Forwarded from Hattori Hanzo
👍8🤔1🤩1
Dev 101: Bypassing ASLR on windows
“Note: This post is quite theoretical (yuk!) but I’ll work on providing a hands-on demo sometime in the future. Also given the current mitigations in Windows, you’ll need much more than bypassing ASLR”
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
“Note: This post is quite theoretical (yuk!) but I’ll work on providing a hands-on demo sometime in the future. Also given the current mitigations in Windows, you’ll need much more than bypassing ASLR”
https://www.abatchy.com/2017/06/exploit-dev-101-bypassing-aslr-on.html
👍7🔥1
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies
This article will evaluate detection methods for Windows local privilege escalation techniques based on dynamic behaviors analysis using Elastic Defend features.
credit : SAMIR BOUSSEADEN
https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies
———
@islemolecule_source
This article will evaluate detection methods for Windows local privilege escalation techniques based on dynamic behaviors analysis using Elastic Defend features.
credit : SAMIR BOUSSEADEN
https://www.elastic.co/security-labs/itw-windows-lpe-0days-insights-and-detection-strategies
———
@islemolecule_source
👍4🔥1
How APT groups operate in the Middle East
https://www.ptsecurity.com/ww-en/analytics/apt-groups-in-the-middle-east/
———
@islemolecule_source
The Middle East is a target for APT groups
How cybercriminals prepared for attacks
Gaining initial access
Persisting in the system
What to study inside
Where to find credentials
How to collect valuable information
Communicating with the C&C server
How to cover the tracks
How to resist APT attacks
About the report
Brief denoscription of APT groups
Heat map of APT tactics and techniques in the Middle East
https://www.ptsecurity.com/ww-en/analytics/apt-groups-in-the-middle-east/
———
@islemolecule_source
👍4
👍4🖕2❤1😁1
Vulnerability Management Lifecycle in DevSecOps
https://blog.gitguardian.com/vulnerability-management-lifecycle-in-devsecops/
———
@islemolecule_source
Vulnerability management overview :
Stages of vulnerability management
+ Identification
+Observability
+Management
https://blog.gitguardian.com/vulnerability-management-lifecycle-in-devsecops/
———
@islemolecule_source
🔥6👍2
Forwarded from Reee Teeee
👍3🔥2
Forwarded from rico
cobaltstrike.zip
65.6 MB
by the way 4.5 decompiled u can recompile if u have skill u can patch the beacon xss rce bug
👍3🥰3
🔥2👍1
Linux is not a secure operating system
https://madaidans-insecurities.github.io/linux.html
credit : madaidan
a security researcher who works on various open source projects, mainly Whonix.
#hardening ,
———
@islemolecule_source
Linux being secure is a common misconception in the security and privacy realm. Linux is thought to be secure primarily because of its source model, popular usage in servers, small userbase and confusion about its security features. This article is intended to debunk these misunderstandings by demonstrating the lack of various, important security mechanisms found in other desktop operating systems and identifying critical security problems within Linux's security model, across both user space and the kernel. Overall, other operating systems have a much stronger focus on security and have made many innovations in defensive security technologies, whereas Linux has fallen far behind.
https://madaidans-insecurities.github.io/linux.html
credit : madaidan
#hardening ,
———
@islemolecule_source
🤯6🤣5👏3💯2😐2😢1🍾1
Abusing undocumented features to spoof PE section headers by x86matthew
https://secret.club/2023/06/05/spoof-pe-sections.html
https://secret.club/2023/06/05/spoof-pe-sections.html
❤2👍1
🔥3👍1🕊1
Forwarded from CyberSecurityTechnologies (-CST-)
#reversing
Reversing Windows Container
Part 1 - Silo:
https://blog.quarkslab.com/reversing-windows-container-episode-i-silo.html
Part 2 - Silo to Server Silo:
https://blog.quarkslab.com/reversing-windows-container-part-ii-silo-to-server-silo.html
Reversing Windows Container
Part 1 - Silo:
https://blog.quarkslab.com/reversing-windows-container-episode-i-silo.html
Part 2 - Silo to Server Silo:
https://blog.quarkslab.com/reversing-windows-container-part-ii-silo-to-server-silo.html
🔥3👍1
‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza
https://www.972mag.com/lavender-ai-israeli-army-gaza/
The Israeli army has marked tens of thousands of Gazans as suspects for assassination, using an AI targeting system with little human oversight and a permissive policy for casualties, +972 and Local Call reveal.
https://www.972mag.com/lavender-ai-israeli-army-gaza/
🤯4🍓1
Source Byte
‘Lavender’: The AI machine directing Israel’s bombing spree in Gaza The Israeli army has marked tens of thousands of Gazans as suspects for assassination, using an AI targeting system with little human oversight and a permissive policy for casualties, +972…
Mind blowing, they give a list to AI then it decides who is going to die 😐