Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Forwarded from OpenBLD.net (Yevgeniy Goncharov)
📢 Integration of OpenBLD.net with URLhaus by abuse.ch

URLhaus is a project operated by abuse.ch. Its purpose is to collect, track, and share malware URLs, aiding network administrators and security analysts in safeguarding their networks and customers from cyber threats.

Now, you can check the malicious domain ownership with OpenBLD.net alongside Quad9, AdGuard, Cloudflare, ProtonDNS on abuse.ch.

In addition, you can incorporate abuse.ch lists into your security solutions, just as OpenBLD.net does.

You can check this as example on:
🔹 https://urlhaus.abuse.ch/host/dukeenergyltd.top

Here's to security for us all. Cheers!)
Please open Telegram to view this post
VIEW IN TELEGRAM
Smishing: Understanding SMS Phishing Tactics

Smishing with EvilGophish:

https://fin3ss3g0d.net/index.php/2024/03/04/smishing-with-evilgophish/
PurpleLab

allow you to easily deploy an entire lab to create/test your detection rules, simulate logs, play tests, download and run malware and mitre attack techniques, restore the sandbox and many other features..:

https://github.com/Krook9d/PurpleLab
2024ThreatDetectionReport_RedCanary.pdf
14.3 MB
Thread Detection Report 2024 (from red canary)

With mitigation recommendations.
Digital Forensics Lab - CYL2002

This repository contains the course material for the digital forensics lab offered at FAST National University of Computer and Emerging Sciences, available for public use and learning.

https://github.com/vonderchild/digital-forensics-lab
“CVE-2024-21388”- Microsoft Edge’s Marketing API Exploited for Covert Extension Installation

Microsoft Edge browser, designated CVE-2024–21388. This flaw could have allowed an attacker to exploit a private API, initially intended for marketing purposes, to covertly install additional browser extensions with broad permissions without the user’s knowledge.

https://labs.guard.io/cve-2024-21388-microsoft-edges-marketing-api-exploited-for-covert-extension-installation-879fe5ad35ca
Dredge - Dredging up secrets from the depths of a filesystem

Dredge is a linux command-line tool for finding and logging secrets on a filesystem for manual inspection:

https://github.com/grahamhelton/dredge
According official Kali twitter blog post - The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today

Hack via hacker distro?)

CVE - https://nvd.nist.gov/vuln/detail/CVE-2024-3094

🔹 FAQ on the xz-utils backdoor: https://gist.github.com/thesamesam/223949d5a074ebc3dce9ee78baad9e27
🔹 Checker vulnerability: https://github.com/FabioBaroni/CVE-2024-3094-checker/blob/main/CVE-2024-3094-checker.sh
🔹 Detection: https://github.com/byinarie/CVE-2024-3094-info
🔹 More details: https://www.wiz.io/blog/cve-2024-3094-critical-rce-vulnerability-found-in-xz-utils
Please open Telegram to view this post
VIEW IN TELEGRAM
Python-for-Cybersecurity.pdf
8.3 MB
For offensive / defensive
Command Injection and Backdoor Account in D-Link NAS Devices

The described vulnerability affects multiple D-Link NAS devices, including models DNS-340L, DNS-320L, DNS-327L, and DNS-325, among others. The vulnerability lies within the nas_sharing.cgi uri, which is vulnerable due to two main issues: a backdoor facilitated by hardcoded credentials, and a command injection vulnerability via the system parameter..:

https://github.com/netsecfish/dlink?tab=readme-ov-file
NativeDump

NativeDump allows to dump the lsass process using only NTAPIs generating a Minidump file with only the streams needed to be parsed by tools like Mimikatz or Pypykatz (SystemInfo, ModuleList and Memory64List Streams).

https://github.com/ricardojoserf/NativeDump