Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
When is a Perimeter not a Perimeter

Research paper:
https://www.forescout.com/resources/l1-lateral-movement-report
A maintenance release Git v2.39.2, together with releases for older
maintenance tracks v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7,
v2.33.7, v2.32.6, v2.31.7, and v2.30.8, are now available at the
usual places.

These maintenance releases are to address two security issues
identified as CVE-2023-22490 and CVE-2023-23946. They both affect
ranges of existing versions and users are strongly encouraged to
upgrade.

https://lore.kernel.org/git/xmqqr0us5dio.fsf@gitster.g/T/
Pre-Auth RCE in Aspera Faspex: Case Guide for Auditing Ruby on Rails

https://blog.assetnote.io/2023/02/02/pre-auth-rce-aspera-faspex/
A story about tampering EDRs

Anti-virus alone is no longer sufficient to enable organizations to prevent, understand and respond to more complex attacks. As a result, more and more organizations are turning to a combination of antivirus (AV) / endpoint protection (EPP) and endpoint detection and response (EDR) systems. As a result, it has become much more difficult in recent years for attackers, including red teamers, to operate undetected or as quietly as possible on the compromised endpoint. Attackers are constantly finding new ways to bypass EDRs, such as direct or indirect system calls, and EDR vendors are constantly making improvements. In short, it is a constant game of cat and mouse. In this article, however, we will not focus on EDR bypassing, but rather on EDR manipulation.

https://redops.at/en/blog/a-story-about-tampering-edrs
Deep Dive Into a PoshC2

PoshC2 is an open-source C2 framework used by penetration testers and threat actors. It can
generate a Powershell-based implant, a C#.NET implant that we analyze in this paper, and a
Python3 implant..:

https://resources.securityscorecard.com/research/poshc2-implant#page=1
YouTube as cloud storage for ANY files, not just video

https://github.com/DvorakDwarf/Infinite-Storage-Glitch
NIST Cybersecurity Framework 2.0 Concept Paper: Potential Significant Updates to the Cybersecurity Framework

Jan 19, 2023

https://www.nist.gov/system/files/documents/2023/01/19/CSF_2.0_Concept_Paper_01-18-23.pdf
WAF Bypass Tool

WAF bypass Tool is an open source tool to analyze the security of any WAF for False Positives and False Negatives using predefined and customizable payloads:

https://github.com/nemesida-waf/waf-bypass
Linux System Checker Script Tool

Linux System Checker Tool Script it is a bash noscript which can show system info, system load info, test disk speed I/O, show free space and more... System Checker can checks and shows Linux system info like as:

▫️ System Information
▫️ CPU and Memory Information
▫️ Boot Information
▫️ Mount and HDD IO Info
▫️ Top 5 memory and CPU usage processes
▫️ Speedtest
▫️ Defined Systemd Units Services State
▫️ Logged/Process users info
▫️ Listen ports
▫️ Running systemd units as list/tree
▫️ Unowned files

- [en]: Linux System Checker
- [ru]: Скрипт проверки Linux