Sys-Admin InfoSec – Telegram
Sys-Admin InfoSec
12.7K subscribers
235 photos
2 videos
103 files
4.55K links
News of cybersecurity / information security, information technology, data leaks / breaches, cve, hacks, tools, trainings
* Multilingual (En, Ru).
* Forum - forum.sys-adm.in
* Chat - @sysadm_in
* Job - @sysadm_in_job
* ? - @sysadminkz
Download Telegram
/ How SYS01 Stealer Will Get Your Sensitive Facebook Info

https://blog.morphisec.com/sys01stealer-facebook-info-stealer
/ Stealing the LIGHTSHOW (Part One)

Analysys of phishing campaign targeting a U.S.-based technology companies... The phishing payloads primarily utilized by UNC2970 are Microsoft Word documents embedded with macros to perform remote-template injection to pull down and execute a payload from a remote command and control (C2). Mandiant has observed UNC2970 tailoring the fake job denoscriptions to specific targets:

https://www.mandiant.com/resources/blog/lightshow-north-korea-unc2970
/ Vulnerability CVE-2023-27532 in a Veeam Backup & Replication component allows an unauthenticated user operating within the backup infrastructure network perimeter to obtain encrypted credentials stored in the configuration database. This may lead to an attacker gaining access to the backup infrastructure hosts:

https://www.veeam.com/kb4424
/ Microsoft 365 enumeration, spraying and exfiltration - TeamFiltration in the spotlight

TeamFiltration is self-defined as a cross-platform framework for enumerating, spraying, exfiltrating, and backdooring O365 AAD accounts.

Article, we will look at its capabilities and how we can potentially detect related events in Azure AD and Microsoft 365 logs. While the article focuses on TeamFiltration, the learnings apply to any similar toolset:

https://guillaumeben.xyz/Microsoft-365-enumeration/
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
GOAD (Game Of Active Directory) - version 2

GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques:

-- https://github.com/Orange-Cyberdefense/GOAD
/ Windows SmartScreen Security Feature Bypass Vulnerability

Impact: Security Feature Bypass, CVE-2023-24880

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-24880

/ Internet Control Message Protocol (ICMP) Remote Code Execution Vulnerability

Impact: Remote Code Execution Max Severity: Critical

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-23415

P.S. thx for the link for RCE my dear friend ✌️
/ Microsoft Mitigates Outlook Elevation of Privilege Vulnerability

Impacted Products:
All supported versions of Microsoft Outlook for Windows are affected. Other versions of Microsoft Outlook such as Android, iOS, Mac, as well as Outlook on the web and other M365 services are not affected:

https://msrc.microsoft.com/blog/2023/03/microsoft-mitigates-outlook-elevation-of-privilege-vulnerability/
Намечается новая кибер-конфа в Алматы - AppSecFest
 
Совпало, что я оказался знаком с организаторами данной конфы - это будет апрель 2023, это будет посвящено Application Security и DevSecOps тематикам в РК.

Организаторы обещают:
• Качественный нетворкинг
• 250+ участников
• 8-ми часовую длительность + афтепати
• Стенды от вендоров
• Проходить будет 21 апреля, ТЦ Forum Алматы

Заявки на доклады - appsecfest@astlab.kz, сайт - https://appsecfest.kz
/ Uncovering Windows Events

This post will focus on the process I followed to understand the events the Threat-Intelligence ETW provider logs and how to uncover the underlying mechanisms. One can use a similar process when trying to reverse other manifest-based ETW providers. This post isn’t a deep dive into how ETW works… Not all manifest-based Event Tracing for Windows (ETW) providers that are exposed through Windows are ingested into telemetry sensors/EDR’s:

https://posts.specterops.io/uncovering-windows-events-b4b9db7eac54
/ OpenSSH 9.3 has just been released

With security and another fixes — https://lists.mindrot.org/pipermail/openssh-unix-dev/2023-March/040641.html
Forwarded from Sys-Admin Up (Yevgeniy Goncharov)
Active Directory Cheatsheet with code examples

- internal audit
- port forwarding
- bypass EP
- enumeration
- and etc…

https://hideandsec.sh/books/cheatsheets-82c/page/active-directory