Sys-Admin Up – Telegram
Sys-Admin Up
1.06K subscribers
132 photos
4 videos
127 files
2.23K links
InfoSec, Hacks, Perks, Tools, IT/IS Courses, CVE… Contains part of the news that was not included in the Sys-Admin & InfoSec Channel (@sysadm_in_channel)
Download Telegram
Subject Linux 6.12

Linus commented: No strange surprises this last week, so we're sticking to the regular release schedule, and that obviously means that the merge window opens tomorrow. I already have two dozen+ pull requests in my mailbox, kudos to all the early birds..:

https://lkml.org/lkml/2024/11/17/326
This media is not supported in your browser
VIEW IN TELEGRAM
Animated Cyber Security))
Alhamdulillah, I finished writing MD MZ Book 2nd edition. More than two years have passed since then, and I wanted to supplement the book with new articles from my blog. As a result, this new edition of this book now contains almost 1000 pages.

The new version of this book is divided into five (4 + 1 bonus) chapters:
- Malware development tricks and techniques
- AV evasion tricks
- Persistence techniques
- Malware, Cryptography, Research
- Intro to linux malware development

All material in the book is based on posts from my blog.
This book is dedicated to my wife, Laura, and my children, Yerzhan and Munira. I would like to express my deep gratitude to my friends and colleagues.
Special thanks to Anna Tsyganova and Duman Sembayev.
The proceeds from the sale of this book will be used to treat Munira and charity funds from Kazakhstan:
https://cocomelonc.github.io/book/2024/11/29/mybook-2.html
Zabbix - SQL injection in user.get API (CVE-2024-42327)

A non-admin user account on the Zabbix frontend with the default User role, or with any other role that gives API access can exploit this vulnerability. An SQLi exists in the CUser class in the addRelatedObjects function, this function is being called from the CUser.get function which is available for every user who has API access.

Critical

https://support.zabbix.com/browse/ZBX-25623
50 Windows Event IDs which can helpful for investigating CyberSec incidents / SIEM use cases
badram.pdf
6.6 MB
BadRam attack