Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Shodan_Cheatsheet.png
334.6 KB
Shodan Cheatsheet
FiXS the new ATM Malware in LATAM

…ATMs are a core part of the financial system, providing users access to their money anytime at different physical locations… Detailed technical review:

https://www.metabaseq.com/fixs-atms-malware/
/ Two major vulnerabilities found in the TPM2.0 that could affect billions of devices

https://content.quarkslab.com/major-vulnerabilities-tpm20
В инфраструктуре государственных организаций выявлены иностранные кибершпионы

ГТС КЗ:

https://sts.kz/2023/03/07/v-infrastrukture-gosudarstvennyh-organizacij-vyyavleny-inostrannye-kibershpiony/
Rust for n00bs. Free price.

This course provides an overview of the Rust syntax and teaches the basics of reading and writing Rust code. It assumes no prior knowledge of Rust and covers everything you need to get started with your learning journey:

https://training.zeropointsecurity.co.uk/courses/rust-for-n00bs
CVE-2023-21768 Local Privilege Escalation POC

For demonstration purposes only. Complete exploit works on vulnerable Windows 11 22H2 systems. Write primitive works on all vulnerable systems:

https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768
BlueHat 2023 security conference video

from Microsoft Security Response Center (MSRC)

https://www.youtube.com/playlist?list=PLXkmvDo4MfusWp9f7IHT9xAPCkN2ZSm2L
GOAD (Game Of Active Directory) - version 2

GOAD is a pentest active directory LAB project. The purpose of this lab is to give pentesters a vulnerable Active directory environment ready to use to practice usual attack techniques:

-- https://github.com/Orange-Cyberdefense/GOAD
Mini Robot Enters Blood Vessels

Researchers demonstrate proof of concept in a pig’s artery:

https://spectrum.ieee.org/mini-robot-surgeon
Active Directory Cheatsheet with code examples

- internal audit
- port forwarding
- bypass EP
- enumeration
- and etc…

https://hideandsec.sh/books/cheatsheets-82c/page/active-directory