Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
𝗦𝗼𝗳𝘁𝘄𝗮𝗿𝗲 𝗔𝗿𝗰𝗵𝗶𝘁𝗲𝗰𝘁𝘂𝗿𝗲 Learn Map
PART 1: How I Met Your Beacon – Overview

…During this research we will outline a number of effective strategies for hunting for beacons, supported by our BeaconHunter tool that we developed to execute these strategies and which we intend to open source in due course. In the following posts to this research, we will then step in to a number of case studies for applying these detections to a variety of both commercial and open source frameworks…:

https://www.mdsec.co.uk/2022/07/part-1-how-i-met-your-beacon-overview/
Boundary tool - Identity-based access for zero trust security

* https://www.boundaryproject.io/

#tool
Bolt like as Ansible alternative

Bolt is an open source orchestration tool that automates the manual work it takes to maintain your infrastructure.

* https://puppet.com/docs/bolt/latest/bolt.html

#tool
Artillery - Cloud-scale performance testing

Very easy tool for web services benchmarking…:

* https://www.artillery.io

#tool
2022-unit42-incident-response-report-final.pdf
3.1 MB
2022 Unit 42 Incident Response Report

Executive Summary: Every week brings news about threat actors—new campaigns, new groups, new types of attacks, new targets. Defenders can easily wind up playing catchup, but what does it take to flip the noscript?..

Big report abpout of top attacks trends and etc.
2207.05267.pdf
1.2 MB
Indoor optical fiber eavesdropping approach and its avoidance
The Four Golden Signals for SRE

The four golden signals of monitoring are latency, traffic, errors, and saturation. If you can only measure four metrics of your user-facing system, focus on these four…:

https://sre.google/sre-book/monitoring-distributed-systems/#xref_monitoring_golden-signals
Fourteen Ways to Read the PID for the Local Security Authority Subsystem Service (LSASS)

Process enumeration is necessary prior to injecting shellcode or dumping memory. Threat actors tend to favour using CreateToolhelp32Snapshot with Process32First and Process32Next to gather a list of running processes. And if they’re a bit more tech-savvy, they’ll use the NtQuerySystemInformation system call directly.

Although this post will focus on obtaining a PID specifically for LSASS, the methods described here can be adapted to resolve PIDs for any process. Some of these are well known and have been discussed before, but there’s also a few new ones that many readers won’t be familiar with…

* https://www.mdsec.co.uk/2022/08/fourteen-ways-to-read-the-pid-for-the-local-security-authority-subsystem-service-lsass/