Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Bolt like as Ansible alternative

Bolt is an open source orchestration tool that automates the manual work it takes to maintain your infrastructure.

* https://puppet.com/docs/bolt/latest/bolt.html

#tool
Artillery - Cloud-scale performance testing

Very easy tool for web services benchmarking…:

* https://www.artillery.io

#tool
2022-unit42-incident-response-report-final.pdf
3.1 MB
2022 Unit 42 Incident Response Report

Executive Summary: Every week brings news about threat actors—new campaigns, new groups, new types of attacks, new targets. Defenders can easily wind up playing catchup, but what does it take to flip the noscript?..

Big report abpout of top attacks trends and etc.
2207.05267.pdf
1.2 MB
Indoor optical fiber eavesdropping approach and its avoidance
The Four Golden Signals for SRE

The four golden signals of monitoring are latency, traffic, errors, and saturation. If you can only measure four metrics of your user-facing system, focus on these four…:

https://sre.google/sre-book/monitoring-distributed-systems/#xref_monitoring_golden-signals
Fourteen Ways to Read the PID for the Local Security Authority Subsystem Service (LSASS)

Process enumeration is necessary prior to injecting shellcode or dumping memory. Threat actors tend to favour using CreateToolhelp32Snapshot with Process32First and Process32Next to gather a list of running processes. And if they’re a bit more tech-savvy, they’ll use the NtQuerySystemInformation system call directly.

Although this post will focus on obtaining a PID specifically for LSASS, the methods described here can be adapted to resolve PIDs for any process. Some of these are well known and have been discussed before, but there’s also a few new ones that many readers won’t be familiar with…

* https://www.mdsec.co.uk/2022/08/fourteen-ways-to-read-the-pid-for-the-local-security-authority-subsystem-service-lsass/
NimicStack - Slack spoofing with Nim

NimicStack is the pure Nim implementation of Call Stack Spoofing technique to mimic legitimate programs.

https://github.com/frkngksl/NimicStack
KHS in Almaty (Kazakhstan) at 14-16 September.

With Jayson E. Street (DEF CON Groups Global Ambassador), Author book series of "Dissecting the hack: Series"...

Sys-Adm.in is not only an information partner, but also a participant in the conference 🎉

See more details on official KHS site: https://kazhackstan.kz
squip.pdf
505.5 KB
SQUIP: Exploiting the Scheduler Queue Contention Side Channel

In this paper, we present the SQUIP attack, the first side-channel attack on scheduler queues. With SQUIP, we measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing. We show that this occupancy level measurement works on microarchitectures of different vendors, namely the Apple M1, AMD Zen 2 and Zen 3…