9👍3
👍2
stack-overflow.pdf
1.6 MB
stack-overflow.pdf
qses-08-buffer-overflows_part2.pdf
1.8 MB
qses-08-buffer-overflows_part2.pdf
356lecture21.pdf
3.3 MB
356lecture21.pdf
Lecture21.pdf
441.9 KB
Lecture21.pdf
👍1