👍4
Cryptojacking via CVE-2023-22527: Dissecting a Full-Scale Cryptomining Ecosystem
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
A technical analysis on how CVE-2023-22527 can be exploited by malicious actors for cryptojacking attacks that can spread across the victim’s system.
https://www.trendmicro.com/en_us/research/24/h/cve-2023-22527-cryptomining.html
👍3
Attribution of Advanced Persistent Threats
How to Identify the Actors Behind Cyber-Espionage
How to Identify the Actors Behind Cyber-Espionage
👍4
Automating Malware Deobfuscation with Binary Ninja
Writing a Static Unpacker
This section will teach participants how to automate unpacking and decryption of malware samples. This will be accomplished using the Qakbot sample as an example. The Qakbot sample is packed (obfuscated using an external program that “unpacks itself”) and therefore we will perform multiple hands-on exercises to automate the extraction of Qakbot from its packed form using Binary Ninja, PEFile and Binary Refinery.
+ The first exercise will teach attendees how to use Binary Ninja to identify the encryption algorithm used by the first stage of the packer and how to extract key information to decrypt the second stage.
+The next exercise will teach attendees how to use PEFile to extract an embedded resource from the packed binary. Once extracted, the resource will then be decrypted using the key information from the first exercise
The next exercise will teach attendees how to use Binary Refinery to carve binary files from the decrypted resource
Code
Slides
Workshop Manual
Writing a Static Unpacker
This section will teach participants how to automate unpacking and decryption of malware samples. This will be accomplished using the Qakbot sample as an example. The Qakbot sample is packed (obfuscated using an external program that “unpacks itself”) and therefore we will perform multiple hands-on exercises to automate the extraction of Qakbot from its packed form using Binary Ninja, PEFile and Binary Refinery.
+ The first exercise will teach attendees how to use Binary Ninja to identify the encryption algorithm used by the first stage of the packer and how to extract key information to decrypt the second stage.
+The next exercise will teach attendees how to use PEFile to extract an embedded resource from the packed binary. Once extracted, the resource will then be decrypted using the key information from the first exercise
The next exercise will teach attendees how to use Binary Refinery to carve binary files from the decrypted resource
Code
Slides
Workshop Manual
👍6
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
(Used by APT-60)
#apt #analysis #cve
(Used by APT-60)
#apt #analysis #cve
👍7🌚1
The SOS Intelligence CVE Chatter Weekly Top Ten
This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.
https://sosintel.co.uk/category/cve-top-10/
———
CISA (America's Cyber Defence Agency )
Bulletins provide weekly summaries of new vulnerabilities.
https://www.cisa.gov/news-events/bulletins
———
This weekly blog post is from via our unique intelligence collection pipelines. We are your eyes and ears online, including the Dark Web.
https://sosintel.co.uk/category/cve-top-10/
———
CISA (
Bulletins provide weekly summaries of new vulnerabilities.
https://www.cisa.gov/news-events/bulletins
———
👍5❤1
Silly EDR Bypasses and Where To Find Them
Credit: Marcus Hutchins
_ Article _
https://github.com/MalwareTech/EDRception.git
#edr #redteam
Credit: Marcus Hutchins
A proof of concept for abusing exception handlers to hook and bypass user mode EDR hooks.
_ Article _
https://github.com/MalwareTech/EDRception.git
#edr #redteam
👍6
Forwarded from Infosec Fortress
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
#vulnerability
#research
#vr
#conference
Video
———
🆔 @Infosec_Fortress
#vulnerability
#research
#vr
#conference
Video
———
🆔 @Infosec_Fortress
YouTube
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101
If you’re interested in vulnerability research for fun or profit, or if you’re a beginner and you’re not sure how to progress, it can be difficult to sift through the firehose of technical information that’s out there. Plus there are all sorts of non-technical…
❤3👍3
Forwarded from Source Chat (Friend)
Please open Telegram to view this post
VIEW IN TELEGRAM
Forwarded from Order of Six Angles
The tragedy of low-level exploitation
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
https://gynvael.coldwind.pl/?id=791
похожие мысли всегда в голове крутились
gynvael.coldwind.pl
FAQ: The tragedy of low-level exploitation
👍4🤣3