0•Bytes•1 – Telegram
0•Bytes•1
3.61K subscribers
85 photos
1 video
90 files
142 links
Здравствуй, Нео🎩
Следуй за белым кроликом, не забывая пить таблетки🐇
Тогда ты увидишь удивительные глубины мира ИБ и не только.
Но помни, кроличья нора глубже чем кажется.
Download Telegram
Welcome to the tea party my Sony🐭☕️

I decided to make you a compilation of 5G security material 📡
Here will be some articles and increments on attacks and detection

A little more about detection.
Since 5g has a tightly implemented interaction with neural networks, attacks on it are also detected. That's why some of the repositories I provided on 5G attack detection will be mostly related to them. 

If you don't know much about them, here's a pretty good book as an introduction to neural networks + in the future I can make a gist about them 🧬


5GAD

This is a 5G attack detection dataset for machine learning tools 
It contains two types of intercepted network packets-normal packets of non-malicious traffic and attack packets from 5G kernel attacks implemented with free5GC.
The captures were collected using tshark or Wireshark on 4 different network interfaces in the 5G kernel.
The files beginning with "allcap" contain packets recorded simultaneously on all four interfaces, the other *.pcapng files represent the same data that was split on one of the four interfaces.
If you are building your own neuronics this might be useful for training


5G_security_malicious_traffic_detection

This project is from NSW Hackathon 2020. 
It introduces the concept of computing for security by taking streaming traffic from the RAN and looking for malicious traffic on the mobile edge segment side to quickly recognize threats.
In this way, it differs from solutions that must store data from the underlying network and assess possible threats in a second step.
Time window feature aggregation will be evt. Implemented with Spark.
ASD: Anomaly Symptom Detection. It is located in the RAN and is designed to quickly find any traces or signs of anomaly in the network traffic generated by UEs connected to the RAN.
NAD: Network Anomaly Detection. This is a collector of timestamped and RAN-related symptoms generated and forwarded by the ASD, where a central process, such as EPC, analyzes the timeline and relationship of these symptoms to detect any network anomaly. As soon as an anomaly occurs, it is immediately forwarded to the monitoring and diagnostics module.
Server diagnostics and policy. A GUI environment that creates graphs of interconnected infected devices and, in the case of botnets, also botmasters. This gives the expert the ability to look deeper into the flow of packets and initiate preventive actions. Only graph generation is implemented.
You will be interested if you want to understand the attack detection


Distributed-Slice-mobility-attack-detection

An article about how inter-segment abundance in 5G networks enables mobility of user sessions from one network segment to another. 
It will mention a new attack on 5G network segments using user-initiated mobility between segments. The performance and economic damage from a DSM attack is higher than from attacks like DDOS and Yo-Yo. It will also describe building a deep learning model to effectively detect such attacks.
#ss7 #mobile #network #5g #neural_networks #attacks #distinction
👍1
Security-Framework

Security-Framework for 5G
By its architecture There are three main components:
Amarisoft RAN, Edge Cloud node, and Core DC, where the Security Framework tools are deployed.
Amarisoft RAN provides an API for collecting 5G metrics. The Edge node runs a Prometheus server and two exporters. Influx DB is deployed in Core DC. In addition, anomaly detection software and a provided user interface via Grafana are deployed. Amarisoft Exporter collects 5G metrics from Amarisoft RAN via socket. The Node Exporter collects metrics from the Edge Node, and the Prometheus server clears both exporters. Prometheus publishes the collected metrics to the Influx database every 15 seconds. The anomaly detection model retrieves the collected data from the Influx database and decides whether the record is an anomaly compared to normal records or not. Detected anomalies are stored in the Influx database. The Grafana user interface displays metrics collected from Edge Node and Amarisoft, and maintains a table with all detected anomalies. For each anomaly, there is an option to show more information about the collected and tracked metrics.


4G-and-5G-Security-Notes.

A little rap about 4G and 5G security. There's the SS7 alarm, a new security measure in 5G, and more. 


5G Topic.

The 5G materiel thread has: 5G UE and RAN (gNodeB) open source implementations. 
Modeling and drawings for planning properties of 5G NR radio resources Implementation of Matlab spherical decoder 5G NR MIMO


Daedalus

Exploring various defensive response options to effectively protect the 5G core network.
The 5G core network can be subject to attacks from the radio link and parts of the data network architecture. In most cases, the 5G core network defense strategy is similar to the enterprise network defense strategy. However, there are subtle differences between the 5G network and the enterprise network that make the defenses different for each.
This repository explores the decision-making mechanisms from the different response options and can be used to reduce the effectiveness of attacks by directing attackers to domains that the defender can better control to secure the underlying 5G network.


5GReplay

A tool for reproducing and modifying 5G protocol network traffic.
The tool provides the ability to modify network packets online or offline in both the control plane and the data plane in a very flexible way.


Awesome-Cellular-Hacking

Then a list of cool research on 3G/4G/5G cellular security(including attacks and defenses).
There's a lot of useful work there for those who want to get into it


Towards Automated Fuzzing of 4G/5G Protocol Implementations Over the Air

An article that will propose a real-time framework for full 4G and 5G data link management and network connectivity with eNB/gNB. 
This is intended to experiment and test the security of data communication protocols such as MAC management, RLC management, PDCP convergence protocol and network protocols such as RRC management and non -NAS. Although we focus on the base station, our framework is equally applicable to UE communication management.


And that's it
Thanks for reading❤️

I hope you found the above material useful.

Remember if Dodo asks you to give a reward in the contest, look in your pockets there is for sure some candied fruits🐧
#ss7 #mobile #network #5g #neural_networks #attacks #distinction
👍3
Пишу пост про анонимность/безопасность Линукс🐧

Пост будет выходить как- серия статей где то на 6 частей

Думаю первую часть закончу завтра вечером и выложу на канал
👍17🔥9👏1
Я наконец то дописала большую статью про безопасность линукс на русском.
Материал для моих англоязычных читателей выйдет чуть позже

I finally wrote a long article about Linux security.
Material for my English-speaking readers will be released a little later

Приятного прочтения❤️

#vpn #linux #tor #i2p #mac #decentralization #cryptography #cve #dos #еtthernet #anonymity #attackers
👍144🔥1
0•Bytes•1
private_linux.tar
Архив с дополнительными материалами по этой статье будет ниже.

В /private_linux/all/ общие матерьялы в папке /private_linux/all/attaks матерьялы про атаки на wifi
В папке private_linux/i2p/ содержаться статьи про i2p private_linux/i2p/attaks атаки на него
В папке private_linux/tor/ содержаться статьи про tor а в папке tor/attaks про атаки на него
В директории private_linux/browser/ статьи про браузеры, а в папке private_linux/browsergu/attacks/ атаки на них

Надеюсь вам будет полезно❤️🧩

An archive of additional material for this article is below.

The /private_linux/all/common folder contains articles about attacks on wifi in /private_linux/all/attaks
The private_linux/i2p/ folder contains articles about i2p private_linux/i2p/attacks
The private_linux/tor/ directory contains articles about tor and the tor/attacks directory about tor
The private_linux/browser/ directory contains articles about browsers, and the private_linux/browsergu/attacks/ directory contains articles about browsers

Hope you find it useful❤️🧩
#vpn #linux #tor #i2p #mac #decentralization #cryptography #cve #dos #еtthernet #anonymity #attackers
👍8
Я сделала сборник различных инструментов и материалов по радио хакингу, так же там есть материалы/инструменты по мобильной связи.
В этом сборнике я дала подробное их оп описание


Надеюсь вам будет интересно ❤️

Русская версия

#radio_hacking #radio_waves #tools #gsm #mobile #network #ss7 #cve
23
I made a compilation of various tools and materials on radio hacking, as well as there are materials/tools on mobile communication.
In this collection I have given a detailed denoscription of them


I hope you will find it interesting ❤️

English version

#radio_hacking #radio_waves #tools #gsm #mobile #network #ss7 #cve
4
This media is not supported in your browser
VIEW IN TELEGRAM
🔥187🤯2
Наконец то я дописала статью про реверс вирусов на практике.🧩🦠

Там я проанализировала вирус для кражи телеграмм канала который скинули моему товарищу. 
А так же рассказала про инструменты для реверса. И про работу некоторых ассемблерных функций.
Надеюсь вам будет интересно 🗝
Версия на русском


Finally I finished my article about malware reversal in practice.🧩🦠

There I analyzed a virus for stealing telegram channel which was sent to my friend. 
And I also told about the reversal tools. And about some assembler functions.
I hope you will find it interesting. 🗝
English version
#anitivirus #malware #revers #traffic_analysis #virus #windows
🔥19👍31
Архив с материалами к статье🦠🔑

Там есть материалы по ассемблер, по инструментам по реверсу из моей статьи, а так же по самому ресурсу.

ВНИМАНИЕ
В папке "Virus from satity. NO CLOSE WITHOUT ANALYSIS"
Лежит вирус который я анализировала в статье, открывать только с вашей виртуальной машины если вы не хотите заразиться.
Так же я не несу ответственность за ваши действия.

Еще хочу напомнить, если вы хотите меня поддержать, задонатить можно здесь.
Это совсем не обязательно и я вас и так люблю.
Тем не менее мне будет приятно❤️


Archive with materials for the article🦠🔑

There are materials on assembler, on tools for reversing from my article, as well as on the resource itself.

WARNING
In the folder "Virus from satity. NO CLOSE WITHOUT ANALYSIS"
There is a virus which I analyzed in the article, open only from your virtual machine if you don't want to get infected.
I am also not responsible for your actions.

I also want to remind you, if you want to support me, you can ask for help here
This is not at all necessary and I love you anyway.
Nevertheless, I will be приятно❤️
#anitivirus #malware #revers #traffic_analysis #virus #windows
🔥95👍2
0•Bytes•1
Про что сделать пост?/What should I post about?
Будет несколько постов по очереди:
1) про мобильную форнзику
2) про атаки на ss7
3) продолжение статьи про реверс с разбором кода

There will be several posts in turn:
1) about mobile forensic
2) about attacks on ss7
3) continuation of the article about reverse with code parsing
👍16
Форензика и борьба с ней💥
Пока я пишу большую статью про мобильную форензику, решила выложить список инструментов, сборников и материалов по обычной(в основном ПК) форензике и борьбе ней.
Надеюсь вам будет полезно 🔑

Русская версия


Forensics and wrestling with it💥
While I'm writing a big article about mobile forenzika, I decided to post a list of tools, compilations and materials on regular(mostly PC) forensics and wrestling with it.
I hope you will find it useful 🔑


English version

#forensics #anonymity #anti_forensics #malware #cryptography
👍19
Привет, мои Чеширские котики🐱

Я доделала пост про мобильную криминалистику🔎

В начале там будут приведены методы мобильной форензики.
После я проведу пример анализа криптокошельков на андроиде и айфоне.
А в конце будет приведены инструменты упрощающее процесс расследования.
Так же материал дополняющий статью будет в архиве ниже.

Русская версия


Hello, my Cheshire cats🐱

I finished the post about mobile forensics🔎

In the beginning there will be mobile forensics methods.
After that I will give an example of cryptocurrency analysis on android and iPhone.
And at the end there will be tools to simplify the investigation process.
Also the material supplementing the article will be in the archive below.

English version
#crypto_wallet #bitcoin #nft #android #forensics #ios
👍12🔥7❤‍🔥2👎1
forencis_modile.zip
89.9 MB
Архив к статье📚

Здесь будут материалы дополняющие статью.
Тут будет более подробно про методы мобильной форензики.
А так же более подробные статьи про расследование в криптокошельках.
Ещё там будут материалы про расследование на андроиде и айфон.

Надеюсь вам будет полезно❤️


Archive to the article📚

Here will be materials supplementing the article.
There will be more details about mobile forensics methods.
As well as more detailed articles about cryptocurrency investigation.
There will also be materials about investigation on android and iPhone.

I hope you will be полезно❤️
#crypto_wallet #bitcoin #nft #android #forensics #ios
12🔥3💩1
This media is not supported in your browser
VIEW IN TELEGRAM
👍1511🔥2