Forwarded from ..: لیکفا | Leakfa :..
🚨 نقض جدید: اطلاعات میلیونها شهروند ایرانی تحت پوشش سازمان بیمه سلامت در خطر افشای گسترده
مهاجمان توانستهاند به اطلاعات شخصی و بیمهای شهروندان، کارکنان دولت و سایر بیمه شدگان "سازمان بیمه سلامت ایران" دسترسی پیدا کنند. هنوز جزئیات دقیقی از میزان اطلاعات به سرقت رفته و یا استفاده احتمالی از آنها منتشر نشده است. با این حال، تاکنون مجموعه بزرگی در حدود 1 میلیون خط نام، نام خانوادگی، تاریخ تولد، نام پدر، شماره ملی، شماره تلفن همراه، وضعیت حیات، شناسه بیمه گذار، نام بیمه گذار و اطلاعات دیگری از این دادهها توسط هکر/هکرها به صورت عمومی منتشر شده است.
📌 اطلاعات افشاشده میتواند پیامدهای جدی مانند سرقت هویت، افزایش کلاهبرداریهای فیشینگ و کاهش اعتماد عمومی را به دنبال داشته باشد. کاربران باید هوشیار بوده و از ارائه اطلاعات شخصی در تماسها یا پیامهای مشکوک خودداری کنند.
✅ صحت دادههای نمونه بررسی شده و قابل تایید است!
🆔 @leakfarsi
مهاجمان توانستهاند به اطلاعات شخصی و بیمهای شهروندان، کارکنان دولت و سایر بیمه شدگان "سازمان بیمه سلامت ایران" دسترسی پیدا کنند. هنوز جزئیات دقیقی از میزان اطلاعات به سرقت رفته و یا استفاده احتمالی از آنها منتشر نشده است. با این حال، تاکنون مجموعه بزرگی در حدود 1 میلیون خط نام، نام خانوادگی، تاریخ تولد، نام پدر، شماره ملی، شماره تلفن همراه، وضعیت حیات، شناسه بیمه گذار، نام بیمه گذار و اطلاعات دیگری از این دادهها توسط هکر/هکرها به صورت عمومی منتشر شده است.
📌 اطلاعات افشاشده میتواند پیامدهای جدی مانند سرقت هویت، افزایش کلاهبرداریهای فیشینگ و کاهش اعتماد عمومی را به دنبال داشته باشد. کاربران باید هوشیار بوده و از ارائه اطلاعات شخصی در تماسها یا پیامهای مشکوک خودداری کنند.
✅ صحت دادههای نمونه بررسی شده و قابل تایید است!
🆔 @leakfarsi
..: لیکفا | Leakfa :..
🚨 نقض جدید: اطلاعات میلیونها شهروند ایرانی تحت پوشش سازمان بیمه سلامت در خطر افشای گسترده مهاجمان توانستهاند به اطلاعات شخصی و بیمهای شهروندان، کارکنان دولت و سایر بیمه شدگان "سازمان بیمه سلامت ایران" دسترسی پیدا کنند. هنوز جزئیات دقیقی از میزان اطلاعات…
maybe only the company info and not customers ...
( Only around 1000 users )
( Only around 1000 users )
💔4
Master Code Security Review
Learn to research vulnerabilities by reviewing the source code of real-world cases.
http://vulnerable.codes/register
Learn to research vulnerabilities by reviewing the source code of real-world cases.
http://vulnerable.codes/register
❤6
Hi everyone ,
I see my duty to inform you you should not share your sensitive information ( specially your resume - which may contains your contact information, city , abilities ... ) to unofficial individuals .
Like this case , an unofficial individual collecting job résumé from people for a job opportunity
Plz find a job through popular/official platform and not from a unknown risky guy on telegram
Have a nice day
I see my duty to inform you you should not share your sensitive information ( specially your resume - which may contains your contact information, city , abilities ... ) to unofficial individuals .
Like this case , an unofficial individual collecting job résumé from people for a job opportunity
Plz find a job through popular/official platform and not from a unknown risky guy on telegram
Have a nice day
👍45🤯28❤1
Win_Sec_Int.pdf
6.3 MB
"Windows Security Internals:
A Deep Dive into Windows Authentication, Authorization, and Auditing", 2024.
👍12
Forwarded from /mdre/
Guys if you like my posts, please don't mind to share them, it will help channel grow :)
👍6
𝐅𝐢𝐧𝐝 𝐚𝐥𝐥 𝐩𝐫𝐢𝐯𝐚𝐭𝐞 𝐠𝐫𝐨𝐮𝐩𝐬 𝐜𝐫𝐞𝐚𝐭𝐞𝐝 𝐛𝐲 𝐚 𝐓𝐞𝐥𝐞𝐠𝐫𝐚𝐦 𝐮𝐬𝐞𝐫 𝐮𝐬𝐢𝐧𝐠 𝐭𝐡𝐞𝐢𝐫 𝐓𝐆 𝐈𝐃!
This method is extremely handy for SOCMINT investigations and can potentially reveal all private groups created by a specific Telegram user.
When Telegram generates an invite link prefix for private groups, it translates the user ID into a 32-bit hexadecimal value and then encodes it using a base64 algorithm. The resulting invite link structure looks like this:
𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐛𝐚𝐬𝐞64_𝐕𝐚𝐥𝐮𝐞
Alright… here’s how you do it. Say we have the following 𝐓𝐆 𝐈𝐃: 1111111111
Using e.g. Cryptii, simply insert the TG ID as input and convert it to a 32-bit hex string.
𝐓𝐡𝐞 𝐫𝐞𝐬𝐮𝐥𝐭𝐢𝐧𝐠 32-𝐛𝐢𝐭 𝐡𝐞𝐱 𝐢𝐬: 42 3𝐚 35 𝐜7
https://cryptii.com/pipes/integer-encoder
Next, with CyberChef, encode the 32-bit hex as base64.
𝐓𝐡𝐞 𝐫𝐞𝐬𝐮𝐥𝐭 𝐢𝐬: 𝐐𝐣𝐨1𝐱𝐰
https://gchq.github.io/CyberChef/
Since private chat invite URLs only consist of 5 characters, we remove the last character, leaving us with Qjo1x.
All private invite links follow this structure:
𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱
Now, you can search for this in your preferred search engine:
"𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱"
𝐁𝐨𝐧𝐮𝐬 𝐓𝐢𝐩:
You can also check the URL with the Wayback Machine to see if there are any archived versions of the target URL.
𝐡𝐭𝐭𝐩𝐬://𝐰𝐞𝐛.𝐚𝐫𝐜𝐡𝐢𝐯𝐞.𝐨𝐫𝐠/𝐰𝐞𝐛/*/𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱/*
credits : Valdemar B.
This method is extremely handy for SOCMINT investigations and can potentially reveal all private groups created by a specific Telegram user.
When Telegram generates an invite link prefix for private groups, it translates the user ID into a 32-bit hexadecimal value and then encodes it using a base64 algorithm. The resulting invite link structure looks like this:
𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐛𝐚𝐬𝐞64_𝐕𝐚𝐥𝐮𝐞
Alright… here’s how you do it. Say we have the following 𝐓𝐆 𝐈𝐃: 1111111111
Using e.g. Cryptii, simply insert the TG ID as input and convert it to a 32-bit hex string.
𝐓𝐡𝐞 𝐫𝐞𝐬𝐮𝐥𝐭𝐢𝐧𝐠 32-𝐛𝐢𝐭 𝐡𝐞𝐱 𝐢𝐬: 42 3𝐚 35 𝐜7
https://cryptii.com/pipes/integer-encoder
Next, with CyberChef, encode the 32-bit hex as base64.
𝐓𝐡𝐞 𝐫𝐞𝐬𝐮𝐥𝐭 𝐢𝐬: 𝐐𝐣𝐨1𝐱𝐰
https://gchq.github.io/CyberChef/
Since private chat invite URLs only consist of 5 characters, we remove the last character, leaving us with Qjo1x.
All private invite links follow this structure:
𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱
Now, you can search for this in your preferred search engine:
"𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱"
𝐁𝐨𝐧𝐮𝐬 𝐓𝐢𝐩:
You can also check the URL with the Wayback Machine to see if there are any archived versions of the target URL.
𝐡𝐭𝐭𝐩𝐬://𝐰𝐞𝐛.𝐚𝐫𝐜𝐡𝐢𝐯𝐞.𝐨𝐫𝐠/𝐰𝐞𝐛/*/𝐭.𝐦𝐞/𝐣𝐨𝐢𝐧𝐜𝐡𝐚𝐭/𝐐𝐣𝐨1𝐱/*
credits : Valdemar B.
👍10👎4🤔3🔥2🗿2
Source Byte
𝐅𝐢𝐧𝐝 𝐚𝐥𝐥 𝐩𝐫𝐢𝐯𝐚𝐭𝐞 𝐠𝐫𝐨𝐮𝐩𝐬 𝐜𝐫𝐞𝐚𝐭𝐞𝐝 𝐛𝐲 𝐚 𝐓𝐞𝐥𝐞𝐠𝐫𝐚𝐦 𝐮𝐬𝐞𝐫 𝐮𝐬𝐢𝐧𝐠 𝐭𝐡𝐞𝐢𝐫 𝐓𝐆 𝐈𝐃! This method is extremely handy for SOCMINT investigations and can potentially reveal all private groups created by a specific Telegram user. When Telegram generates an invite link prefix…
it just doesn't make sense.
👍10😁1🗿1👾1
Persistence via App Registration in Entra ID
https://cyberdom.blog/persistence-via-app-registration-in-entra-id/
https://cyberdom.blog/persistence-via-app-registration-in-entra-id/
❤3
Forwarded from Сводки частной разведки
ta-2023-0601.pdf
2.9 MB
The People’s Liberation Army (PLA) is using new collection, processing, and analysis technologies to exploit the massive amount of open-source information available from the internet and other sources for military intelligence purposes. A growing ecosystem of private companies, state-owned enterprises, state-run research organizations, and universities is supporting the PLA’s push to leverage open-source intelligence (OSINT) by providing research services, platforms, and data. China’s military and defense industries are using automated web crawlers, algorithms, machine learning, artificial intelligence, and other tools to extract intelligence from foreign governments, militaries, social media platforms, news media organizations, companies, research organizations, and individuals. The PLA very likely employs OSINT alongside other, more sensitive forms of intelligence to support decision-making at the strategic, operational, and tactical levels. The PLA’s use of OSINT very likely provides it an intelligence advantage, as the West’s open information environment allows the PLA to easily harvest large quantities of open-source data, whereas Western militaries must contend with China’s closed
information environment. This report offers an overview of Chinese views on military OSINT, details how the PLA applies and collects OSINT, and profiles several private companies that provide OSINT to the PLA.
Источник: @freedomf0x
Please open Telegram to view this post
VIEW IN TELEGRAM
FromaCprojectthroughassemblytoshellcodeHasherezade.pdf
1.3 MB
FromaCprojectthroughassemblytoshellcodeHasherezade.pdf
Forwarded from tiivik️
🆔@tiivik
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4
tiivik️
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect:
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Telegram usernames (@username)
Email addresses
Phone numbers
All extracted data is saved to a CSV file for easy access and further processing.
Source Byte
This tool connects to the Telegram API and scans messages in specified groups or channels to extract and collect: Telegram usernames (@username) Email addresses Phone numbers All extracted data is saved to a CSV file for easy access and further processing.
useful for leveraging your TI feeds
❤6👍1😁1
ScriptBlock Smuggling:
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
Spoofing PowerShell Security Logs and Bypassing AMSI Without Reflection or Patching
❤1👍1