Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
CVE-2023-36874 Windows Error Reporting LPE BOF

This is a mature and operational CobaltStrike BOF implementation of Filip Dragovic's (@filip_dragovic) CVE-2023-36874 Windows Error Reporting LPE exploit.

https://github.com/Octoberfest7/CVE-2023-36874_BOF
Forwarded from Sys-Admin InfoSec
🎚 Note: Previous BLD ecosystem - bld.sys-adm.in successfully converted to ada.openbld.net 😡

🟡 Server 135.125.204.230 will be removed from OpenBLD.net DNS in the coming days, please change the settings on your devices to the current IP addresses.

🔴 Сервер 135.125.204.230 ближайшие дни будет выведен из OpenBLD.net DNS пожалуйста измените настройки на своих устройствах, на актуальные IP адреса.

Previous notification:
🔹OpenBLD.net H1 Updating Report
Please open Telegram to view this post
VIEW IN TELEGRAM
Strategies_for_DevSecOps_CI_CD_Pipelines.pdf
879.2 KB
Strategies for the Integration of
Software Supply Chain Security in DevSecOps CI/CD Pipelines


*from NIST
Forwarded from Sys-Admin InfoSec
🚀 Open SysConf'23 - Run of the day на 16 Сентября 🐴

Да пребудет с тобой Сила - тому кто стремиться давать знания и знать больше 🙌

Регистрируйся на трансляцию прямо сейчас и стань частью уникальной встречи

📢. Целый день, где:

9:15-10:00: Начнем со встречи с участниками и регистрации
19:00-19:20: Окончание трансформации сознания, после совместного общения

Alpha-расписание докладов:

🔸 https://sysconf.io/ru/#schedule

Не упусти возможность для личного и профессионального роста!

Ждем именно тебя 🔥
Please open Telegram to view this post
VIEW IN TELEGRAM
New Attack Vector In The Cloud: Attackers caught exploiting Object Storage Services

MinIO under attack 🔫

https://www.securityjoes.com/post/new-attack-vector-in-the-cloud-attackers-caught-exploiting-object-storage-services
Exposing_and_Addressing_Security_Vulnerabilities_in_Browser_Text.pdf
1.2 MB
Exposing and Addressing Security Vulnerabilities in Browser Text Input Fields
TLP CLEAR -DDOS Mitigations Guidance_508c.pdf
464.4 KB
DDoS mitigation guidance from CISA
AppSec_Interview_QA.pdf
199.9 KB
Application Security Questions and Answers
Socomec MOD3GP-SY-120K

Successful exploitation of these vulnerabilities could allow an attacker to execute malicious Javanoscript code, obtain sensitive information, or steal session cookies.

https://www.cisa.gov/news-events/ics-advisories/icsa-23-250-03
Technical Analysis of HijackLoader

A new evasive malware downloader with a modular architecture:

— The loader is being leveraged to drop numerous malware families, including Danabot, SystemBC, and RedLine Stealer, amplifying its potential threat.
— HijackLoader utilizes syscalls to evade monitoring from security solutions, detects specific processes based on an embedded blocklist, and delays code execution at different stages.
— The malware uses embedded modules that facilitate flexible code injection and execution - a feature uncommon among traditional loaders..:

https://www.zscaler.com/blogs/security-research/technical-analysis-hijackloader