Sys-Admin Up pinned « BLD DNS - Обновление в сторону скорости и безопасности. Краткий отчет. Уже почти, как полгода открытый превентивный DoT/DoH BLD DNS сервис бесплатно приносит пользу блокируя малварные, фишинговые, трекинговые и рекламные домены, экономя трафик, время и…»
Attack Surface’s of Industrial Control Systems
This post going to help persons who is work with ICS Systems and management that's.
Also its can be interested for IT guys 🙂
https://medium.com/@berkdusunur/attack-surfaces-of-industrial-control-systems-47c78c35d7d8
This post going to help persons who is work with ICS Systems and management that's.
Also its can be interested for IT guys 🙂
https://medium.com/@berkdusunur/attack-surfaces-of-industrial-control-systems-47c78c35d7d8
Medium
Attack Surface’s of Industrial Control Systems
Hello everybody. I am so happy to announce you my first post of 2022 about Attack Surface’s of Industrial Control Systems. I will use ICS…
Exploring Windows UAC Bypasses: Techniques and Detection Strategies
Malware often requires full administrative privileges on a machine to perform more impactful actions such as adding an antivirus exclusion, encrypting secured files, or injecting code into interesting system processes. Even if the targeted user has administrative privileges, the prevalence of User Account Control (UAC) means that the malicious application will often default to Medium Integrity, preventing write access to resources with higher integrity levels. To bypass this restriction, an attacker will need a way to elevate integrity level silently and with no user interaction (no UAC prompt). This technique is known as a User Account Control bypass and relies on a variety of primitives and conditions, the majority of which are based on piggybacking elevated Windows features.
https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article/
Malware often requires full administrative privileges on a machine to perform more impactful actions such as adding an antivirus exclusion, encrypting secured files, or injecting code into interesting system processes. Even if the targeted user has administrative privileges, the prevalence of User Account Control (UAC) means that the malicious application will often default to Medium Integrity, preventing write access to resources with higher integrity levels. To bypass this restriction, an attacker will need a way to elevate integrity level silently and with no user interaction (no UAC prompt). This technique is known as a User Account Control bypass and relies on a variety of primitives and conditions, the majority of which are based on piggybacking elevated Windows features.
https://elastic.github.io/security-research/whitepapers/2022/02/03.exploring-windows-uac-bypass-techniques-detection-strategies/article/
StackScraper - Capturing sensitive data using real-time stack scanning against a remote process
tool to show how much data can be extracted from a running process without requiring any injection techniques
https://www.x86matthew.com/view_post?id=stack_scraper
tool to show how much data can be extracted from a running process without requiring any injection techniques
https://www.x86matthew.com/view_post?id=stack_scraper
Geo-Recon
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
https://github.com/radioactivetobi/geo-recon
An OSINT CLI tool desgined to fast track IP Reputation and Geo-locaton look up for Security Analysts.
https://github.com/radioactivetobi/geo-recon
Distrobox
Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with.
https://github.com/89luca89/distrobox
Use any Linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with.
https://github.com/89luca89/distrobox
GitHub
GitHub - 89luca89/distrobox: Use any linux distribution inside your terminal. Enable both backward and forward compatibility with…
Use any linux distribution inside your terminal. Enable both backward and forward compatibility with software and freedom to use whatever distribution you’re more comfortable with. Mirror available...
PowerShell for the SQL Server DBA - Variable Fundamentals
https://www.mssqltips.com/sqlservertip/7153/powershell-variable-examples-data-types-scope-name-assignment/
https://www.mssqltips.com/sqlservertip/7153/powershell-variable-examples-data-types-scope-name-assignment/
MSSQLTips.com
PowerShell Variable Examples for Data Types, Scope, Naming, Assignment
Learn about using variables in PowerShell noscripts with these different examples that cover data types, scope, naming, assigning values and more.
master_librarian
A simple tool to audit Linux system libraries to find public security vulnerabilities.
https://github.com/CoolerVoid/master_librarian
A simple tool to audit Linux system libraries to find public security vulnerabilities.
https://github.com/CoolerVoid/master_librarian
Ansible Roles - An Ultimate Way To Solve Your Confusion With Playbooks
https://medium.com/edureka/ansible-roles-78d48578aca1
https://medium.com/edureka/ansible-roles-78d48578aca1
Medium
Ansible Roles - An Ultimate Way To Solve Your Confusion With Playbooks
This Ansible Roles blog talks about how roles are used to make complex playbooks readable and reusable with a demonstration.
Kali Linux 2022.1 Release (Visual Updates, Kali Everything ISOs, Legacy SSH)
https://www.kali.org/blog/kali-linux-2022-1-release/#visual-refresh-theme-updates
https://www.kali.org/blog/kali-linux-2022-1-release/#visual-refresh-theme-updates
Kali Linux
Kali Linux 2022.1 Release (Visual Updates, Kali Everything ISOs, Legacy SSH) | Kali Linux Blog
Today we are pushing out the first Kali Linux release of the new year with Kali Linux 2022.1, and just in time for Valentine’s Day! This release brings various visual updates and tweaks to existing features, and is ready to be downloaded or upgraded if you…
Understand Typenoscript in 5 minutes - Je suis un dev
https://www.jesuisundev.com/en/understand-typenoscript-in-5-minutes/
https://www.jesuisundev.com/en/understand-typenoscript-in-5-minutes/
Je suis un dev
Understand Typenoscript in 5 minutes
Typenoscript exploded in popularity in 2019 and continues its crazy run in 2020. The first language to hit the top 10 in less than 5 years. Unbelievable.
Forwarded from Sys-Admin InfoSec
/ Windows RDP Event IDs Cheatsheet
It is becoming more and more common for bad actors to manipulate or clear the security event logs on compromised machines, and sometimes RDP sessions don’t even register as just a type 10 logon, depending on the circumstance. RDP activities will leave events in several different logs as action is taken and various processes are involved.
https://www.socinvestigation.com/windows-rdp-event-ids-cheatsheet/
It is becoming more and more common for bad actors to manipulate or clear the security event logs on compromised machines, and sometimes RDP sessions don’t even register as just a type 10 logon, depending on the circumstance. RDP activities will leave events in several different logs as action is taken and various processes are involved.
https://www.socinvestigation.com/windows-rdp-event-ids-cheatsheet/
Security Investigation - Be the first to investigate
Windows RDP Event IDs Cheatsheet - Security Investigation
It is becoming more and more common for bad actors to manipulate or clear the security event logs on compromised machines, and sometimes RDP sessions don’t even register as just a type 10 logon, depending on the circumstance. RDP activities will leave events…
A technique to semi-automatically discover new vulnerabilities in WordPress plugins
https://kazet.cc/2022/02/03/fuzzing-wordpress-plugins.html
https://kazet.cc/2022/02/03/fuzzing-wordpress-plugins.html
kazet.cc
A technique to semi-automatically discover new vulnerabilities in WordPress plugins
How to semi-automatically find vulnerabilities in WordPress plugins installed on about 15 million websites.
Stealing and faking Azure AD device identities
How to steal identities of existing Azure AD joined devices, and how to fake identies of non-AAD joined Windows devices with AADInternals v0.6.6:
https://o365blog.com/post/deviceidentity/?s=09
How to steal identities of existing Azure AD joined devices, and how to fake identies of non-AAD joined Windows devices with AADInternals v0.6.6:
https://o365blog.com/post/deviceidentity/?s=09
O365Blog
Stealing and faking Azure AD device identities
In my previous blog posts I’ve covered details on PRTs, BPRTs, device compliance, and Azure AD device join.
In this blog, I’ll show how to steal identities of existing Azure AD joined devices, and how to fake identies of non-AAD joined Windows devices with…
In this blog, I’ll show how to steal identities of existing Azure AD joined devices, and how to fake identies of non-AAD joined Windows devices with…
The Ultimate Hacker's Roadmap 2022
https://github.com/0xTRAW/Cybersecurity-Roadmap
and from the same category - The Ultimate Hacker Roadmap
https://github.com/Kennyslaboratory/Ultimate-Hacker-Roadmap
https://github.com/0xTRAW/Cybersecurity-Roadmap
and from the same category - The Ultimate Hacker Roadmap
https://github.com/Kennyslaboratory/Ultimate-Hacker-Roadmap
GitHub
GitHub - thatstraw/Cybersecurity-Roadmap
Contribute to thatstraw/Cybersecurity-Roadmap development by creating an account on GitHub.
Попалось тут - гейм на разных языках, программируешь героя он ходит, собирает кристаллы, разные языки (pyhon, javanoscript, lua) https://codecombat.com/play
CodeCombat
CodeCombat: Learn to Code by Playing a Game
Learn programming with a multiplayer live coding strategy game for beginners. Learn Python or JavaScript as you defeat ogres, solve mazes, and level up. Open source HTML5 game!