squip.pdf
505.5 KB
SQUIP: Exploiting the Scheduler Queue Contention Side Channel
In this paper, we present the SQUIP attack, the first side-channel attack on scheduler queues. With SQUIP, we measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing. We show that this occupancy level measurement works on microarchitectures of different vendors, namely the Apple M1, AMD Zen 2 and Zen 3…
In this paper, we present the SQUIP attack, the first side-channel attack on scheduler queues. With SQUIP, we measure the precise degree of Scheduler Queue Usage (i.e., occupancy) via Interference Probing. We show that this occupancy level measurement works on microarchitectures of different vendors, namely the Apple M1, AMD Zen 2 and Zen 3…
ÆPIC Leak - Architecturally Leaking Uninitialized Data from the Microarchitecture
https://aepicleak.com
P.S. Thx for the news dear subscriber ✌️
https://aepicleak.com
P.S. Thx for the news dear subscriber ✌️
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
…how to quickly inventory, exploit, and remediate network shares configured with excessive permissions at scale in Active Directory environments…:
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
…how to quickly inventory, exploit, and remediate network shares configured with excessive permissions at scale in Active Directory environments…:
https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
NetSPI
Attacking and Remediating Excessive Network Share Permissions in Active Directory Environments
Learn how to quickly inventory, attack, and remediate network shares configured with excessive permissions assigned to SMB shares in Active Directory environments.
OverSight
Mac malware often spies on users by recording audio and video sessions...sometimes in an undetected manner.
OverSight monitors a mac's mic and webcam, alerting the user when the internal mic is activated, or whenever a process accesses the webcam.
https://objective-see.org/products/oversight.html
#tool
Mac malware often spies on users by recording audio and video sessions...sometimes in an undetected manner.
OverSight monitors a mac's mic and webcam, alerting the user when the internal mic is activated, or whenever a process accesses the webcam.
https://objective-see.org/products/oversight.html
#tool
Researching Xiaomi’s TEE to get to Chinese money
technical analysys
https://research.checkpoint.com/2022/researching-xiaomis-tee/
technical analysys
https://research.checkpoint.com/2022/researching-xiaomis-tee/
Check Point Research
Researching Xiaomi’s TEE to get to Chinese money - Check Point Research
Research By: Slava Makkaveev Introduction Have you ever wondered if it is safe to make payments from a mobile device? Can a malicious app steal money from your digital wallet? According to the latest statistics, the Far East and China accounted for two-thirds…
Hacking Zyxel IP cameras to gain a root shell
TLDR - Do not buy, do not use, and remove all of these devices from service immediately (IPC-3605N and the model IPC-4605N). They are so miserably insecure it took me less than a day of effort to develop a utility to remotely compromise any of them. Keep reading if you want to know how… (from Author)
Technical analysis:
http://www.hydrogen18.com/blog/hacking-zyxel-ip-cameras-pt-1.html
TLDR - Do not buy, do not use, and remove all of these devices from service immediately (IPC-3605N and the model IPC-4605N). They are so miserably insecure it took me less than a day of effort to develop a utility to remotely compromise any of them. Keep reading if you want to know how… (from Author)
Technical analysis:
http://www.hydrogen18.com/blog/hacking-zyxel-ip-cameras-pt-1.html
Hydrogen18
Hacking Zyxel IP cameras to gain a root shell
Identifying software vulnerabilities in Zyxel IP cameras to remotely gain a root shell
Forwarded from Sys-Admin InfoSec
Open SysConf 2022 Уже в Октябре!
Привет, мы готовим новую - четвертую ежегодную встречу Open SysConf'22.
Уже точно есть:
— Три доклада
— Собрано половина бюджета
— Место, дата и время встречи
- Обновленный сайт sysconf.io
Обычно у большинства людей обстоятельства складываются таким образом, что вечно что-то мешает заняться спортом, сделать доклад, поучаствовать в конфе, мешают обычно работа, откладывание за завтра и тп и тд...
Собраться, поделиться знаниями, найти время для себя - это то, что нужно действительно сделать здесь и сейчас (и в Октябре)! Расправь плечи дорогой друг, подними голову и ступай смело вперед:
- https://sysconf.io
- 14 Октября, с 11:00 до 20:00, Алматы.
Зал большой, места хватит всем! Все нужные ссылки, ты найдешь на сайте. Peace ✌️.
Привет, мы готовим новую - четвертую ежегодную встречу Open SysConf'22.
Уже точно есть:
— Три доклада
— Собрано половина бюджета
— Место, дата и время встречи
- Обновленный сайт sysconf.io
Обычно у большинства людей обстоятельства складываются таким образом, что вечно что-то мешает заняться спортом, сделать доклад, поучаствовать в конфе, мешают обычно работа, откладывание за завтра и тп и тд...
Собраться, поделиться знаниями, найти время для себя - это то, что нужно действительно сделать здесь и сейчас (и в Октябре)! Расправь плечи дорогой друг, подними голову и ступай смело вперед:
- https://sysconf.io
- 14 Октября, с 11:00 до 20:00, Алматы.
Зал большой, места хватит всем! Все нужные ссылки, ты найдешь на сайте. Peace ✌️.
Sys-Admin Up pinned «Open SysConf 2022 Уже в Октябре! Привет, мы готовим новую - четвертую ежегодную встречу Open SysConf'22. Уже точно есть: — Три доклада — Собрано половина бюджета — Место, дата и время встречи - Обновленный сайт sysconf.io Обычно у большинства людей обстоятельства…»
Pwning Popular Desktop apps while uncovering new attack surface on Electron
https://i.blackhat.com/USA-22/Thursday/US-22-Purani-ElectroVolt-Pwning-Popular-Desktop-Apps.pdf
https://i.blackhat.com/USA-22/Thursday/US-22-Purani-ElectroVolt-Pwning-Popular-Desktop-Apps.pdf
ebpf-process-anomaly-detection
Process behaviour anomaly detection using eBPF system call tracing and unsupervised learning Autoencoders.
https://github.com/evilsocket/ebpf-process-anomaly-detection
Process behaviour anomaly detection using eBPF system call tracing and unsupervised learning Autoencoders.
https://github.com/evilsocket/ebpf-process-anomaly-detection
GitHub
GitHub - evilsocket/ebpf-process-anomaly-detection: Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders
Process behaviour anomaly detection using eBPF and unsupervised-learning Autoencoders - evilsocket/ebpf-process-anomaly-detection
Envoy
Open Source Edge And Service Proxy, Designed For Cloud-native Applications
https://www.envoyproxy.io/
#tool
Open Source Edge And Service Proxy, Designed For Cloud-native Applications
https://www.envoyproxy.io/
#tool
Frontend Tracks on JetBrains Academy: Learn HTML, CSS, and JavaScript
you can entoll fre plan for self learning:
https://blog.jetbrains.com/education/2022/08/17/frontend-tracks-on-jetbrains-academy-learn-html-css-and-javanoscript/
you can entoll fre plan for self learning:
https://blog.jetbrains.com/education/2022/08/17/frontend-tracks-on-jetbrains-academy-learn-html-css-and-javanoscript/
The JetBrains Blog
Frontend Tracks on JetBrains Academy: Learn HTML, CSS, and JavaScript | The JetBrains Academy Blog
Dive into the intricacies of frontend development by building web applications step by step!
Forwarded from Sys-Admin InfoSec
Open BLD DNS Updating News (August’22): New BLD release, New tools and more
- 100% migration to KeyDB from Redis
- Automated upgrading target distros according Open BLD DNS roles (BLD infra has several BLD servers roles)
- Added Open API IP location reflector (see link below) on the S-A Lab site
- Ansible roles optimized with common variables
- BLD Server update server can merge downloaded lists without comments (plain lists)
- UptimeRobot helped to Open BLD, now you can review status page: bld-status.sys-adm.in
Note: UptimeRobot supported Open BLD DNS Project. I’m using UptimeRobot more than 10 years, it is a very useful and stable uptime monitirung servise, details
Tools:
• install-redis.sh
• install-keydb.sh
• redis-to-keydb.sh
• lib.sh
• monit2telegram.sh - local IP detection fuctionallity added to this fork
• ip reflector
• bld server
Deprecation notice:
• ⚠️ 8443 port will be disabled in the next release. Please switch your DoH to 443
Open BLD DNS Site:
• EN - https://lab.sys-adm.in/en
• RU - https://lab.sys-adm.in/ru
- 100% migration to KeyDB from Redis
- Automated upgrading target distros according Open BLD DNS roles (BLD infra has several BLD servers roles)
- Added Open API IP location reflector (see link below) on the S-A Lab site
- Ansible roles optimized with common variables
- BLD Server update server can merge downloaded lists without comments (plain lists)
- UptimeRobot helped to Open BLD, now you can review status page: bld-status.sys-adm.in
Note: UptimeRobot supported Open BLD DNS Project. I’m using UptimeRobot more than 10 years, it is a very useful and stable uptime monitirung servise, details
Tools:
• install-redis.sh
• install-keydb.sh
• redis-to-keydb.sh
• lib.sh
• monit2telegram.sh - local IP detection fuctionallity added to this fork
• ip reflector
• bld server
Deprecation notice:
• ⚠️ 8443 port will be disabled in the next release. Please switch your DoH to 443
Open BLD DNS Site:
• EN - https://lab.sys-adm.in/en
• RU - https://lab.sys-adm.in/ru
Systemd is the mother of all processes, responsible for bringing the Linux host up to a state where productive work can be done…
Systemd architecture: https://opensource.com/article/20/4/systemd
Systemd architecture: https://opensource.com/article/20/4/systemd
Когда тебе будет пизда, сделай так чтобы тебе не было больно за бесцельно прожитые годы.
When you get a death, make it so that you don't get hurt for the years spent aimlessly.
When you get a death, make it so that you don't get hurt for the years spent aimlessly.