Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.54K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
/ Android Security Bulletin—December 2022

https://source.android.com/docs/security/bulletin/2022-12-01
/ Abusing JSON-Based SQL to Bypass WAF

…Our bypass worked against WAFs sold by five leading vendors: Palo Alto Networks, Amazon Web Services, Cloudflare, F5, and Imperva. All five have been notified and have updated their products to support JSON syntax in their SQL injection inspection process…

https://claroty.com/team82/research/js-on-security-off-abusing-json-based-sql-to-bypass-waf
/ FortiOS - heap-based buffer overflow in sslvpnd

Impact Execute unauthorized code or commands:

https://www.fortiguard.com/psirt/FG-IR-22-398
/ Windows SmartScreen Security Feature Bypass Vulnerability

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-44698
Open BLD DNS has emergency maintenance mode for next ~10 min, don’t worry

up
Done
/ Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware

— The malicious drivers are signed directly by Microsoft and identifying the original software vendor requires inspecting the signature with code
— Several distinct malware families, associated with distinct threat actors, have been signed with this process


One: https://www.mandiant.com/resources/blog/hunting-attestation-signed-malware
Two: https://www.sentinelone.com/labs/driving-through-defenses-targeted-attacks-leverage-signed-malicious-microsoft-drivers/
Открытый практикум DevOps by Rebrain: Dockerfile

Программа:
• Создание простейшего Dockerfile в три строки
• Разбор оптимального алгоритма создания Dockerfile (в т.ч. multistage)
• Научимся создавать минимальный docker image

• 20 Декабря (Вторник) в 19:00 по МСК. Детали
/ Linux Kernel: UAF in Bluetooth L2CAP Handshake

https://www.openwall.com/lists/oss-security/2022/12/14/7
/ OpenVAS - based free online scanner

Yesterday I found helpful online tool - nmap, cve and etc online scanner, free for 10 time scans in month, this is can be enouth for personal/own ASV scans:

https://hostedscan.com/scans
/ How to Detect Malicious OAuth Device Code Phishing

Here’s a quick TL;DR of the attack – in short, an attacker generates a user code and sends it to a victim in a phishing email. The user is then tricked into inputting the code into a Microsoft owned verification link. Upon success, the attacker can fetch both the user’s refresh and access token. This allows the attacker access to the user account:

https://www.inversecos.com/2022/12/how-to-detect-malicious-oauth-device.html