white2hack 📚 – Telegram
white2hack 📚
12.4K subscribers
4.8K photos
135 videos
1.96K files
2.26K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://news.1rj.ru/str/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)

This report presents best practices for overall network security and protection of individual network devices, and will assist administrators in preventing an adversary from exploiting their network. While the guidance presented here is generic and can be applied to many types of network devices, sample commands for Cisco Internetwork Operating System (IOS) devices are provided which can be executed to implement the recommendations.

#cisco #docs
👍2
1646228506913.pdf
906.6 KB
Network Infrastructure Security Guidance, March 2022 (PP-22-0266 Version 1.0)
👍1
A collection of Windows Server 2019 and Windows 10 hardening noscripts

GitHub
https://github.com/atlantsecurity/windows-hardening-noscripts

#windows #hardening
👍6
Карты по сетевому стеку

+ Network Communication Protocols Map
+ OSI Layers

GitHub
https://gist.github.com/CMCDragonkai/14a21fc387b8ea6f585c882d0d0d9334
👍4
Любителям бинарщины - разбор примера использования техники эксплуатации переполнения буфера для повышения привилегий в системе с кодом на С

https://blog.pentesteracademy.com/exploiting-buffer-overflow-vulnerability-to-do-privilege-escalation-4a1de492a8c5
2
Разбор эксплуатации CVE на домене контроллера от Rapid7, разработчика известного сканера безопасности

https://www.rapid7.com/blog/post/2022/02/14/dropping-files-on-a-domain-controller-using-cve-2021-43893/

#windows
Security analysts who have some knowledge of Active Directory and pentesting would know the concept of tickets. Kerberos, the default authentication mechanism in an AD, uses ticket-based authentication where a Key Distribution Center (KDC) grants a Ticket-Granting Ticket (TGT) to a user requesting access to a service or an account, which can then be redeemed to generate a service ticket (ST) to access a particular service, like an SQL account.

Golden Ticket attacks show how an attacker can keep accessing the domain admin by obtaining the NTLM hash of the "krbtgt" account.

Domain persistence is necessary for an analyst in the event the admin password gets changed. Persistence can also be achieved by using certificate-based authentication deployed in the Active Directory Certificate Service. One such method is the Golden Certificate Attack.

#windows
👍2🔥1
Free Pentester's Lab by PentersterAcademy (USA)

Sources
https://attackdefense.pentesteracademy.com/

#education #pentest
👍4
Team Qualys discovered a local privilege escalation vulnerability in PolicyKit’s (polkit) setuid tool pkexec that allows low-level users to run commands as privileged users.

According to Qualys, the vulnerability exists in the pkexec.c code that doesn’t handle the calling parameters count correctly and ends up trying to execute environment variables as commands. Thus, an attacker can craft environment variables in such a way that it will induce pkexec to execute arbitrary code.

We are using the older, vulnerable Ubuntu version 20.04 in this demonstration, which can be downloaded from Ubuntu’s old releases page.

#linux
🔥2
Microsoft has gradually increased the efficiency and effectiveness of its auditing facilities over the years. Modern Windows systems can log vast amounts of information with minimal system impact. With the corresponding decrease in the price of storage media, excuses to not enable and retain these critical pieces of evidence simply don’t stand up to scrutiny. Configuring adequate logging on Windows systems, and ideally aggregating those logs into a SIEM or other log aggregator, is a critical step toward ensuring that your environment is able to support an effective incident response.

This document provides an overview of some of the most important Windows logs and the events that are recorded there. As with all of our Analyst Reference documents, this PDF is intended to provide more detail than a cheat sheet while still being short enough to serve as a quick reference. The PDF also contains links to external resources for further reference.

#windows
👍5
Оказавшись в качестве заложников в текущей внешнеполитической и экономической ситуации, простые жители, граждане РФ и все кто прибывает на ее территории вынуждены готовиться противостоять текущим угрозам и нападкам

Ситуация на ИТ-рынке. Как противостоять санкциям
https://vc.ru/u/918761-aleksey-klushin/373880-situaciya-na-it-rynke-sankcii-srochnye-mery-chto-delat-s-riskami

Российские аналоги зарубежных сервисов для бизнеса
https://vc.ru/services/374000-rossiyskie-analogi-zarubezhnyh-servisov-dlya-biznesa-kotorye-ne-zablokiruyut

Что учесть владельцам сайтов?
https://vc.ru/marketing/374784-sankcii-i-mart-2022-v-rossii-chto-uchest-vladelcam-saytov

Бесплатные TLS-сертификаты обеспечат доступность сайтов
https://www.securitylab.ru/news/530440.php

Ресурсы которые могут быть заблокированы в РФ [update 06.03]
https://habr.com/ru/news/t/654547/

Гайд: работающие способы вывести деньги за рубеж
https://habr.com/ru/post/654155/
3👍2🤡1