Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Vulnerabilities in VPN

- Paper presented at the Privacy Enhancing Technologies Symposium 2024
- PoC
OWASP_Vulnerability_Management_Guide.pdf
1.4 MB
OWASP Vulnerability Management Guide (OVMG)
Forwarded from Yevgeniy Goncharov
🦄 Йоу! Хорош спать. Поднимай взор на темы докладов Open SysConf'24

Во первых. Теперь каждый может внести лепту в создание сайта, исправлении ошибок на нем и так далее.
Во вторых. Мы имеем место и дату - 12 Октяря, 2024 года.

В третьихх. Мы имеем четрые крутых заявленых доклада:

1. Три системы, которые ты захочешь развернуть и настроить
2. Внедрение вредоносного кода в андроид приложения.
3. Open(Secure)Source
4. Синтез молекулярных единиц в микросервисах

Иди на сайт и регистрируйся, пока есть места.

Дев. сайт: https://sysconf-io.pages.dev/2024
IOT Cybersecurity Framework.pdf
3.8 MB
IOT Cyber Security Framework
How did Facebook intercept their competitor's encrypted mobile app traffic?

A technical investigation into information uncovered in a class action lawsuit that Facebook had intercepted encrypted traffic from user's devices running the Onavo Protect app in order to gain competitive insights...:

https://doubleagent.net/onavo-facebook-ssl-mitm-technical-analysis/

P.S. Thx for the link, dear subscriber ✌️
Unmasking the SMS Stealer: Targeting Several Countries with Deceptive Apps

One-time passwords (OTPs) are designed to add an extra layer of security to online accounts, and most enterprises have become very dependent upon them for controlling access to sensitive data and applications...

However, these passwords are just as valuable to attackers.

Mobile malware has become increasingly sophisticated, employing cunning tactics to steal these crucial codes and bypass their added protection to enable malicious infiltration to corporate networks and data...:

https://www.zimperium.com/blog/unmasking-the-sms-stealer-targeting-several-countries-with-deceptive-apps/
Cyber Incident Response Plan Guidance.pdf
1.9 MB
Cyber Incident Response Plan Guidance PDF
5GBaseChecker, a security analysis framework for the control plane protocols of 5G baseband.

https://github.com/SyNSec-den/5GBaseChecker
Microsoft Office Spoofing Vulnerability

Configuring the Network Security: Restrict NTLM: Outgoing NTLM traffic to remote servers policy setting provides the ability to allow, block, or audit outgoing NTLM traffic from a computer running Windows Server 2008, Windows Server 2008 R2, or later to any remote server running the Windows operating system..:

https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-38200
NIST_Incident_Response_Recommendations_and_Considerations_for_Cybersecurity.pdf
968.5 KB
Incident Response Recommendations for
Risk Management from NIST