Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
master_librarian

A simple tool to audit Linux system libraries to find public security vulnerabilities.

https://github.com/CoolerVoid/master_librarian
Forwarded from Sys-Admin InfoSec
/ Windows RDP Event IDs Cheatsheet

It is becoming more and more common for bad actors to manipulate or clear the security event logs on compromised machines, and sometimes RDP sessions don’t even register as just a type 10 logon, depending on the circumstance. RDP activities will leave events in several different logs as action is taken and various processes are involved.

https://www.socinvestigation.com/windows-rdp-event-ids-cheatsheet/
Попалось тут - гейм на разных языках, программируешь героя он ходит, собирает кристаллы, разные языки (pyhon, javanoscript, lua) https://codecombat.com/play
Какой же сука пятница охуительный день
Escaping VMware’s NSX Edge OS Jailed Shell

In this blog post we provide details about a CLI injection vulnerability that we discovered during a penetration testing engagement against VMware Cloud Director. The vulnerability was identified on NSX Edge OS version < 6.4.13:

https://www.secforce.com/blog/escaping-vmwares-nsx-edge-os-jailed-shell/
MicrosoftSecurity_Best_Practices.pdf
9.6 MB
MicrosoftSecurity Best Practices

Known as the AzureSecurity Compass or MicrosoftSecurity
Compass) is a collection of best practices that provideclear actionable guidancefor security related decisions.
This is designed to help you increaseyour security postureand reducerisk whether your environment is cloud-
only, or a hybrid enterprisespanning cloud(s) and on-premises data centers.This guidance was formerly
referred to as AzureSecurity Compass and is now increasing in scopeto encompass all Microsoft security
guidanceand capabilities, including Microsoft 365
A Method for Decrypting Data Infected with Hive Ransomware.pdf
3.6 MB
A Method for Decrypting Data Infected with Hive Ransomware